Name "UpdateInfoReader::patchinqa" used only once: possible typo at bin/generate-csaf.pl line 83. Name "UpdateInfoReader::patchissued" used only once: possible typo at bin/generate-csaf.pl line 180. Name "UpdateInfoReader::patchdescription" used only once: possible typo at bin/generate-csaf.pl line 552. Name "SMASHData::severity" used only once: possible typo at bin/generate-csaf.pl line 429. Update is not defined in translation list. Use of uninitialized value within %name2product in concatenation (.) or string at /home/securitybot/prod/cve-database/bin/UpdateInfoReader.pm line 1598. SUSE:Channels/SUSE-ALP-Source-Standard_1.0 skipped no pkglist for SUSE Liberty Linux 8, ESEA-2020:0159 no pkglist for SUSE Liberty Linux 8, ESBA-2020:0166 no pkglist for SUSE Liberty Linux 9, RHBA-2024:3832 no pkglist for SUSE Liberty Linux 9, RHSA-2024:3837 no pkglist for SUSE Liberty Linux 8, ESEA-2020:0158 no pkglist for SUSE Liberty Linux 8, ESEA-2021:0189 no pkglist for SUSE Liberty Linux 8, ESEA-2021:0190 no pkglist for SUSE Liberty Linux 8, ESSA-2020:0164 no pkglist for SUSE Liberty Linux 8, RHBA-2022:5328 ERROR: notice SUSE-FU-2018:1579-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-790 ERROR: notice SUSE-FU-2018:3559-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1726,SUSE-SLE-SERVER-12-SP4-2018-1726 ERROR: notice SUSE-FU-2019:1793-1 has no valid patches out of: SUSE-2019-1793,SUSE-SLE-DESKTOP-12-SP5-2019-1793,SUSE-SLE-SERVER-12-SP5-2019-1793 ERROR: notice SUSE-FU-2019:1840-1 has no valid patches out of: SUSE-2019-1840,SUSE-SLE-DESKTOP-12-SP5-2019-1840,SUSE-SLE-SERVER-12-SP5-2019-1840 SKIP SUSE-FU-2020:1079-1 as SUSE-2020-1079 is not security or has no CVEs. patches: SUSE-2020-1079,SUSE-SLE-Module-Basesystem-15-SP2-2020-1079,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1079 SKIP SUSE-FU-2020:1196-1 as SUSE-SLE-Module-Containers-15-SP1-2020-1196 is not security or has no CVEs. patches: SUSE-2020-1196,SUSE-SLE-Module-Containers-15-SP1-2020-1196 ERROR: notice SUSE-FU-2020:3832-1 has no valid patches out of: SUSE-2020-3832,SUSE-SLE-Module-Basesystem-15-SP3-2020-3832 SKIP SUSE-FU-2021:0961-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-961 is not security or has no CVEs. patches: SUSE-2021-961,SUSE-SLE-Module-SAP-Applications-15-2021-961,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-961,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-961 SKIP SUSE-FU-2021:3027-1 as SUSE-SLE-Module-Containers-15-SP3-2021-3027 is not security or has no CVEs. patches: SUSE-2021-3027,SUSE-SLE-Module-Containers-15-SP2-2021-3027,SUSE-SLE-Module-Containers-15-SP3-2021-3027 SKIP SUSE-FU-2021:3166-1 as SUSE-Storage-6-2021-3166 is not security or has no CVEs. patches: SUSE-2021-3166,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3166,SUSE-Storage-6-2021-3166 SKIP SUSE-FU-2021:3168-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3168 is not security or has no CVEs. patches: SUSE-2021-3168,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3168,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3168,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3168 SKIP SUSE-FU-2021:3169-1 as SUSE-Storage-6-2021-3169 is not security or has no CVEs. patches: SUSE-2021-3169,SUSE-SLE-Manager-Tools-15-2021-3169,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3169,SUSE-Storage-6-2021-3169 SKIP SUSE-FU-2021:3262-1 as SUSE-Storage-6-2021-3262 is not security or has no CVEs. patches: SUSE-2021-3262,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3262,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3262,SUSE-Storage-6-2021-3262 SKIP SUSE-FU-2021:3263-1 as SUSE-Storage-6-2021-3263 is not security or has no CVEs. patches: SUSE-2021-3263,SUSE-SLE-Manager-Tools-15-2021-3263,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3263,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3263,SUSE-Storage-6-2021-3263 SKIP SUSE-FU-2021:3482-1 as SUSE-SLE-SAP-12-SP5-2021-3482 is not security or has no CVEs. patches: SUSE-2021-3482,SUSE-SLE-SAP-12-SP4-2021-3482,SUSE-SLE-SAP-12-SP5-2021-3482 SKIP SUSE-FU-2021:3483-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3483 is not security or has no CVEs. patches: SUSE-2021-3483,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-3483,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-3483,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3483 SKIP SUSE-FU-2021:3499-1 as SUSE-SLE-SAP-12-SP3-2021-3499 is not security or has no CVEs. patches: SUSE-2021-3499,SUSE-SLE-SAP-12-SP3-2021-3499 SKIP SUSE-FU-2021:3508-1 as SUSE-SLE-Module-SAP-Applications-15-2021-3508 is not security or has no CVEs. patches: SUSE-2021-3508,SUSE-SLE-Module-SAP-Applications-15-2021-3508 SKIP SUSE-FU-2021:3884-1 as SUSE-SLE-Product-WE-15-SP3-2021-3884 is not security or has no CVEs. patches: SUSE-2021-3884,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3884,SUSE-SLE-Product-WE-15-SP2-2021-3884,SUSE-SLE-Product-WE-15-SP3-2021-3884 SKIP SUSE-FU-2021:3885-1 as SUSE-SLE-WE-12-SP5-2021-3885 is not security or has no CVEs. patches: SUSE-2021-3885,SUSE-SLE-SDK-12-SP5-2021-3885,SUSE-SLE-WE-12-SP5-2021-3885 SKIP SUSE-FU-2021:3923-1 as SUSE-SLE-Manager-Tools-12-2021-3923 is not security or has no CVEs. patches: SUSE-2021-3923,SUSE-SLE-Manager-Tools-12-2021-3923 SKIP SUSE-FU-2021:3924-1 as SUSE-Storage-6-2021-3924 is not security or has no CVEs. patches: SUSE-2021-3924,SUSE-SLE-Manager-Tools-15-2021-3924,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3924,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3924,SUSE-Storage-6-2021-3924 SKIP SUSE-FU-2021:3925-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3925 is not security or has no CVEs. patches: SUSE-2021-3925,SUSE-SLE-Manager-Tools-15-2021-3925,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3925,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3925 SKIP SUSE-FU-2021:3956-1 as SUSE-SUSE-MicroOS-5.1-2021-3956 is not security or has no CVEs. patches: SUSE-2021-3956,SUSE-SUSE-MicroOS-5.1-2021-3956 SKIP SUSE-FU-2021:4101-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-4101 is not security or has no CVEs. patches: SUSE-2021-4101,SUSE-SLE-Module-Development-Tools-15-SP3-2021-4101 SKIP SUSE-FU-2021:4184-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4184 is not security or has no CVEs. patches: SUSE-2021-4184,SUSE-SLE-Module-Basesystem-15-SP2-2021-4184,SUSE-SLE-Module-Basesystem-15-SP3-2021-4184 SKIP SUSE-FU-2021:4198-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4198 is not security or has no CVEs. patches: SUSE-2021-4198,SUSE-SLE-Module-Basesystem-15-SP2-2021-4198,SUSE-SLE-Module-Basesystem-15-SP3-2021-4198 SKIP SUSE-FU-2022:0006-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-6 is not security or has no CVEs. patches: SUSE-2022-6,SUSE-SLE-Module-Basesystem-15-SP2-2022-6,SUSE-SLE-Module-Basesystem-15-SP3-2022-6 SKIP SUSE-FU-2022:0017-1 as SUSE-SLE-SERVER-12-SP5-2022-17 is not security or has no CVEs. patches: SUSE-2022-17,SUSE-SLE-SDK-12-SP5-2022-17,SUSE-SLE-SERVER-12-SP5-2022-17 SKIP SUSE-FU-2022:0019-1 as SUSE-Storage-6-2022-19 is not security or has no CVEs. patches: SUSE-2022-19,SUSE-SLE-Module-Basesystem-15-SP2-2022-19,SUSE-SLE-Module-Basesystem-15-SP3-2022-19,SUSE-SLE-Product-HPC-15-2022-19,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-19,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-19,SUSE-SLE-Product-SLES-15-2022-19,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-19,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-19,SUSE-SLE-Product-SLES_SAP-15-2022-19,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-19,SUSE-Storage-6-2022-19 SKIP SUSE-FU-2022:0122-1 as SUSE-SLE-Product-WE-15-SP3-2022-122 is not security or has no CVEs. patches: SUSE-2022-122,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2022-122,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-122,SUSE-SLE-Product-WE-15-SP2-2022-122,SUSE-SLE-Product-WE-15-SP3-2022-122 ERROR: notice SUSE-FU-2022:0279-1 has no valid patches out of: SUSE-2022-279,SUSE-SLE-Module-Basesystem-15-SP4-2022-279 ERROR: notice SUSE-FU-2022:0447-1 has no valid patches out of: SUSE-2022-447,SUSE-Debian-10-CLIENT-TOOLS-BETA-2022-447 ERROR: notice SUSE-FU-2022:0450-1 has no valid patches out of: SUSE-2022-450,SUSE-Debian-11-CLIENT-TOOLS-BETA-2022-450 ERROR: notice SUSE-FU-2022:0452-1 has no valid patches out of: SUSE-2022-452,SUSE-Debian-9.0-CLIENT-TOOLS-BETA-2022-452 ERROR: notice SUSE-FU-2022:0454-1 has no valid patches out of: SUSE-2022-454,SUSE-Ubuntu-18.04-CLIENT-TOOLS-BETA-2022-454 ERROR: notice SUSE-FU-2022:0456-1 has no valid patches out of: SUSE-2022-456,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2022-456 SKIP SUSE-FU-2022:0482-1 as SUSE-SLE-Product-WE-15-SP3-2022-482 is not security or has no CVEs. patches: SUSE-2022-482,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-482,SUSE-SLE-Product-WE-15-SP3-2022-482 SKIP SUSE-FU-2022:0599-1 as SUSE-Storage-6-2022-599 is not security or has no CVEs. patches: SUSE-2022-599,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-599,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-599,SUSE-Storage-6-2022-599 SKIP SUSE-FU-2022:0600-1 as SUSE-SLE-Manager-Tools-12-2022-600 is not security or has no CVEs. patches: SUSE-2022-600,SUSE-SLE-Manager-Tools-12-2022-600 SKIP SUSE-FU-2022:0601-1 as SUSE-SLE-Manager-Tools-15-2022-601 is not security or has no CVEs. patches: SUSE-2022-601,SUSE-SLE-Manager-Tools-15-2022-601 SKIP SUSE-FU-2022:0709-1 as SUSE-SLE-SERVER-12-SP5-2022-709 is not security or has no CVEs. patches: SUSE-2022-709,SUSE-SLE-SERVER-12-SP5-2022-709 SKIP SUSE-FU-2022:0718-1 as SUSE-SLE-Product-RT-15-SP2-2022-718 is not security or has no CVEs. patches: SUSE-2022-718,SUSE-SLE-Module-Basesystem-15-SP3-2022-718,SUSE-SLE-Product-RT-15-SP2-2022-718 SKIP SUSE-FU-2022:0911-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-911 is not security or has no CVEs. patches: SUSE-2022-911,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-911 ERROR: notice SUSE-FU-2022:0925-1 has no valid patches out of: SUSE-2022-925,SUSE-SLE-Module-Basesystem-15-SP4-2022-925 SKIP SUSE-FU-2022:0949-1 as SUSE-SLE-Module-Toolchain-12-2022-949 is not security or has no CVEs. patches: SUSE-2022-949,SUSE-SLE-Module-Toolchain-12-2022-949 SKIP SUSE-FU-2022:0950-1 as SUSE-SLE-Product-RT-15-SP2-2022-950 is not security or has no CVEs. patches: SUSE-2022-950,SUSE-SLE-Module-Development-Tools-15-SP3-2022-950,SUSE-SLE-Product-RT-15-SP2-2022-950 SKIP SUSE-FU-2022:1115-1 as SUSE-SLE-Product-WE-15-SP3-2022-1115 is not security or has no CVEs. patches: SUSE-2022-1115,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1115,SUSE-SLE-Product-WE-15-SP3-2022-1115 SKIP SUSE-FU-2022:1144-1 as openSUSE-SLE-15.3-2022-1144 is not security or has no CVEs. patches: SUSE-2022-1144,SUSE-SLE-INSTALLER-15-SP3-2022-1144,SUSE-SLE-Module-Basesystem-15-SP3-2022-1144,SUSE-SUSE-MicroOS-5.1-2022-1144,openSUSE-SLE-15.3-2022-1144,openSUSE-SLE-15.4-2022-1144 SKIP SUSE-FU-2022:1400-1 as openSUSE-SLE-15.3-2022-1400 is not security or has no CVEs. patches: SUSE-2022-1400,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1400,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1400,SUSE-SLE-Product-RT-15-SP2-2022-1400,openSUSE-SLE-15.3-2022-1400,openSUSE-SLE-15.4-2022-1400 SKIP SUSE-FU-2022:1467-1 as SUSE-SLE-Manager-Tools-12-2022-1467 is not security or has no CVEs. patches: SUSE-2022-1467,SUSE-SLE-Manager-Tools-12-2022-1467 SKIP SUSE-FU-2022:1468-1 as openSUSE-SLE-15.4-2022-1468 is not security or has no CVEs. patches: SUSE-2022-1468,openSUSE-SLE-15.3-2022-1468,openSUSE-SLE-15.4-2022-1468 ERROR: notice SUSE-FU-2022:14986-1 has no valid patches out of: suse-ubu184ct-client-tools-202205-14986 ERROR: notice SUSE-FU-2022:14987-1 has no valid patches out of: suse-ubu204ct-client-tools-202204-14987 ERROR: notice SUSE-FU-2022:14988-1 has no valid patches out of: suse-ubu204ct-client-tools-202205-14988 ERROR: notice SUSE-FU-2022:14989-1 has no valid patches out of: suse-ubu184ct-client-tools-202204-14989 SKIP SUSE-FU-2022:1519-1 as openSUSE-SLE-15.4-2022-1519 is not security or has no CVEs. patches: SUSE-2022-1519,SUSE-SLE-Module-Basesystem-15-SP3-2022-1519,SUSE-SLE-Module-Basesystem-15-SP4-2022-1519,SUSE-SLE-Product-HPC-15-2022-1519,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1519,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1519,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1519,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1519,SUSE-SLE-Product-RT-15-SP2-2022-1519,SUSE-SLE-Product-SLES-15-2022-1519,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1519,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1519,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1519,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1519,SUSE-SLE-Product-SLES_SAP-15-2022-1519,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1519,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1519,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1519,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1519,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1519,SUSE-SUSE-MicroOS-5.0-2022-1519,SUSE-SUSE-MicroOS-5.1-2022-1519,SUSE-SUSE-MicroOS-5.2-2022-1519,SUSE-Storage-6-2022-1519,SUSE-Storage-7-2022-1519,openSUSE-SLE-15.3-2022-1519,openSUSE-SLE-15.4-2022-1519 SKIP SUSE-FU-2022:1901-1 as openSUSE-SLE-15.3-2022-1901 is not security or has no CVEs. patches: SUSE-2022-1901,SUSE-SLE-Module-Basesystem-15-SP3-2022-1901,openSUSE-SLE-15.3-2022-1901 SKIP SUSE-FU-2022:2114-1 as openSUSE-SLE-15.4-2022-2114 is not security or has no CVEs. patches: SUSE-2022-2114,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2114,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2114,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2114,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2114,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2114,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2114,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2114,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2114,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2114,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2114,SUSE-Storage-7-2022-2114,openSUSE-SLE-15.3-2022-2114,openSUSE-SLE-15.4-2022-2114 SKIP SUSE-FU-2022:2120-1 as SUSE-Storage-6-2022-2120 is not security or has no CVEs. patches: SUSE-2022-2120,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2120,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2120,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2120,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2120,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2120,SUSE-Storage-6-2022-2120 SKIP SUSE-FU-2022:2121-1 as SUSE-SLE-Product-SLES_SAP-15-2022-2121 is not security or has no CVEs. patches: SUSE-2022-2121,SUSE-SLE-Product-HPC-15-2022-2121,SUSE-SLE-Product-SLES-15-2022-2121,SUSE-SLE-Product-SLES_SAP-15-2022-2121 SKIP SUSE-FU-2022:2122-1 as SUSE-Storage-7-2022-2122 is not security or has no CVEs. patches: SUSE-2022-2122,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2122,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2122,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2122,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2122,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2122,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2122,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2122,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2122,SUSE-Storage-7-2022-2122 SKIP SUSE-FU-2022:2124-1 as openSUSE-SLE-15.3-2022-2124 is not security or has no CVEs. patches: SUSE-2022-2124,SUSE-SLE-Module-Basesystem-15-SP3-2022-2124,SUSE-SLE-Module-Server-Applications-15-SP3-2022-2124,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-2124,SUSE-SUSE-MicroOS-5.1-2022-2124,SUSE-SUSE-MicroOS-5.2-2022-2124,openSUSE-SLE-15.3-2022-2124 ERROR: notice SUSE-FU-2022:2128-1 has no valid patches out of: SUSE-2022-2128,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-2128 ERROR: notice SUSE-FU-2022:2129-1 has no valid patches out of: SUSE-2022-2129,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-2129 ERROR: notice SUSE-FU-2022:2133-1 has no valid patches out of: SUSE-2022-2133,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-2133 SKIP SUSE-FU-2022:2390-1 as openSUSE-SLE-15.4-2022-2390 is not security or has no CVEs. patches: SUSE-2022-2390,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2390,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2390,SUSE-SLE-Product-HPC-15-2022-2390,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2390,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2390,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2390,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2390,SUSE-SLE-Product-SLES-15-2022-2390,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2390,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2390,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2390,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2390,SUSE-SLE-Product-SLES_SAP-15-2022-2390,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2390,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2390,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2390,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2390,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2390,SUSE-Storage-6-2022-2390,SUSE-Storage-7-2022-2390,openSUSE-SLE-15.3-2022-2390,openSUSE-SLE-15.4-2022-2390 SKIP SUSE-FU-2022:2488-1 as openSUSE-SLE-15.4-2022-2488 is not security or has no CVEs. patches: SUSE-2022-2488,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-2488,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2488,openSUSE-SLE-15.4-2022-2488 SKIP SUSE-FU-2022:2579-1 as SUSE-SLE-SERVER-12-SP5-2022-2579 is not security or has no CVEs. patches: SUSE-2022-2579,SUSE-SLE-Module-Public-Cloud-12-2022-2579,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2579,SUSE-SLE-SERVER-12-SP5-2022-2579 SKIP SUSE-FU-2022:2733-1 as SUSE-SLE-SERVER-12-SP5-2022-2733 is not security or has no CVEs. patches: SUSE-2022-2733,SUSE-SLE-SERVER-12-SP5-2022-2733 SKIP SUSE-FU-2022:2926-1 as openSUSE-SLE-15.4-2022-2926 is not security or has no CVEs. patches: SUSE-2022-2926,SUSE-SLE-Module-Basesystem-15-SP3-2022-2926,SUSE-SLE-Module-Basesystem-15-SP4-2022-2926,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2926,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2926,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2926,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2926,SUSE-SLE-Product-WE-15-SP3-2022-2926,SUSE-SLE-Product-WE-15-SP4-2022-2926,SUSE-SUSE-MicroOS-5.1-2022-2926,SUSE-SUSE-MicroOS-5.2-2022-2926,openSUSE-SLE-15.3-2022-2926,openSUSE-SLE-15.4-2022-2926 SKIP SUSE-FU-2022:2926-2 as openSUSE-Leap-Micro-5.2-2022-2926 is not security or has no CVEs. patches: SUSE-2022-2926,openSUSE-Leap-Micro-5.2-2022-2926 SKIP SUSE-FU-2022:2927-1 as SUSE-SLE-WE-12-SP5-2022-2927 is not security or has no CVEs. patches: SUSE-2022-2927,SUSE-SLE-SDK-12-SP5-2022-2927,SUSE-SLE-WE-12-SP5-2022-2927 SKIP SUSE-FU-2022:2972-1 as openSUSE-SLE-15.4-2022-2972 is not security or has no CVEs. patches: SUSE-2022-2972,SUSE-SLE-Module-Basesystem-15-SP3-2022-2972,SUSE-SLE-Module-Basesystem-15-SP4-2022-2972,SUSE-SLE-Module-Containers-15-SP3-2022-2972,SUSE-SLE-Module-Containers-15-SP4-2022-2972,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2972,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-2972,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2972,SUSE-Storage-6-2022-2972,openSUSE-SLE-15.3-2022-2972,openSUSE-SLE-15.4-2022-2972 SKIP SUSE-FU-2022:2980-1 as openSUSE-SLE-15.4-2022-2980 is not security or has no CVEs. patches: SUSE-2022-2980,SUSE-SLE-Module-SAP-Applications-15-2022-2980,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2980,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2980,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2980,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2980,openSUSE-SLE-15.3-2022-2980,openSUSE-SLE-15.4-2022-2980 SKIP SUSE-FU-2022:3017-1 as SUSE-SLE-SAP-12-SP5-2022-3017 is not security or has no CVEs. patches: SUSE-2022-3017,SUSE-SLE-SAP-12-SP4-2022-3017,SUSE-SLE-SAP-12-SP5-2022-3017 SKIP SUSE-FU-2022:3086-1 as SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3086 is not security or has no CVEs. patches: SUSE-2022-3086,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3086 SKIP SUSE-FU-2022:3126-1 as openSUSE-SLE-15.4-2022-3126 is not security or has no CVEs. patches: SUSE-2022-3126,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3126,openSUSE-SLE-15.4-2022-3126 SKIP SUSE-FU-2022:3302-1 as openSUSE-SLE-15.4-2022-3302 is not security or has no CVEs. patches: SUSE-2022-3302,SUSE-SLE-Module-Basesystem-15-SP4-2022-3302,SUSE-SLE-Module-Python3-15-SP4-2022-3302,openSUSE-SLE-15.4-2022-3302 SKIP SUSE-FU-2022:3501-1 as openSUSE-SLE-15.4-2022-3501 is not security or has no CVEs. patches: SUSE-2022-3501,SUSE-SLE-Module-Basesystem-15-SP3-2022-3501,SUSE-SLE-Module-Basesystem-15-SP4-2022-3501,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3501,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3501,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3501,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3501,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3501,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3501,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3501,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3501,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3501,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3501,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3501,SUSE-SUSE-MicroOS-5.2-2022-3501,SUSE-Storage-7-2022-3501,openSUSE-Leap-Micro-5.2-2022-3501,openSUSE-SLE-15.3-2022-3501,openSUSE-SLE-15.4-2022-3501 SKIP SUSE-FU-2022:3520-1 as openSUSE-SLE-15.4-2022-3520 is not security or has no CVEs. patches: SUSE-2022-3520,SUSE-SLE-Micro-5.3-2022-3520,SUSE-SLE-Module-Basesystem-15-SP4-2022-3520,openSUSE-SLE-15.4-2022-3520 SKIP SUSE-FU-2022:3522-1 as openSUSE-SLE-15.4-2022-3522 is not security or has no CVEs. patches: SUSE-2022-3522,SUSE-SLE-Module-Basesystem-15-SP4-2022-3522,openSUSE-SLE-15.4-2022-3522 SKIP SUSE-FU-2022:3556-1 as openSUSE-SLE-15.4-2022-3556 is not security or has no CVEs. patches: SUSE-2022-3556,SUSE-SLE-Module-Basesystem-15-SP4-2022-3556,openSUSE-SLE-15.4-2022-3556 SKIP SUSE-FU-2022:3689-1 as openSUSE-SLE-15.4-2022-3689 is not security or has no CVEs. patches: SUSE-2022-3689,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3689,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3689,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3689,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-3689,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-3689,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3689,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3689,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3689,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3689,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3689,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3689,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3689,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3689,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3689,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3689,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3689,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3689,SUSE-Storage-7-2022-3689,openSUSE-SLE-15.3-2022-3689,openSUSE-SLE-15.4-2022-3689 SKIP SUSE-FU-2022:3732-1 as openSUSE-SLE-15.4-2022-3732 is not security or has no CVEs. patches: SUSE-2022-3732,SUSE-SLE-Module-Basesystem-15-SP4-2022-3732,openSUSE-SLE-15.4-2022-3732 SKIP SUSE-FU-2022:3842-1 as openSUSE-SLE-15.4-2022-3842 is not security or has no CVEs. patches: SUSE-2022-3842,SUSE-SLE-Module-Basesystem-15-SP4-2022-3842,openSUSE-SLE-15.4-2022-3842 SKIP SUSE-FU-2022:3845-1 as openSUSE-SLE-15.4-2022-3845 is not security or has no CVEs. patches: SUSE-2022-3845,SUSE-SLE-Micro-5.3-2022-3845,SUSE-SLE-Module-Basesystem-15-SP4-2022-3845,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3845,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3845,openSUSE-SLE-15.4-2022-3845 SKIP SUSE-FU-2022:3847-1 as openSUSE-SLE-15.3-2022-3847 is not security or has no CVEs. patches: SUSE-2022-3847,SUSE-SLE-Module-Basesystem-15-SP3-2022-3847,openSUSE-SLE-15.3-2022-3847 SKIP SUSE-FU-2022:3948-1 as openSUSE-Leap-Micro-5.2-2022-3948 is not security or has no CVEs. patches: SUSE-2022-3948,SUSE-SUSE-MicroOS-5.2-2022-3948,openSUSE-Leap-Micro-5.2-2022-3948 SKIP SUSE-FU-2022:4261-1 as openSUSE-SLE-15.4-2022-4261 is not security or has no CVEs. patches: SUSE-2022-4261,SUSE-SLE-Module-Basesystem-15-SP3-2022-4261,SUSE-SLE-Module-Basesystem-15-SP4-2022-4261,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4261,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4261,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4261,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4261,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4261,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4261,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4261,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4261,SUSE-Storage-7-2022-4261,openSUSE-SLE-15.3-2022-4261,openSUSE-SLE-15.4-2022-4261 SKIP SUSE-FU-2022:4313-1 as openSUSE-SLE-15.4-2022-4313 is not security or has no CVEs. patches: SUSE-2022-4313,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4313,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4313,openSUSE-SLE-15.3-2022-4313,openSUSE-SLE-15.4-2022-4313 SKIP SUSE-FU-2022:4340-1 as openSUSE-SLE-15.4-2022-4340 is not security or has no CVEs. patches: SUSE-2022-4340,SUSE-SLE-Micro-5.3-2022-4340,SUSE-SLE-Module-Basesystem-15-SP4-2022-4340,openSUSE-SLE-15.4-2022-4340 SKIP SUSE-FU-2022:4341-1 as openSUSE-SLE-15.3-2022-4341 is not security or has no CVEs. patches: SUSE-2022-4341,SUSE-SLE-Module-Basesystem-15-SP3-2022-4341,SUSE-SUSE-MicroOS-5.1-2022-4341,SUSE-SUSE-MicroOS-5.2-2022-4341,openSUSE-Leap-Micro-5.2-2022-4341,openSUSE-SLE-15.3-2022-4341 SKIP SUSE-FU-2022:4342-1 as SUSE-SLE-SERVER-12-SP5-2022-4342 is not security or has no CVEs. patches: SUSE-2022-4342,SUSE-SLE-SERVER-12-SP5-2022-4342 SKIP SUSE-FU-2022:4343-1 as SUSE-Storage-6-2022-4343 is not security or has no CVEs. patches: SUSE-2022-4343,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4343,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4343,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4343,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4343,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4343,SUSE-Storage-6-2022-4343 SKIP SUSE-FU-2022:4344-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-4344 is not security or has no CVEs. patches: SUSE-2022-4344,SUSE-SLE-SERVER-12-SP2-BCL-2022-4344,SUSE-SLE-SERVER-12-SP3-BCL-2022-4344 SKIP SUSE-FU-2022:4346-1 as SUSE-SLE-SERVER-12-SP5-2022-4346 is not security or has no CVEs. patches: SUSE-2022-4346,SUSE-SLE-SDK-12-SP5-2022-4346,SUSE-SLE-SERVER-12-SP5-2022-4346 SKIP SUSE-FU-2022:4352-1 as SUSE-SLE-Module-Web-Scripting-12-2022-4352 is not security or has no CVEs. patches: SUSE-2022-4352,SUSE-SLE-Module-Public-Cloud-12-2022-4352,SUSE-SLE-Module-Web-Scripting-12-2022-4352 SKIP SUSE-FU-2022:4380-1 as openSUSE-SLE-15.4-2022-4380 is not security or has no CVEs. patches: SUSE-2022-4380,SUSE-SLE-Micro-5.3-2022-4380,SUSE-SLE-Module-Basesystem-15-SP4-2022-4380,openSUSE-Leap-Micro-5.3-2022-4380,openSUSE-SLE-15.4-2022-4380 SKIP SUSE-FU-2022:4464-1 as openSUSE-SLE-15.4-2022-4464 is not security or has no CVEs. patches: SUSE-2022-4464,SUSE-SLE-INSTALLER-15-SP4-2022-4464,SUSE-SLE-Module-Basesystem-15-SP4-2022-4464,openSUSE-SLE-15.4-2022-4464 SKIP SUSE-FU-2022:4495-1 as openSUSE-SLE-15.4-2022-4495 is not security or has no CVEs. patches: SUSE-2022-4495,SUSE-SLE-Module-Basesystem-15-SP4-2022-4495,openSUSE-SLE-15.4-2022-4495 SKIP SUSE-FU-2022:4601-1 as openSUSE-SLE-15.4-2022-4601 is not security or has no CVEs. patches: SUSE-2022-4601,SUSE-SLE-Micro-5.3-2022-4601,SUSE-SLE-Module-Basesystem-15-SP3-2022-4601,SUSE-SLE-Module-Basesystem-15-SP4-2022-4601,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4601,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4601,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4601,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4601,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4601,SUSE-SLE-Module-Python2-15-SP3-2022-4601,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4601,SUSE-SLE-Product-WE-15-SP4-2022-4601,openSUSE-Leap-Micro-5.3-2022-4601,openSUSE-SLE-15.3-2022-4601,openSUSE-SLE-15.4-2022-4601 SKIP SUSE-FU-2023:0142-1 as openSUSE-SLE-15.4-2023-142 is not security or has no CVEs. patches: SUSE-2023-142,SUSE-SLE-Module-Basesystem-15-SP4-2023-142,SUSE-SLE-Module-Server-Applications-15-SP4-2023-142,openSUSE-SLE-15.4-2023-142 SKIP SUSE-FU-2023:0194-1 as SUSE-SLE-SAP-12-SP5-2023-194 is not security or has no CVEs. patches: SUSE-2023-194,SUSE-SLE-SAP-12-SP4-2023-194,SUSE-SLE-SAP-12-SP5-2023-194 SKIP SUSE-FU-2023:0195-1 as openSUSE-SLE-15.4-2023-195 is not security or has no CVEs. patches: SUSE-2023-195,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-195,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-195,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-195,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-195,openSUSE-SLE-15.4-2023-195 SKIP SUSE-FU-2023:0401-1 as openSUSE-SLE-15.4-2023-401 is not security or has no CVEs. patches: SUSE-2023-401,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-401,SUSE-SLE-Product-WE-15-SP4-2023-401,openSUSE-SLE-15.4-2023-401 SKIP SUSE-FU-2023:0472-1 as openSUSE-SLE-15.4-2023-472 is not security or has no CVEs. patches: SUSE-2023-472,SUSE-SLE-Module-Development-Tools-15-SP4-2023-472,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-472,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-472,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-472,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-472,SUSE-SLE-Product-RT-15-SP3-2023-472,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-472,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-472,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-472,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-472,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-472,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-472,SUSE-Storage-6-2023-472,SUSE-Storage-7-2023-472,SUSE-Storage-7.1-2023-472,openSUSE-SLE-15.4-2023-472 SKIP SUSE-FU-2023:0595-1 as openSUSE-SLE-15.4-2023-595 is not security or has no CVEs. patches: SUSE-2023-595,SUSE-SLE-Micro-5.3-2023-595,SUSE-SLE-Module-Basesystem-15-SP4-2023-595,openSUSE-SLE-15.4-2023-595 SKIP SUSE-FU-2023:0702-1 as openSUSE-SLE-15.4-2023-702 is not security or has no CVEs. patches: SUSE-2023-702,SUSE-SLE-Module-Basesystem-15-SP4-2023-702,openSUSE-SLE-15.4-2023-702 SKIP SUSE-FU-2023:0719-1 as openSUSE-SLE-15.4-2023-719 is not security or has no CVEs. patches: SUSE-2023-719,SUSE-SLE-Module-Development-Tools-15-SP4-2023-719,openSUSE-SLE-15.4-2023-719 SKIP SUSE-FU-2023:0789-1 as openSUSE-SLE-15.4-2023-789 is not security or has no CVEs. patches: SUSE-2023-789,SUSE-SLE-Module-Basesystem-15-SP4-2023-789,SUSE-SLE-Module-Development-Tools-15-SP4-2023-789,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-789,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-789,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-789,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-789,SUSE-SLE-Product-RT-15-SP3-2023-789,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-789,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-789,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-789,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-789,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-789,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-789,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-789,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-789,SUSE-Storage-7-2023-789,SUSE-Storage-7.1-2023-789,openSUSE-SLE-15.4-2023-789 SKIP SUSE-FU-2023:1656-1 as openSUSE-SLE-15.4-2023-1656 is not security or has no CVEs. patches: SUSE-2023-1656,SUSE-SLE-Module-HPC-15-SP4-2023-1656,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1656,openSUSE-SLE-15.4-2023-1656 SKIP SUSE-FU-2023:1705-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1705 is not security or has no CVEs. patches: SUSE-2023-1705,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1705,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1705 SKIP SUSE-FU-2023:1706-1 as openSUSE-SLE-15.4-2023-1706 is not security or has no CVEs. patches: SUSE-2023-1706,SUSE-SLE-Module-HPC-15-SP4-2023-1706,openSUSE-SLE-15.4-2023-1706 SKIP SUSE-FU-2023:1724-1 as openSUSE-SLE-15.4-2023-1724 is not security or has no CVEs. patches: SUSE-2023-1724,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1724,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1724,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1724,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1724,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1724,SUSE-SLE-Product-RT-15-SP3-2023-1724,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1724,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1724,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1724,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1724,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1724,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1724,SUSE-Storage-7-2023-1724,SUSE-Storage-7.1-2023-1724,openSUSE-SLE-15.4-2023-1724 SKIP SUSE-FU-2023:1919-1 as SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1919 is not security or has no CVEs. patches: SUSE-2023-1919,SUSE-SLE-Module-Basesystem-15-SP4-2023-1919,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1919 SKIP SUSE-FU-2023:2049-1 as openSUSE-SLE-15.4-2023-2049 is not security or has no CVEs. patches: SUSE-2023-2049,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2049,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2049,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2049,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2049,SUSE-SLE-Product-RT-15-SP3-2023-2049,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2049,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2049,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2049,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2049,SUSE-Storage-7-2023-2049,SUSE-Storage-7.1-2023-2049,openSUSE-SLE-15.4-2023-2049 SKIP SUSE-FU-2023:2118-1 as openSUSE-SLE-15.4-2023-2118 is not security or has no CVEs. patches: SUSE-2023-2118,SUSE-SLE-Micro-5.3-2023-2118,SUSE-SLE-Micro-5.4-2023-2118,SUSE-SLE-Product-HA-15-SP4-2023-2118,openSUSE-Leap-Micro-5.3-2023-2118,openSUSE-SLE-15.4-2023-2118 SKIP SUSE-FU-2023:2160-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2160 is not security or has no CVEs. patches: SUSE-2023-2160,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2160,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2160,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2160,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2160 SKIP SUSE-FU-2023:2161-1 as openSUSE-SLE-15.4-2023-2161 is not security or has no CVEs. patches: SUSE-2023-2161,SUSE-SLE-Micro-5.3-2023-2161,SUSE-SLE-Micro-5.4-2023-2161,SUSE-SLE-Module-Basesystem-15-SP4-2023-2161,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2161,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2161,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2161,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2161,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2161,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2161,SUSE-SLE-Product-RT-15-SP3-2023-2161,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2161,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2161,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2161,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2161,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2161,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2161,SUSE-SUSE-MicroOS-5.2-2023-2161,SUSE-Storage-7-2023-2161,SUSE-Storage-7.1-2023-2161,openSUSE-Leap-Micro-5.3-2023-2161,openSUSE-SLE-15.4-2023-2161 SKIP SUSE-FU-2023:2192-1 as openSUSE-SLE-15.4-2023-2192 is not security or has no CVEs. patches: SUSE-2023-2192,SUSE-SLE-Micro-5.3-2023-2192,SUSE-SLE-Micro-5.4-2023-2192,SUSE-SLE-Module-Basesystem-15-SP4-2023-2192,SUSE-SLE-Module-Python3-15-SP4-2023-2192,openSUSE-Leap-Micro-5.3-2023-2192,openSUSE-SLE-15.4-2023-2192 SKIP SUSE-FU-2023:2266-1 as openSUSE-SLE-15.4-2023-2266 is not security or has no CVEs. patches: SUSE-2023-2266,openSUSE-SLE-15.4-2023-2266 SKIP SUSE-FU-2023:2266-2 as openSUSE-SLE-15.5-2023-2266 is not security or has no CVEs. patches: SUSE-2023-2266,openSUSE-SLE-15.5-2023-2266 SKIP SUSE-FU-2023:2267-1 as openSUSE-SLE-15.4-2023-2267 is not security or has no CVEs. patches: SUSE-2023-2267,openSUSE-SLE-15.4-2023-2267 SKIP SUSE-FU-2023:2267-2 as openSUSE-SLE-15.5-2023-2267 is not security or has no CVEs. patches: SUSE-2023-2267,openSUSE-SLE-15.5-2023-2267 SKIP SUSE-FU-2023:2269-1 as openSUSE-SLE-15.4-2023-2269 is not security or has no CVEs. patches: SUSE-2023-2269,SUSE-SLE-Module-Basesystem-15-SP4-2023-2269,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2269,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2269,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2269,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2269,SUSE-SLE-Product-RT-15-SP3-2023-2269,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2269,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2269,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2269,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2269,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2269,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2269,SUSE-Storage-7-2023-2269,SUSE-Storage-7.1-2023-2269,openSUSE-SLE-15.4-2023-2269 SKIP SUSE-FU-2023:2271-1 as openSUSE-SLE-15.4-2023-2271 is not security or has no CVEs. patches: SUSE-2023-2271,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2271,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2271,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2271,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2271,SUSE-SLE-Product-RT-15-SP3-2023-2271,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2271,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2271,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2271,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2271,SUSE-Storage-7-2023-2271,SUSE-Storage-7.1-2023-2271,openSUSE-SLE-15.4-2023-2271 SKIP SUSE-FU-2023:2271-2 as openSUSE-SLE-15.5-2023-2271 is not security or has no CVEs. patches: SUSE-2023-2271,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2271,openSUSE-SLE-15.5-2023-2271 SKIP SUSE-FU-2023:2282-1 as openSUSE-SLE-15.4-2023-2282 is not security or has no CVEs. patches: SUSE-2023-2282,openSUSE-SLE-15.4-2023-2282 SKIP SUSE-FU-2023:2434 as openSUSE-SLE-15.5-2023-2434 is not security or has no CVEs. patches: openSUSE-SLE-15.4-2023-2434,openSUSE-SLE-15.5-2023-2434 SKIP SUSE-FU-2023:2434-1 as openSUSE-SLE-15.5-2023-2434 is not security or has no CVEs. patches: SUSE-2023-2434,openSUSE-SLE-15.4-2023-2434,openSUSE-SLE-15.5-2023-2434 SKIP SUSE-FU-2023:2499-1 as SUSE-Storage-7.1-2023-2499 is not security or has no CVEs. patches: SUSE-2023-2499,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2499,SUSE-Storage-7.1-2023-2499 SKIP SUSE-FU-2023:2522-1 as SUSE-SLE-Module-Toolchain-12-2023-2522 is not security or has no CVEs. patches: SUSE-2023-2522,SUSE-SLE-Module-Toolchain-12-2023-2522 SKIP SUSE-FU-2023:2523-1 as openSUSE-SLE-15.4-2023-2523 is not security or has no CVEs. patches: SUSE-2023-2523,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2523,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2523,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2523,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2523,SUSE-SLE-Product-RT-15-SP3-2023-2523,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2523,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2523,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2523,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2523,SUSE-Storage-7-2023-2523,SUSE-Storage-7.1-2023-2523,openSUSE-SLE-15.4-2023-2523 SKIP SUSE-FU-2023:2738-1 as openSUSE-SLE-15.4-2023-2738 is not security or has no CVEs. patches: SUSE-2023-2738,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2738,SUSE-SLE-Module-Web-Scripting-15-SP4-2023-2738,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2738,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2738,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2738,SUSE-SLE-Product-RT-15-SP3-2023-2738,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2738,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2738,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2738,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2738,SUSE-Storage-7-2023-2738,SUSE-Storage-7.1-2023-2738,openSUSE-SLE-15.4-2023-2738 SKIP SUSE-FU-2023:2738-2 as openSUSE-SLE-15.5-2023-2738 is not security or has no CVEs. patches: SUSE-2023-2738,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2738,SUSE-SLE-Module-Web-Scripting-15-SP5-2023-2738,openSUSE-SLE-15.5-2023-2738 SKIP SUSE-FU-2023:2768-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2768 is not security or has no CVEs. patches: SUSE-2023-2768,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2768,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2768 SKIP SUSE-FU-2023:2769-1 as openSUSE-SLE-15.5-2023-2769 is not security or has no CVEs. patches: SUSE-2023-2769,SUSE-SLE-Module-HPC-15-SP4-2023-2769,SUSE-SLE-Module-HPC-15-SP5-2023-2769,openSUSE-SLE-15.4-2023-2769,openSUSE-SLE-15.5-2023-2769 SKIP SUSE-FU-2023:2898-1 as SUSE-SLE-Micro-5.4-2023-2898 is not security or has no CVEs. patches: SUSE-2023-2898,SUSE-SLE-Micro-5.3-2023-2898,SUSE-SLE-Micro-5.4-2023-2898 SKIP SUSE-FU-2023:3045-1 as openSUSE-SLE-15.5-2023-3045 is not security or has no CVEs. patches: SUSE-2023-3045,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3045,openSUSE-SLE-15.5-2023-3045 SKIP SUSE-FU-2023:3213-1 as openSUSE-SLE-15.5-2023-3213 is not security or has no CVEs. patches: SUSE-2023-3213,SUSE-SLE-Module-HPC-15-SP4-2023-3213,SUSE-SLE-Module-HPC-15-SP5-2023-3213,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3213,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3213,openSUSE-SLE-15.4-2023-3213,openSUSE-SLE-15.5-2023-3213 SKIP SUSE-FU-2023:3316-1 as openSUSE-SLE-15.5-2023-3316 is not security or has no CVEs. patches: SUSE-2023-3316,SUSE-SLE-Module-Basesystem-15-SP4-2023-3316,SUSE-SLE-Module-Basesystem-15-SP5-2023-3316,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3316,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3316,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3316,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3316,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3316,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3316,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3316,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3316,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3316,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3316,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3316,SUSE-Storage-7-2023-3316,SUSE-Storage-7.1-2023-3316,openSUSE-SLE-15.4-2023-3316,openSUSE-SLE-15.5-2023-3316 SKIP SUSE-FU-2023:3319-1 as openSUSE-SLE-15.5-2023-3319 is not security or has no CVEs. patches: SUSE-2023-3319,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3319,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3319,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3319,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3319,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3319,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3319,SUSE-SLE-Product-RT-15-SP3-2023-3319,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3319,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3319,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3319,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3319,SUSE-Storage-7-2023-3319,SUSE-Storage-7.1-2023-3319,openSUSE-SLE-15.4-2023-3319,openSUSE-SLE-15.5-2023-3319 SKIP SUSE-FU-2023:3320-1 as openSUSE-SLE-15.5-2023-3320 is not security or has no CVEs. patches: SUSE-2023-3320,SUSE-SLE-Module-HPC-15-SP4-2023-3320,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3320,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3320,openSUSE-SLE-15.4-2023-3320,openSUSE-SLE-15.5-2023-3320 SKIP SUSE-FU-2023:3321-1 as openSUSE-SLE-15.5-2023-3321 is not security or has no CVEs. patches: SUSE-2023-3321,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3321,openSUSE-SLE-15.4-2023-3321,openSUSE-SLE-15.5-2023-3321 SKIP SUSE-FU-2023:3322-1 as openSUSE-SLE-15.5-2023-3322 is not security or has no CVEs. patches: SUSE-2023-3322,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3322,openSUSE-SLE-15.4-2023-3322,openSUSE-SLE-15.5-2023-3322 SKIP SUSE-FU-2023:3350-1 as openSUSE-SLE-15.5-2023-3350 is not security or has no CVEs. patches: SUSE-2023-3350,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3350,openSUSE-SLE-15.5-2023-3350 SKIP SUSE-FU-2023:3381-1 as openSUSE-SLE-15.5-2023-3381 is not security or has no CVEs. patches: SUSE-2023-3381,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-3381,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-3381,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3381,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3381,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3381,SUSE-Storage-7.1-2023-3381,openSUSE-SLE-15.4-2023-3381,openSUSE-SLE-15.5-2023-3381 SKIP SUSE-FU-2023:3482-1 as openSUSE-SLE-15.5-2023-3482 is not security or has no CVEs. patches: SUSE-2023-3482,SUSE-SLE-Module-Basesystem-15-SP4-2023-3482,SUSE-SLE-Module-Basesystem-15-SP5-2023-3482,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3482,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3482,openSUSE-SLE-15.4-2023-3482,openSUSE-SLE-15.5-2023-3482 SKIP SUSE-FU-2023:3484-1 as openSUSE-SLE-15.4-2023-3484 is not security or has no CVEs. patches: SUSE-2023-3484,SUSE-SLE-Module-Basesystem-15-SP4-2023-3484,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3484,openSUSE-SLE-15.4-2023-3484 SKIP SUSE-FU-2023:3547-1 as openSUSE-SLE-15.5-2023-3547 is not security or has no CVEs. patches: SUSE-2023-3547,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3547,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3547,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3547,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3547,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3547,SUSE-SLE-Product-RT-15-SP3-2023-3547,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3547,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3547,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3547,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3547,SUSE-Storage-7.1-2023-3547,openSUSE-SLE-15.4-2023-3547,openSUSE-SLE-15.5-2023-3547 SKIP SUSE-FU-2023:3548-1 as openSUSE-SLE-15.5-2023-3548 is not security or has no CVEs. patches: SUSE-2023-3548,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3548,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3548,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3548,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3548,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3548,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3548,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3548,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3548,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3548,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3548,openSUSE-SLE-15.4-2023-3548,openSUSE-SLE-15.5-2023-3548 SKIP SUSE-FU-2023:3549-1 as openSUSE-SLE-15.5-2023-3549 is not security or has no CVEs. patches: SUSE-2023-3549,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3549,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3549,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3549,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3549,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3549,SUSE-SLE-Product-RT-15-SP3-2023-3549,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3549,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3549,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3549,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3549,SUSE-Storage-7.1-2023-3549,openSUSE-SLE-15.4-2023-3549,openSUSE-SLE-15.5-2023-3549 SKIP SUSE-FU-2023:3849-1 as openSUSE-SLE-15.5-2023-3849 is not security or has no CVEs. patches: SUSE-2023-3849,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3849,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3849,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3849,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3849,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3849,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3849,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3849,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3849,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3849,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3849,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3849,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3849,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3849,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3849,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3849,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3849,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3849,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3849,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3849,SUSE-Storage-7.1-2023-3849,openSUSE-SLE-15.4-2023-3849,openSUSE-SLE-15.5-2023-3849 SKIP SUSE-FU-2023:3860-1 as SUSE-SLE-Module-HPC-12-2023-3860 is not security or has no CVEs. patches: SUSE-2023-3860,SUSE-SLE-Module-HPC-12-2023-3860 SKIP SUSE-FU-2023:4194-1 as openSUSE-SLE-15.5-2023-4194 is not security or has no CVEs. patches: SUSE-2023-4194,SUSE-SLE-Micro-5.3-2023-4194,SUSE-SLE-Micro-5.4-2023-4194,SUSE-SLE-Micro-5.5-2023-4194,SUSE-SLE-Module-Basesystem-15-SP4-2023-4194,SUSE-SLE-Module-Basesystem-15-SP5-2023-4194,SUSE-SLE-Module-Containers-15-SP4-2023-4194,SUSE-SLE-Module-Containers-15-SP5-2023-4194,SUSE-SLE-Module-Python3-15-SP4-2023-4194,SUSE-SLE-Module-Python3-15-SP5-2023-4194,openSUSE-Leap-Micro-5.3-2023-4194,openSUSE-Leap-Micro-5.4-2023-4194,openSUSE-SLE-15.4-2023-4194,openSUSE-SLE-15.5-2023-4194 SKIP SUSE-FU-2023:4234-1 as openSUSE-SLE-15.5-2023-4234 is not security or has no CVEs. patches: SUSE-2023-4234,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4234,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4234,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4234,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4234,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4234,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4234,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4234,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4234,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4234,SUSE-Storage-7.1-2023-4234,openSUSE-SLE-15.4-2023-4234,openSUSE-SLE-15.5-2023-4234 SKIP SUSE-FU-2023:4502-1 as openSUSE-SLE-15.5-2023-4502 is not security or has no CVEs. patches: SUSE-2023-4502,SUSE-SLE-Module-Basesystem-15-SP4-2023-4502,SUSE-SLE-Module-Basesystem-15-SP5-2023-4502,SUSE-SLE-Module-Python3-15-SP4-2023-4502,SUSE-SLE-Module-Python3-15-SP5-2023-4502,openSUSE-SLE-15.4-2023-4502,openSUSE-SLE-15.5-2023-4502 SKIP SUSE-FU-2023:4583-1 as openSUSE-SLE-15.5-2023-4583 is not security or has no CVEs. patches: SUSE-2023-4583,SUSE-SLE-Micro-5.3-2023-4583,SUSE-SLE-Micro-5.4-2023-4583,SUSE-SLE-Micro-5.5-2023-4583,SUSE-SLE-Module-Basesystem-15-SP4-2023-4583,SUSE-SLE-Module-Basesystem-15-SP5-2023-4583,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4583,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4583,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4583,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4583,SUSE-SUSE-MicroOS-5.1-2023-4583,SUSE-SUSE-MicroOS-5.2-2023-4583,SUSE-Storage-7.1-2023-4583,openSUSE-Leap-Micro-5.3-2023-4583,openSUSE-Leap-Micro-5.4-2023-4583,openSUSE-SLE-15.4-2023-4583,openSUSE-SLE-15.5-2023-4583 SKIP SUSE-FU-2023:4616-1 as openSUSE-SLE-15.5-2023-4616 is not security or has no CVEs. patches: SUSE-2023-4616,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4616,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4616,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4616,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4616,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4616,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4616,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4616,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4616,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4616,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4616,SUSE-Storage-7.1-2023-4616,openSUSE-SLE-15.4-2023-4616,openSUSE-SLE-15.5-2023-4616 SKIP SUSE-FU-2023:4678-1 as openSUSE-SLE-15.5-2023-4678 is not security or has no CVEs. patches: SUSE-2023-4678,SUSE-SLE-Micro-5.5-2023-4678,SUSE-SLE-Module-Basesystem-15-SP5-2023-4678,SUSE-SLE-Product-HA-15-SP5-2023-4678,openSUSE-SLE-15.5-2023-4678 SKIP SUSE-FU-2023:4885-1 as openSUSE-SLE-15.5-2023-4885 is not security or has no CVEs. patches: SUSE-2023-4885,SUSE-SLE-Module-Basesystem-15-SP4-2023-4885,SUSE-SLE-Module-Basesystem-15-SP5-2023-4885,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4885,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4885,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4885,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4885,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4885,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4885,SUSE-SLE-Product-RT-15-SP3-2023-4885,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4885,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4885,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4885,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4885,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4885,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4885,SUSE-Storage-7.1-2023-4885,openSUSE-SLE-15.4-2023-4885,openSUSE-SLE-15.5-2023-4885 SKIP SUSE-FU-2024:0091-1 as openSUSE-SLE-15.5-2024-91 is not security or has no CVEs. patches: SUSE-2024-91,SUSE-SLE-Module-Basesystem-15-SP5-2024-91,SUSE-SLE-Module-Development-Tools-15-SP5-2024-91,openSUSE-SLE-15.4-2024-91,openSUSE-SLE-15.5-2024-91 SKIP SUSE-FU-2024:0092-1 as openSUSE-SLE-15.5-2024-92 is not security or has no CVEs. patches: SUSE-2024-92,SUSE-SLE-Module-Development-Tools-15-SP5-2024-92,SUSE-SLE-Product-RT-15-SP4-2024-92,openSUSE-SLE-15.5-2024-92 SKIP SUSE-FU-2024:0178-1 as openSUSE-SLE-15.5-2024-178 is not security or has no CVEs. patches: SUSE-2024-178,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-178,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-178,openSUSE-SLE-15.5-2024-178 SKIP SUSE-FU-2024:0275-1 as openSUSE-SLE-15.5-2024-275 is not security or has no CVEs. patches: SUSE-2024-275,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-275,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-275,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-275,openSUSE-SLE-15.5-2024-275 SKIP SUSE-FU-2024:0611-1 as SUSE-SLE-Product-SLES_SAP-15-SP4-2024-611 is not security or has no CVEs. patches: SUSE-2024-611,SUSE-SLE-Module-Basesystem-15-SP5-2024-611,SUSE-SLE-Module-Server-Applications-15-SP5-2024-611,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-611,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-611,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-611,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-611,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-611,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-611,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-611 SKIP SUSE-FU-2024:0646-1 as openSUSE-SLE-15.5-2024-646 is not security or has no CVEs. patches: SUSE-2024-646,SUSE-SLE-Module-Python3-15-SP5-2024-646,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-646,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-646,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-646,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-646,openSUSE-SLE-15.5-2024-646 SKIP SUSE-FU-2024:0839-1 as openSUSE-SLE-15.5-2024-839 is not security or has no CVEs. patches: SUSE-2024-839,SUSE-SLE-Module-Basesystem-15-SP5-2024-839,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-839,openSUSE-SLE-15.5-2024-839 SKIP SUSE-FU-2024:0839-2 as openSUSE-SLE-15.6-2024-839 is not security or has no CVEs. patches: SUSE-2024-839,SUSE-SLE-Module-Basesystem-15-SP6-2024-839,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-839,openSUSE-SLE-15.6-2024-839 SKIP SUSE-FU-2024:0957-1 as openSUSE-SLE-15.5-2024-957 is not security or has no CVEs. patches: SUSE-2024-957,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-957,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-957,openSUSE-SLE-15.5-2024-957 SKIP SUSE-FU-2024:1075-1 as openSUSE-SLE-15.5-2024-1075 is not security or has no CVEs. patches: SUSE-2024-1075,SUSE-SLE-Module-Basesystem-15-SP5-2024-1075,SUSE-SLE-Module-HPC-15-SP5-2024-1075,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1075,openSUSE-SLE-15.5-2024-1075 SKIP SUSE-FU-2024:1812-1 as SUSE-2024-1812 is not security or has no CVEs. patches: SUSE-2024-1812 SKIP SUSE-FU-2024:1957-1 as SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1957 is not security or has no CVEs. patches: SUSE-2024-1957,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1957,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1957,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1957 SKIP SUSE-FU-2024:2049-1 as SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2049 is not security or has no CVEs. patches: SUSE-2024-2049,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2049,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2049,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2049,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2049 SKIP SUSE-FU-2024:2194-1 as openSUSE-SLE-15.6-2024-2194 is not security or has no CVEs. patches: SUSE-2024-2194,SUSE-SLE-Module-Basesystem-15-SP5-2024-2194,SUSE-SLE-Module-Basesystem-15-SP6-2024-2194,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2194,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2194,openSUSE-SLE-15.5-2024-2194,openSUSE-SLE-15.6-2024-2194 SKIP SUSE-FU-2024:2244-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2244 is not security or has no CVEs. patches: SUSE-2024-2244,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2244 SKIP SUSE-FU-2024:2296-1 as openSUSE-SLE-15.6-2024-2296 is not security or has no CVEs. patches: SUSE-2024-2296,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2296,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2296,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2296,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2296,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2296,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2296,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2296,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2296,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2296,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2296,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2296,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2296,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2296,SUSE-Storage-7.1-2024-2296,openSUSE-SLE-15.5-2024-2296,openSUSE-SLE-15.6-2024-2296 SKIP SUSE-FU-2024:2374-1 as SUSE-SLE-Micro-5.5-2024-2374 is not security or has no CVEs. patches: SUSE-2024-2374,SUSE-SLE-Micro-5.5-2024-2374 SKIP SUSE-FU-2024:2461-1 as SUSE-SLE-Micro-5.5-2024-2461 is not security or has no CVEs. patches: SUSE-2024-2461,SUSE-SLE-Micro-5.5-2024-2461 SKIP SUSE-FU-2024:2688-1 as openSUSE-SLE-15.6-2024-2688 is not security or has no CVEs. patches: SUSE-2024-2688,SUSE-SLE-Micro-5.3-2024-2688,SUSE-SLE-Micro-5.4-2024-2688,SUSE-SLE-Micro-5.5-2024-2688,SUSE-SLE-Module-Basesystem-15-SP5-2024-2688,SUSE-SLE-Module-Basesystem-15-SP6-2024-2688,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2688,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2688,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2688,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2688,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2688,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2688,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2688,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2688,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2688,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2688,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2688,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2688,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2688,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2688,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2688,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2688,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2688,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2688,SUSE-SUSE-MicroOS-5.2-2024-2688,SUSE-Storage-7.1-2024-2688,openSUSE-Leap-Micro-5.5-2024-2688,openSUSE-SLE-15.5-2024-2688,openSUSE-SLE-15.6-2024-2688 SKIP SUSE-FU-2024:3063-1 as openSUSE-SLE-15.6-2024-3063 is not security or has no CVEs. patches: SUSE-2024-3063,SUSE-SLE-Module-Basesystem-15-SP5-2024-3063,SUSE-SLE-Module-Basesystem-15-SP6-2024-3063,openSUSE-SLE-15.5-2024-3063,openSUSE-SLE-15.6-2024-3063 SKIP SUSE-FU-2024:3064-1 as SUSE-SLE-SERVER-12-SP5-2024-3064 is not security or has no CVEs. patches: SUSE-2024-3064,SUSE-SLE-SERVER-12-SP5-2024-3064 SKIP SUSE-FU-2024:3465-1 as SUSE-SLE-Module-Confidential-Computing-15-SP6-2024-3465 is not security or has no CVEs. patches: SUSE-2024-3465,SUSE-SLE-Module-Confidential-Computing-15-SP6-2024-3465 SKIP SUSE-FU-2024:3486-1 as openSUSE-SLE-15.6-2024-3486 is not security or has no CVEs. patches: SUSE-2024-3486,SUSE-SLE-Module-Python3-15-SP5-2024-3486,SUSE-SLE-Module-Python3-15-SP6-2024-3486,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3486,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3486,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3486,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3486,openSUSE-SLE-15.5-2024-3486,openSUSE-SLE-15.6-2024-3486 SKIP SUSE-OU-2015:0228-1 as SUSE-SLE-SDK-12-2015-56 is not security or has no CVEs. patches: SUSE-SLE-BSK-12-2015-56,SUSE-SLE-Module-Public-Cloud-12-2015-56,SUSE-SLE-SDK-12-2015-56 SKIP SUSE-OU-2015:0235-1 as slesctsp3-spacecmd is not security or has no CVEs. patches: slemap21-spacecmd,slesctsp3-spacecmd SKIP SUSE-OU-2015:0242-1 as SUSE-SLE-Manager-Tools-12-2015-60 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-60 SKIP SUSE-OU-2015:0321-1 as SUSE-SLE-SERVER-12-2015-84 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-84,SUSE-SLE-SERVER-12-2015-84 SKIP SUSE-OU-2015:0327-1 as SUSE-SLE-Module-Legacy-12-2015-86 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2015-86 SKIP SUSE-OU-2015:0444-1 as SUSE-SLE-SERVER-12-2015-108 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-108,SUSE-SLE-SDK-12-2015-108,SUSE-SLE-SERVER-12-2015-108 SKIP SUSE-OU-2015:0445-1 as sleclo50sp3-openstack-docs-201502 is not security or has no CVEs. patches: sleclo50sp3-openstack-docs-201502 SKIP SUSE-OU-2015:0477-1 as SUSE-SLE-WE-12-2015-117 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-117,SUSE-SLE-SDK-12-2015-117,SUSE-SLE-SERVER-12-2015-117,SUSE-SLE-WE-12-2015-117 SKIP SUSE-OU-2015:0572-1 as SUSE-SLE-SERVER-12-2015-141 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-141,SUSE-SLE-SERVER-12-2015-141 SKIP SUSE-OU-2015:0596-1 as SUSE-SLE-Module-Public-Cloud-12-2015-142 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-142 SKIP SUSE-OU-2015:0598-1 as SUSE-SLE-WE-12-2015-143 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-143,SUSE-SLE-SDK-12-2015-143,SUSE-SLE-SERVER-12-2015-143,SUSE-SLE-WE-12-2015-143 SKIP SUSE-OU-2015:0641-1 as SUSE-SLE-SERVER-12-2015-150 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-150 SKIP SUSE-OU-2015:0656-1 as slessp3-ceph-client-deps is not security or has no CVEs. patches: sdksp3-boost49-201502,sdksp3-ceph-client,sdksp3-ceph-client-deps,sledsp3-boost49-201502,sledsp3-ceph-client,slessp3-boost49-201502,slessp3-ceph-client,slessp3-ceph-client-deps SKIP SUSE-OU-2015:0711-1 as slessp3-sync-builds-201503 is not security or has no CVEs. patches: sdksp3-sync-builds-201503,sledsp3-sync-builds-201503,slessp3-sync-builds-201503 SKIP SUSE-OU-2015:0756-1 as SUSE-SLE-DESKTOP-12-2015-171 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-171 SKIP SUSE-OU-2015:0819-1 as pubclsp3-public-cloud-201504 is not security or has no CVEs. patches: pubclsp3-public-cloud-201504 SKIP SUSE-OU-2015:0837-1 as SUSE-SLE-SERVER-12-2015-187 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-187,SUSE-SLE-SERVER-12-2015-187 SKIP SUSE-OU-2015:0897-1 as SUSE-SLE-DESKTOP-12-2015-201 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-201 SKIP SUSE-OU-2015:0902-1 as slessp3-libapr-util1 is not security or has no CVEs. patches: sdksp3-libapr-util1,slessp3-libapr-util1 SKIP SUSE-OU-2015:1090-1 as slessp3-postgresql94-201505 is not security or has no CVEs. patches: sdksp3-postgresql94-201505,sledsp3-postgresql94-201505,sleman21-postgresql94-201505,slessp3-postgresql94-201505 SKIP SUSE-OU-2015:1111-1 as SUSE-Storage-1.0-2015-236 is not security or has no CVEs. patches: SUSE-Storage-1.0-2015-236 SKIP SUSE-OU-2015:1116-1 as SUSE-Storage-1.0-2015-236 is not security or has no CVEs. patches: SUSE-Storage-1.0-2015-236 SKIP SUSE-OU-2015:1218-1 as secsp3-openvpn-openssl1 is not security or has no CVEs. patches: secsp3-openvpn-openssl1 SKIP SUSE-OU-2015:1226-1 as sleposp3-baytrail-201505 is not security or has no CVEs. patches: sleposp3-baytrail-201505 SKIP SUSE-OU-2015:1226-2 as sleposp3-hid-multitouch is not security or has no CVEs. patches: sleposp3-hid-multitouch SKIP SUSE-OU-2015:1242-1 as SUSE-SLE-HA-12-2015-317 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-317 SKIP SUSE-OU-2015:1252-1 as SUSE-SLE-Manager-Tools-12-2015-324 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-324 ERROR: notice SUSE-OU-2015:1274-1 has no valid patches out of: SUSE-SLE-Module-Containers-12-2015-333 SKIP SUSE-OU-2015:1312-1 as slesctsp4-client-tools-201507-12009 is not security or has no CVEs. patches: slesctsp4-client-tools-201507-12009 SKIP SUSE-OU-2015:1328-1 as SUSE-SLE-WE-12-2015-358 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-358,SUSE-SLE-SDK-12-2015-358,SUSE-SLE-WE-12-2015-358 SKIP SUSE-OU-2015:1346-1 as SUSE-SLE-WE-12-2015-368 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-368,SUSE-SLE-SDK-12-2015-368,SUSE-SLE-SERVER-12-2015-368,SUSE-SLE-WE-12-2015-368 SKIP SUSE-OU-2015:1385-1 as SUSE-SLE12-CLOUD-5-2015-401 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-401 SKIP SUSE-OU-2015:1417-1 as SUSE-SLE-SERVER-12-2015-422 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-422,SUSE-SLE-Module-Toolchain-12-2015-422,SUSE-SLE-SDK-12-2015-422,SUSE-SLE-SERVER-12-2015-422 SKIP SUSE-OU-2015:1430-1 as SUSE-SLE-SERVER-12-2015-432 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-432,SUSE-SLE-SDK-12-2015-432,SUSE-SLE-SERVER-12-2015-432 SKIP SUSE-OU-2015:1437-1 as SUSE-SLE-SERVER-12-2015-440 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-440 SKIP SUSE-OU-2015:1465-1 as sdksp3-openmpi-psm-12056 is not security or has no CVEs. patches: sdksp3-openmpi-psm-12056 SKIP SUSE-OU-2015:1485-1 as slessp4-quota-12069 is not security or has no CVEs. patches: sledsp4-quota-12069,slessp4-quota-12069 SKIP SUSE-OU-2015:1486-1 as SUSE-SLE-Module-Legacy-12-2015-483 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2015-483 SKIP SUSE-OU-2015:1557-1 as slesappsp4-release-notes-sles-for-sap-12090 is not security or has no CVEs. patches: slesappsp4-release-notes-sles-for-sap-12090 SKIP SUSE-OU-2015:1632-1 as SUSE-SLE-Module-Public-Cloud-12-2015-598 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-598 SKIP SUSE-OU-2015:1639-1 as slesappsp4-sle-ha-manuals_ja-zh-12107 is not security or has no CVEs. patches: slehasp4-sle-ha-manuals_ja-zh-12107,slesappsp4-sle-ha-manuals_ja-zh-12107 SKIP SUSE-OU-2015:1656-1 as SUSE-SLE-SDK-12-2015-623 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-623 SKIP SUSE-OU-2015:1662-1 as SUSE-SLE-Module-Containers-12-2015-626 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-626 SKIP SUSE-OU-2015:1672-1 as SUSE-SLE-SERVER-12-2015-636 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-636 SKIP SUSE-OU-2015:1716-1 as SUSE-SLE-SERVER-12-2015-663 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-663,SUSE-SLE-SDK-12-2015-663,SUSE-SLE-SERVER-12-2015-663 SKIP SUSE-OU-2015:1728-1 as SUSE-SLE12-CLOUD-5-2015-670 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-670 SKIP SUSE-OU-2015:1735-1 as SUSE-SLE-Module-Containers-12-2015-676 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-676 SKIP SUSE-OU-2015:1737-1 as pubclsp3-susepubliccloudinfo-12126 is not security or has no CVEs. patches: pubclsp3-susepubliccloudinfo-12126 SKIP SUSE-OU-2015:1738-1 as SUSE-SLE-Module-Public-Cloud-12-2015-679 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-679 SKIP SUSE-OU-2015:1807-1 as sleclo50sp3-python-manilaclient-12161 is not security or has no CVEs. patches: sleclo50sp3-python-manilaclient-12161 SKIP SUSE-OU-2015:1808-1 as SUSE-SLE12-CLOUD-5-2015-739 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-739 SKIP SUSE-OU-2015:1944-1 as SUSE-SLE-Module-Public-Cloud-12-2015-817 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-817 SKIP SUSE-OU-2015:2066-1 as SUSE-SLE-WE-12-2015-878 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-878,SUSE-SLE-WE-12-2015-878 SKIP SUSE-OU-2015:2177-1 as SUSE-SLE-SERVER-12-2015-930 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-930 SKIP SUSE-OU-2015:2185-1 as SUSE-SLE-Module-Containers-12-2015-937 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-937 ERROR: notice SUSE-OU-2015:2212-1 has no valid patches out of: SUSE-SLE-Module-Containers-12-2015-947 SKIP SUSE-OU-2016:0009-1 as secsp3-openssh-openssl1-12292 is not security or has no CVEs. patches: secsp3-openssh-openssl1-12292 SKIP SUSE-OU-2016:0023-1 as SUSE-SLE-Module-Public-Cloud-12-2016-13 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-13 SKIP SUSE-OU-2016:0083-1 as SUSE-SLE-Module-Containers-12-2016-59 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-59 SKIP SUSE-OU-2016:0142-1 as SUSE-SLE-HA-12-SP1-2016-97 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-97 SKIP SUSE-OU-2016:0156-1 as slessp4-libica2-12336 is not security or has no CVEs. patches: sdksp4-libica2-12336,slessp4-libica2-12336 SKIP SUSE-OU-2016:0266-1 as SUSE-SLE-Module-Public-Cloud-12-2016-170 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-170 SKIP SUSE-OU-2016:0342-1 as SUSE-SLE-WE-12-SP1-2016-207 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-207,SUSE-SLE-DESKTOP-12-SP1-2016-207,SUSE-SLE-SDK-12-2016-207,SUSE-SLE-SDK-12-SP1-2016-207,SUSE-SLE-SERVER-12-2016-207,SUSE-SLE-SERVER-12-SP1-2016-207,SUSE-SLE-WE-12-2016-207,SUSE-SLE-WE-12-SP1-2016-207 SKIP SUSE-OU-2016:0407-1 as SUSE-SLE-Module-Public-Cloud-12-2016-238 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-238 SKIP SUSE-OU-2016:0580-1 as SUSE-SLE-Module-Public-Cloud-12-2016-324 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-324 SKIP SUSE-OU-2016:0581-1 as pubclsp3-supportutils-plugin-suse-public-cloud-12418 is not security or has no CVEs. patches: pubclsp3-supportutils-plugin-suse-public-cloud-12418 SKIP SUSE-OU-2016:0685-1 as SUSE-SLE-HA-12-SP1-2016-390 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-390 SKIP SUSE-OU-2016:0690-1 as SUSE-SLE-WE-12-SP1-2016-393 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-393,SUSE-SLE-DESKTOP-12-SP1-2016-393,SUSE-SLE-SDK-12-2016-393,SUSE-SLE-SDK-12-SP1-2016-393,SUSE-SLE-WE-12-2016-393,SUSE-SLE-WE-12-SP1-2016-393 SKIP SUSE-OU-2016:0713-1 as SUSE-Storage-2.1-2016-408 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-408,SUSE-SLE-SDK-12-SP1-2016-408,SUSE-SLE-SERVER-12-SP1-2016-408,SUSE-Storage-2.1-2016-408 SKIP SUSE-OU-2016:0787-1 as slessp4-wget-openssl1-12459 is not security or has no CVEs. patches: secsp3-wget-openssl1-12459,sledsp4-wget-openssl1-12459,slessp4-wget-openssl1-12459 SKIP SUSE-OU-2016:0870-1 as slessp4-cyrus-sasl-12474 is not security or has no CVEs. patches: sdksp4-cyrus-sasl-12474,secsp3-cyrus-sasl-12474,sledsp4-cyrus-sasl-12474,slessp4-cyrus-sasl-12474 SKIP SUSE-OU-2016:0906-1 as slessp4-perl-Crypt-SSLeay-openssl1-12479 is not security or has no CVEs. patches: secsp3-perl-Crypt-SSLeay-openssl1-12479,sledsp4-perl-Crypt-SSLeay-openssl1-12479,slessp4-perl-Crypt-SSLeay-openssl1-12479 SKIP SUSE-OU-2016:0910-1 as slessp4-curl-openssl1-12481 is not security or has no CVEs. patches: sdksp4-curl-openssl1-12481,secsp3-curl-openssl1-12481,sledsp4-curl-openssl1-12481,slessp3-curl-openssl1-12481,slessp4-curl-openssl1-12481 SKIP SUSE-OU-2016:0917-1 as SUSE-SLE-SAP-12-SP1-2016-528 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-528 SKIP SUSE-OU-2016:0928-1 as slessp4-perl-Net-SSLeay-openssl1-12486 is not security or has no CVEs. patches: secsp3-perl-Net-SSLeay-openssl1-12486,sledsp4-perl-Net-SSLeay-openssl1-12486,slessp4-perl-Net-SSLeay-openssl1-12486 SKIP SUSE-OU-2016:0998-1 as SUSE-SLE-SDK-12-SP1-2016-588 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-588 SKIP SUSE-OU-2016:1018-1 as SUSE-SLE-Module-Public-Cloud-12-2016-598 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-598 SKIP SUSE-OU-2016:1093-1 as SUSE-SLE-Module-Public-Cloud-12-2016-640 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-640 SKIP SUSE-OU-2016:1098-1 as pubclsp3-python-azure-agent-12514 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-12514 SKIP SUSE-OU-2016:1302-1 as SUSE-SLE-SAP-12-SP1-2016-770 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-770 SKIP SUSE-OU-2016:1338-1 as SUSE-SLE-SDK-12-SP1-2016-783 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-783 SKIP SUSE-OU-2016:1339-1 as SUSE-SLE-SERVER-12-SP1-2016-781 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-781,SUSE-SLE-DESKTOP-12-SP1-2016-781,SUSE-SLE-SDK-12-2016-781,SUSE-SLE-SDK-12-SP1-2016-781,SUSE-SLE-SERVER-12-2016-781,SUSE-SLE-SERVER-12-SP1-2016-781 SKIP SUSE-OU-2016:1340-1 as SUSE-SLE-SDK-12-SP1-2016-782 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-782,SUSE-SLE-SDK-12-2016-782,SUSE-SLE-SDK-12-SP1-2016-782 SKIP SUSE-OU-2016:1407-1 as SUSE-SLE-Module-Public-Cloud-12-2016-840 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-840 SKIP SUSE-OU-2016:1452-1 as sleman21-python-dateutil-12587 is not security or has no CVEs. patches: sleman21-python-dateutil-12587 SKIP SUSE-OU-2016:1503-1 as SUSE-SLE-WE-12-SP1-2016-894 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-894,SUSE-SLE-DESKTOP-12-SP1-2016-894,SUSE-SLE-SDK-12-2016-894,SUSE-SLE-SDK-12-SP1-2016-894,SUSE-SLE-SERVER-12-2016-894,SUSE-SLE-SERVER-12-SP1-2016-894,SUSE-SLE-WE-12-2016-894,SUSE-SLE-WE-12-SP1-2016-894 SKIP SUSE-OU-2016:1705-1 as SUSE-SLE-SERVER-12-2016-1008 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-1008 SKIP SUSE-OU-2016:1867-1 as slessp4-stunnel-openssl1-12663 is not security or has no CVEs. patches: secsp3-stunnel-openssl1-12663,slessp4-stunnel-openssl1-12663 SKIP SUSE-OU-2016:1876-1 as SUSE-SLE-Module-Web-Scripting-12-2016-1102 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2016-1102 ERROR: notice SUSE-OU-2016:1913-1 has no valid patches out of: SUSE-SLE-Module-Web-Scripting-12-2016-1125,SUSE-SLE-SDK-12-SP1-2016-1125 SKIP SUSE-OU-2016:1947-1 as slessp4-python-numpy-12675 is not security or has no CVEs. patches: sdksp4-python-numpy-12675,slessp4-python-numpy-12675 SKIP SUSE-OU-2016:2091-1 as SUSE-SLE-SDK-12-SP1-2016-1236 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1236 SKIP SUSE-OU-2016:2160-1 as SUSE-SLE-Module-Legacy-12-2016-1278 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1278 SKIP SUSE-OU-2016:2161-1 as SUSE-SLE-SDK-12-SP1-2016-1279 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1279 SKIP SUSE-OU-2016:2319-1 as SUSE-SLE-SERVER-12-SP1-2016-1358 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1358,SUSE-SLE-Module-Toolchain-12-2016-1358,SUSE-SLE-SAP-12-2016-1358,SUSE-SLE-SERVER-12-2016-1358,SUSE-SLE-SERVER-12-SP1-2016-1358 SKIP SUSE-OU-2016:2319-2 as SUSE-SLE-Module-Toolchain-12-2016-1358 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2016-1358 SKIP SUSE-OU-2016:2332-1 as 5557 is not security or has no CVEs. patches: 5557 SKIP SUSE-OU-2016:2412-1 as SUSE-SLE-WE-12-SP1-2016-1406 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1406,SUSE-SLE-SDK-12-SP1-2016-1406,SUSE-SLE-SERVER-12-SP1-2016-1406,SUSE-SLE-WE-12-SP1-2016-1406 SKIP SUSE-OU-2016:2420-1 as SUSE-SLE-SDK-12-SP1-2016-1413 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2016-1413,SUSE-SLE-SDK-12-SP1-2016-1413 SKIP SUSE-OU-2016:2564-1 as SUSE-SLE-Module-Legacy-12-2016-1497 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1497 SKIP SUSE-OU-2016:2564-2 as SUSE-SLE-Module-Legacy-12-2016-1497 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1497 SKIP SUSE-OU-2016:2756-1 as sdksp4-google-compute-engine-init-12841 is not security or has no CVEs. patches: pubclsp3-google-compute-engine-init-12841,sdksp4-google-compute-engine-init-12841 SKIP SUSE-OU-2016:2757-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1625 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1625 SKIP SUSE-OU-2016:2857-1 as 1006 is not security or has no CVEs. patches: 1006 SKIP SUSE-OU-2016:2868-1 as 1000 is not security or has no CVEs. patches: 1000 SKIP SUSE-OU-2016:2913-1 as SUSE-SUSE-Manager-Server-3.0-2016-1699 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1699,SUSE-SLE-SERVER-12-SP1-2016-1699,SUSE-SLE-SERVER-12-SP2-2016-1699,SUSE-SUSE-Manager-Server-3.0-2016-1699 SKIP SUSE-OU-2016:2945-1 as SUSE-SLE-Module-Web-Scripting-12-2016-1725 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1725,SUSE-SLE-Module-Web-Scripting-12-2016-1725 SKIP SUSE-OU-2016:2956-1 as SUSE-SLE-SERVER-12-SP2-2016-1731 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1731,SUSE-SLE-SERVER-12-SP1-2016-1731,SUSE-SLE-SERVER-12-SP2-2016-1731 SKIP SUSE-OU-2016:2957-1 as slessp4-apache2-mod_wsgi-12865 is not security or has no CVEs. patches: slessp4-apache2-mod_wsgi-12865 SKIP SUSE-OU-2016:2972-1 as SUSE-SLE-SERVER-12-SP2-2016-1743 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2016-1743,SUSE-SLE-RPI-12-SP2-2016-1743,SUSE-SLE-SDK-12-SP1-2016-1743,SUSE-SLE-SDK-12-SP2-2016-1743,SUSE-SLE-SERVER-12-SP1-2016-1743,SUSE-SLE-SERVER-12-SP2-2016-1743 SKIP SUSE-OU-2016:3008-1 as SUSE-SLE-SAP-12-SP1-2016-1750 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1750 SKIP SUSE-OU-2016:3016-1 as SUSE-SLE-SERVER-12-SP1-2016-1756 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2016-1756,SUSE-SLE-SERVER-12-2016-1756,SUSE-SLE-SERVER-12-SP1-2016-1756 SKIP SUSE-OU-2016:3022-1 as SUSE-SLE-Manager-Tools-12-2016-1759 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1759 SKIP SUSE-OU-2016:3023-1 as SUSE-SLE-Module-Legacy-12-2016-1758 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1758 SKIP SUSE-OU-2016:3168-1 as SUSE-SLE-Module-Containers-12-2016-1832 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-1832 SKIP SUSE-OU-2016:3212-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1871 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1871 SKIP SUSE-OU-2016:3214-1 as slessp4-mailx-12904 is not security or has no CVEs. patches: secsp3-mailx-12904,sleclo50sp3-mailx-12904,sleman21-mailx-12904,slemap21-mailx-12904,sleposp3-mailx-12904,slessp3-mailx-12904,slessp4-mailx-12904 SKIP SUSE-OU-2016:3224-1 as slessp4-perl-Net-Crypt-SSLeay-12906 is not security or has no CVEs. patches: secsp3-perl-Net-Crypt-SSLeay-12906,slessp4-perl-Net-Crypt-SSLeay-12906 SKIP SUSE-OU-2016:3246-1 as SUSE-SLE-SERVER-12-SP2-2016-1890 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1890,SUSE-SLE-RPI-12-SP2-2016-1890,SUSE-SLE-SERVER-12-SP2-2016-1890 SKIP SUSE-OU-2016:3253-1 as SUSE-SLE-SDK-12-SP2-2016-1901 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1901,SUSE-SLE-Module-Public-Cloud-12-2016-1901,SUSE-SLE-Module-Web-Scripting-12-2016-1901,SUSE-SLE-SDK-12-SP2-2016-1901 SKIP SUSE-OU-2016:3266-1 as slessp4-libesmtp-12918 is not security or has no CVEs. patches: sdksp4-libesmtp-12918,secsp3-libesmtp-12918,sleclo50sp3-libesmtp-12918,sleman21-libesmtp-12918,slemap21-libesmtp-12918,sleposp3-libesmtp-12918,slessp3-libesmtp-12918,slessp4-libesmtp-12918 SKIP SUSE-OU-2016:3267-1 as SUSE-Storage-4-2016-1910 is not security or has no CVEs. patches: SUSE-Storage-4-2016-1910 SKIP SUSE-OU-2017:0014-1 as SUSE-SLE-Module-Web-Scripting-12-2017-7 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2017-7 SKIP SUSE-OU-2017:0335-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2017-170 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2017-170 SKIP SUSE-OU-2017:0349-1 as SUSE-SLE-Module-Public-Cloud-12-2017-180 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-180 SKIP SUSE-OU-2017:0377-1 as slesctsp4-supportutils-plugin-salt-12966 is not security or has no CVEs. patches: slesctsp3-supportutils-plugin-salt-12966,slesctsp4-supportutils-plugin-salt-12966 SKIP SUSE-OU-2017:0378-1 as SUSE-SUSE-Manager-Server-3.0-2017-190 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-190,SUSE-SUSE-Manager-Proxy-3.0-2017-190,SUSE-SUSE-Manager-Server-3.0-2017-190 SKIP SUSE-OU-2017:0516-1 as SUSE-SLE-Module-Public-Cloud-12-2017-266 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-266 SKIP SUSE-OU-2017:0706-1 as SUSE-SLE-SERVER-12-SP2-2017-387 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-387,SUSE-SLE-RPI-12-SP2-2017-387,SUSE-SLE-SDK-12-SP2-2017-387,SUSE-SLE-SERVER-12-SP2-2017-387 SKIP SUSE-OU-2017:0723-1 as SUSE-Storage-4-2017-400 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2017-400,SUSE-SLE-SDK-12-SP2-2017-400,SUSE-Storage-3-2017-400,SUSE-Storage-4-2017-400 SKIP SUSE-OU-2017:0724-1 as SUSE-SLE-Module-Public-Cloud-12-2017-401 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-401 SKIP SUSE-OU-2017:0730-1 as SUSE-SLE-HA-12-SP2-2017-402 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-402 SKIP SUSE-OU-2017:0911-1 as SUSE-SUSE-Manager-Server-3.0-2017-530 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-530 SKIP SUSE-OU-2017:1061-1 as SUSE-SLE-HA-12-SP2-2017-620 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-620 SKIP SUSE-OU-2017:1339-1 as SUSE-Storage-4-2017-813 is not security or has no CVEs. patches: SUSE-Storage-4-2017-813 SKIP SUSE-OU-2017:1377-1 as slestso13-openldap2-13122 is not security or has no CVEs. patches: slestso13-openldap2-13122 SKIP SUSE-OU-2017:1451-1 as SUSE-SLE-SDK-12-SP2-2017-884 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2017-884,SUSE-SLE-SDK-12-SP2-2017-884 SKIP SUSE-OU-2017:1463-1 as SUSE-SLE-Module-Public-Cloud-12-2017-893 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-893 SKIP SUSE-OU-2017:1463-2 as SUSE-SLE-Module-Public-Cloud-12-2017-893 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-893 SKIP SUSE-OU-2017:1464-1 as SUSE-SLE-SERVER-12-SP1-2017-900 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-900 SKIP SUSE-OU-2017:1691-1 as SUSE-SLE-SERVER-12-SP2-2017-1042 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1042,SUSE-SLE-SAP-12-2017-1042,SUSE-SLE-SAP-12-SP1-2017-1042,SUSE-SLE-SERVER-12-2017-1042,SUSE-SLE-SERVER-12-SP1-2017-1042,SUSE-SLE-SERVER-12-SP2-2017-1042 SKIP SUSE-OU-2017:1703-1 as SUSE-SLE-SERVER-12-SP2-2017-1051 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1051,SUSE-SLE-RPI-12-SP2-2017-1051,SUSE-SLE-SERVER-12-SP2-2017-1051 SKIP SUSE-OU-2017:1720-1 as slessp4-net-snmp-13183 is not security or has no CVEs. patches: sdksp4-net-snmp-13183,secsp3-net-snmp-13183,slessp4-net-snmp-13183 SKIP SUSE-OU-2017:1731-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1073 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1073,SUSE-SLE-Module-Public-Cloud-12-2017-1073 SKIP SUSE-OU-2017:1846-1 as SUSE-Storage-3-2017-1140 is not security or has no CVEs. patches: SUSE-Storage-3-2017-1140 SKIP SUSE-OU-2017:1892-1 as SUSE-SLE-SERVER-12-SP2-2017-1166 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1166,SUSE-SLE-SDK-12-SP2-2017-1166,SUSE-SLE-SERVER-12-SP2-2017-1166 SKIP SUSE-OU-2017:1952-1 as SUSE-SLE-SERVER-12-SP3-2017-1216 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1216,SUSE-SLE-SDK-12-SP2-2017-1216,SUSE-SLE-SDK-12-SP3-2017-1216,SUSE-SLE-SERVER-12-SP2-2017-1216,SUSE-SLE-SERVER-12-SP3-2017-1216 SKIP SUSE-OU-2017:1962-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1221 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1221 SKIP SUSE-OU-2017:2030-1 as SUSE-SLE-SDK-12-SP3-2017-1242 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1242,SUSE-SLE-SDK-12-SP3-2017-1242 SKIP SUSE-OU-2017:2104-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1308 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1308 ERROR: notice SUSE-OU-2017:2170-1 has no valid patches out of: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1333 SKIP SUSE-OU-2017:2228-1 as SUSE-SLE-Module-Web-Scripting-12-2017-1359 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2017-1359 SKIP SUSE-OU-2017:2230-1 as SUSE-OpenStack-Cloud-7-2017-1363 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1363 SKIP SUSE-OU-2017:2274-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1393 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1393 SKIP SUSE-OU-2017:2576-1 as SUSE-OpenStack-Cloud-7-2017-1595 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1595 SKIP SUSE-OU-2017:2599-1 as SUSE-OpenStack-Cloud-7-2017-1610 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1610 SKIP SUSE-OU-2017:2631-1 as SUSE-OpenStack-Cloud-7-2017-1621 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1621 SKIP SUSE-OU-2017:2643-1 as SUSE-SLE-SERVER-12-SP2-2017-1635 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1635,SUSE-SLE-SDK-12-SP2-2017-1635,SUSE-SLE-SERVER-12-SP2-2017-1635 SKIP SUSE-OU-2017:2669-1 as SUSE-SUSE-Manager-Server-3.1-2017-1657 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-1657 SKIP SUSE-OU-2017:2675-1 as SUSE-SUSE-Manager-Server-3.1-2017-1658 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-1658 SKIP SUSE-OU-2017:2746-1 as SUSE-SLE-Module-Containers-12-2017-1707 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2017-1707 SKIP SUSE-OU-2017:2852-1 as SUSE-SLE-SERVER-12-SP3-2017-1774 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1774,SUSE-SLE-DESKTOP-12-SP3-2017-1774,SUSE-SLE-SERVER-12-SP2-2017-1774,SUSE-SLE-SERVER-12-SP3-2017-1774 SKIP SUSE-OU-2017:2852-2 as SUSE-SLE-SERVER-12-SP5-2020-926 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP5-2020-926 SKIP SUSE-OU-2017:2867-1 as pubclsp3-cloud-netconfig-13329 is not security or has no CVEs. patches: pubclsp3-cloud-netconfig-13329 SKIP SUSE-OU-2017:2870-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1790 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1790 SKIP SUSE-OU-2017:2966-1 as slesctsp4-python-pyinotify-13341 is not security or has no CVEs. patches: slesctsp3-python-pyinotify-13341,slesctsp4-python-pyinotify-13341 SKIP SUSE-OU-2017:3174-1 as SUSE-SLE-SAP-12-SP3-2017-1978 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1978,SUSE-SLE-SAP-12-SP2-2017-1978,SUSE-SLE-SAP-12-SP3-2017-1978 SKIP SUSE-OU-2017:3224-1 as slesappsp4-sap-suse-cluster-connector-13367 is not security or has no CVEs. patches: slesappsp4-sap-suse-cluster-connector-13367 SKIP SUSE-OU-2018:0046-1 as SUSE-OpenStack-Cloud-7-2018-36 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-36 SKIP SUSE-OU-2018:0787-1 as SUSE-OpenStack-Cloud-7-2018-536 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-536 SKIP SUSE-OU-2018:0912-1 as SUSE-SLE-SERVER-12-2018-615 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-615 SKIP SUSE-OU-2018:0923-1 as SUSE-Storage-4-2018-620 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-620,SUSE-OpenStack-Cloud-7-2018-620,SUSE-SLE-SAP-12-SP1-2018-620,SUSE-SLE-SAP-12-SP2-2018-620,SUSE-SLE-SERVER-12-SP1-2018-620,SUSE-SLE-SERVER-12-SP2-2018-620,SUSE-SLE-SERVER-12-SP3-2018-620,SUSE-Storage-4-2018-620 SKIP SUSE-OU-2018:0923-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-620 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-620 SKIP SUSE-OU-2018:0924-1 as SUSE-Storage-4-2018-621 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-621,SUSE-SLE-SAP-12-SP2-2018-621,SUSE-SLE-SERVER-12-SP2-2018-621,SUSE-Storage-4-2018-621 SKIP SUSE-OU-2018:0958-1 as SUSE-Storage-4-2018-651 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-651,SUSE-OpenStack-Cloud-7-2018-651,SUSE-SLE-SAP-12-SP1-2018-651,SUSE-SLE-SAP-12-SP2-2018-651,SUSE-SLE-SERVER-12-2018-651,SUSE-SLE-SERVER-12-SP1-2018-651,SUSE-SLE-SERVER-12-SP2-2018-651,SUSE-SLE-SERVER-12-SP3-2018-651,SUSE-Storage-4-2018-651 SKIP SUSE-OU-2018:0958-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-651 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-651 SKIP SUSE-OU-2018:0978-1 as SUSE-Storage-4-2018-660 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-660,SUSE-OpenStack-Cloud-7-2018-660,SUSE-SLE-SAP-12-SP1-2018-660,SUSE-SLE-SAP-12-SP2-2018-660,SUSE-SLE-SERVER-12-SP1-2018-660,SUSE-SLE-SERVER-12-SP2-2018-660,SUSE-SLE-SERVER-12-SP3-2018-660,SUSE-Storage-4-2018-660 SKIP SUSE-OU-2018:0978-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-660 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-660 SKIP SUSE-OU-2018:0979-1 as SUSE-Storage-4-2018-661 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-661,SUSE-OpenStack-Cloud-7-2018-661,SUSE-SLE-Module-Public-Cloud-12-2018-661,SUSE-SLE-SAP-12-SP1-2018-661,SUSE-SLE-SAP-12-SP2-2018-661,SUSE-SLE-SERVER-12-2018-661,SUSE-SLE-SERVER-12-SP1-2018-661,SUSE-SLE-SERVER-12-SP2-2018-661,SUSE-SLE-SERVER-12-SP3-2018-661,SUSE-Storage-4-2018-661 SKIP SUSE-OU-2018:0979-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-661 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-661 SKIP SUSE-OU-2018:1017-1 as SUSE-Storage-4-2018-699 is not security or has no CVEs. patches: SUSE-Storage-4-2018-699 SKIP SUSE-OU-2018:1044-1 as SUSE-SLE-SERVER-12-2018-716 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-716 SKIP SUSE-OU-2018:1065-1 as SUSE-Storage-5-2018-727 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-727,SUSE-SLE-Module-Adv-Systems-Management-12-2018-727,SUSE-SUSE-Manager-Proxy-3.0-2018-727,SUSE-SUSE-Manager-Proxy-3.1-2018-727,SUSE-SUSE-Manager-Server-3.0-2018-727,SUSE-SUSE-Manager-Server-3.1-2018-727,SUSE-Storage-4-2018-727,SUSE-Storage-5-2018-727 SKIP SUSE-OU-2018:1067-1 as SUSE-SUSE-Manager-Server-3.0-2018-726 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-726,SUSE-SUSE-Manager-Server-3.0-2018-726 SKIP SUSE-OU-2018:1084-1 as SUSE-Storage-5-2018-743 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-743,SUSE-SLE-Module-Adv-Systems-Management-12-2018-743,SUSE-SLE-Module-Public-Cloud-12-2018-743,SUSE-SUSE-Manager-Proxy-3.0-2018-743,SUSE-SUSE-Manager-Proxy-3.1-2018-743,SUSE-SUSE-Manager-Server-3.0-2018-743,SUSE-SUSE-Manager-Server-3.1-2018-743,SUSE-Storage-4-2018-743,SUSE-Storage-5-2018-743 SKIP SUSE-OU-2018:1085-1 as SUSE-SLE-SERVER-12-SP1-2018-744 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-744,SUSE-SLE-SERVER-12-SP1-2018-744 SKIP SUSE-OU-2018:1145-1 as SUSE-Storage-5-2018-793 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2018-793,SUSE-SUSE-Manager-Proxy-3.0-2018-793,SUSE-SUSE-Manager-Proxy-3.1-2018-793,SUSE-SUSE-Manager-Server-3.0-2018-793,SUSE-SUSE-Manager-Server-3.1-2018-793,SUSE-Storage-5-2018-793 SKIP SUSE-OU-2018:1146-1 as SUSE-Storage-5-2018-794 is not security or has no CVEs. patches: SUSE-Storage-5-2018-794 SKIP SUSE-OU-2018:1156-1 as SUSE-Storage-5-2018-801 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-801,SUSE-SLE-Module-Adv-Systems-Management-12-2018-801,SUSE-SUSE-Manager-Proxy-3.1-2018-801,SUSE-SUSE-Manager-Server-3.1-2018-801,SUSE-Storage-5-2018-801 SKIP SUSE-OU-2018:1164-1 as SUSE-SUSE-Manager-Server-3.1-2018-806 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-806,SUSE-SLE-Module-Adv-Systems-Management-12-2018-806,SUSE-SLE-Module-Public-Cloud-12-2018-806,SUSE-SUSE-Manager-Proxy-3.0-2018-806,SUSE-SUSE-Manager-Proxy-3.1-2018-806,SUSE-SUSE-Manager-Server-3.0-2018-806,SUSE-SUSE-Manager-Server-3.1-2018-806 SKIP SUSE-OU-2018:1165-1 as SUSE-Storage-5-2018-807 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-807,SUSE-SUSE-Manager-Server-3.1-2018-807,SUSE-Storage-4-2018-807,SUSE-Storage-5-2018-807 SKIP SUSE-OU-2018:1166-1 as SUSE-SUSE-Manager-Server-3.0-2018-811 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-811,SUSE-SUSE-Manager-Server-3.0-2018-811 SKIP SUSE-OU-2018:1167-1 as SUSE-Storage-5-2018-810 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-810,SUSE-SLE-Module-Adv-Systems-Management-12-2018-810,SUSE-SLE-Module-Public-Cloud-12-2018-810,SUSE-SLE-SERVER-12-SP3-2018-810,SUSE-SUSE-Manager-Proxy-3.0-2018-810,SUSE-SUSE-Manager-Proxy-3.1-2018-810,SUSE-SUSE-Manager-Server-3.0-2018-810,SUSE-SUSE-Manager-Server-3.1-2018-810,SUSE-Storage-4-2018-810,SUSE-Storage-5-2018-810 SKIP SUSE-OU-2018:1168-1 as SUSE-SLE-SERVER-12-SP1-2018-812 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-812,SUSE-SLE-SAP-12-SP1-2018-812,SUSE-SLE-SERVER-12-2018-812,SUSE-SLE-SERVER-12-SP1-2018-812 SKIP SUSE-OU-2018:1169-1 as SUSE-SUSE-Manager-Server-3.0-2018-809 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-809,SUSE-SLE-Module-Adv-Systems-Management-12-2018-809,SUSE-SLE-Module-Public-Cloud-12-2018-809,SUSE-SUSE-Manager-Proxy-3.0-2018-809,SUSE-SUSE-Manager-Server-3.0-2018-809 ERROR: notice SUSE-OU-2018:1219-1 has no valid patches out of: SUSE-SLE-Manager-Tools-12-BETA-2018-843 SKIP SUSE-OU-2018:1282-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2018-904 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2018-904 SKIP SUSE-OU-2018:1297-1 as SUSE-OpenStack-Cloud-7-2018-918 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-918 SKIP SUSE-OU-2018:1299-1 as SUSE-Storage-4-2018-920 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-920,SUSE-OpenStack-Cloud-7-2018-920,SUSE-SLE-Module-Public-Cloud-12-2018-920,SUSE-SLE-SAP-12-SP1-2018-920,SUSE-SLE-SAP-12-SP2-2018-920,SUSE-SLE-SERVER-12-SP1-2018-920,SUSE-SLE-SERVER-12-SP2-2018-920,SUSE-SLE-SERVER-12-SP3-2018-920,SUSE-Storage-4-2018-920 SKIP SUSE-OU-2018:1299-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-920 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-920 SKIP SUSE-OU-2018:1300-1 as SUSE-Storage-4-2018-921 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-921,SUSE-SLE-SERVER-12-SP2-2018-921,SUSE-SLE-SERVER-12-SP3-2018-921,SUSE-Storage-4-2018-921 SKIP SUSE-OU-2018:1300-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-921 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-921 SKIP SUSE-OU-2018:1301-1 as SUSE-Storage-4-2018-919 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-919,SUSE-SLE-Module-Adv-Systems-Management-12-2018-919,SUSE-SUSE-Manager-Proxy-3.0-2018-919,SUSE-SUSE-Manager-Proxy-3.1-2018-919,SUSE-SUSE-Manager-Server-3.0-2018-919,SUSE-SUSE-Manager-Server-3.1-2018-919,SUSE-Storage-4-2018-919 SKIP SUSE-OU-2018:1305-1 as SUSE-Storage-4-2018-925 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-925,SUSE-OpenStack-Cloud-7-2018-925,SUSE-SLE-Manager-Tools-12-2018-925,SUSE-SLE-Module-Adv-Systems-Management-12-2018-925,SUSE-SLE-Module-Public-Cloud-12-2018-925,SUSE-SLE-SAP-12-SP1-2018-925,SUSE-SLE-SAP-12-SP2-2018-925,SUSE-SLE-SERVER-12-SP1-2018-925,SUSE-SLE-SERVER-12-SP2-2018-925,SUSE-SLE-SERVER-12-SP3-2018-925,SUSE-Storage-4-2018-925 SKIP SUSE-OU-2018:1305-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-925 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-925 ERROR: notice SUSE-OU-2018:1580-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-791 SKIP SUSE-OU-2018:1746-1 as SUSE-SUSE-Manager-Server-3.1-2018-1166 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1166,SUSE-SUSE-Manager-Server-3.1-2018-1166 SKIP SUSE-OU-2018:1750-1 as SUSE-SUSE-Manager-Server-3.1-2018-1163 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-1163,SUSE-SUSE-Manager-Server-3.1-2018-1163 SKIP SUSE-OU-2018:1750-2 as SUSE-SLE-Module-Public-Cloud-12-2020-799 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-LTSS-2020-799,SUSE-OpenStack-Cloud-7-2020-799,SUSE-SLE-Module-Containers-12-2020-799,SUSE-SLE-Module-Public-Cloud-12-2020-799 SKIP SUSE-OU-2018:2005-1 as SUSE-SLE-SAP-12-SP3-2018-1363 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-1363 SKIP SUSE-OU-2018:2334-1 as SUSE-Storage-4-2018-1579 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1579,SUSE-SLE-SAP-12-SP1-2018-1579,SUSE-SLE-SAP-12-SP2-2018-1579,SUSE-SLE-SERVER-12-2018-1579,SUSE-SLE-SERVER-12-SP1-2018-1579,SUSE-SLE-SERVER-12-SP2-2018-1579,SUSE-SLE-SERVER-12-SP3-2018-1579,SUSE-Storage-4-2018-1579 SKIP SUSE-OU-2018:2334-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1579 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1579 SKIP SUSE-OU-2018:2454-1 as SUSE-SLE-DESKTOP-12-SP3-2018-1703 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1703 SKIP SUSE-OU-2018:2822-1 as SUSE-SLE-HA-12-SP3-2018-1973 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-1973,SUSE-SLE-HA-12-SP3-2018-1973 SKIP SUSE-OU-2018:2945-1 as SUSE-Storage-5-2018-2081 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2081 SKIP SUSE-OU-2018:3022-1 as slehasp4-rear23a-13808 is not security or has no CVEs. patches: slehasp4-rear23a-13808 SKIP SUSE-OU-2018:3113-1 as SUSE-OpenStack-Cloud-7-2018-2210 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2210 SKIP SUSE-OU-2018:3147-1 as SUSE-OpenStack-Cloud-8-2018-2225 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-2225,SUSE-OpenStack-Cloud-8-2018-2225 SKIP SUSE-OU-2018:3251-1 as SUSE-SUSE-Manager-Server-3.2-2018-2325 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-2325 SKIP SUSE-OU-2018:3257-1 as SUSE-SLE-Manager-Tools-12-2018-2336 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2336 SKIP SUSE-OU-2018:3305-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2377 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2377 SKIP SUSE-OU-2018:3313-1 as SUSE-SUSE-Manager-Server-3.2-2018-2380 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-2380 SKIP SUSE-OU-2018:3403-1 as SUSE-SLE-Manager-Tools-15-2018-2441 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-15-2018-2441 ERROR: notice SUSE-OU-2018:3433-1 has no valid patches out of: SUSE-SLE-Module-Public-Cloud-12-2018-2450 SKIP SUSE-OU-2018:3503-1 as SUSE-SLE-DESKTOP-12-SP3-2018-2503 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2503 SKIP SUSE-OU-2018:3550-1 as SUSE-SLE-Manager-Tools-12-2018-2521 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2521 SKIP SUSE-OU-2018:3552-1 as SUSE-SUSE-Manager-Server-3.2-2018-2522 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-2522 ERROR: notice SUSE-OU-2018:3564-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1727,SUSE-SLE-SERVER-12-SP4-2018-1727 SKIP SUSE-OU-2018:3907-1 as SUSE-SUSE-Manager-Server-3.2-2018-2776 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-2776 ERROR: notice SUSE-OU-2019:0884-1 has no valid patches out of: SUSE-2019-884,SUSE-SLE-Manager-Tools-15-BETA-2019-884 ERROR: notice SUSE-OU-2019:0918-1 has no valid patches out of: SUSE-2019-918,SUSE-SLE-Manager-Tools-15-BETA-2019-918 ERROR: notice SUSE-OU-2019:13964-1 has no valid patches out of: suse-ubu164ct-salt-201902-13964 ERROR: notice SUSE-OU-2019:13965-1 has no valid patches out of: suse-ubu184ct-salt-201902-13965 SKIP SUSE-OU-2019:1435-1 as SUSE-SLE-SERVER-12-SP4-2019-1435 is not security or has no CVEs. patches: SUSE-2019-1435,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1435,SUSE-SLE-DESKTOP-12-SP3-2019-1435,SUSE-SLE-DESKTOP-12-SP4-2019-1435,SUSE-SLE-SDK-12-SP3-2019-1435,SUSE-SLE-SDK-12-SP4-2019-1435,SUSE-SLE-SERVER-12-SP3-2019-1435,SUSE-SLE-SERVER-12-SP4-2019-1435 ERROR: notice SUSE-OU-2019:1793-1 has no valid patches out of: SUSE-2019-1793,SUSE-SLE-DESKTOP-12-SP5-2019-1793,SUSE-SLE-SERVER-12-SP5-2019-1793 ERROR: notice SUSE-OU-2019:1837-1 has no valid patches out of: SUSE-2019-1837,SUSE-SLE-DESKTOP-12-SP5-2019-1837,SUSE-SLE-SERVER-12-SP5-2019-1837 SKIP SUSE-OU-2019:2057-1 as SUSE-SLE-SERVER-12-SP4-2019-2057 is not security or has no CVEs. patches: SUSE-2019-2057,SUSE-SLE-DESKTOP-12-SP4-2019-2057,SUSE-SLE-SERVER-12-SP4-2019-2057 SKIP SUSE-OU-2019:2121-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2121 is not security or has no CVEs. patches: SUSE-2019-2121,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2121 SKIP SUSE-OU-2019:2190-1 as SUSE-Storage-6-2019-2190 is not security or has no CVEs. patches: SUSE-2019-2190,SUSE-Storage-6-2019-2190 SKIP SUSE-OU-2019:2483-1 as SUSE-SLE-Product-WE-15-SP1-2019-2483 is not security or has no CVEs. patches: SUSE-2019-2483,SUSE-SLE-Module-Basesystem-15-SP1-2019-2483,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2483,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2483,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2483,SUSE-SLE-Module-Public-Cloud-15-2019-2483,SUSE-SLE-Product-WE-15-2019-2483,SUSE-SLE-Product-WE-15-SP1-2019-2483 SKIP SUSE-OU-2019:2489-1 as SUSE-Storage-6-2019-2489 is not security or has no CVEs. patches: SUSE-2019-2489,SUSE-Storage-6-2019-2489 SKIP SUSE-OU-2019:2496-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2496 is not security or has no CVEs. patches: SUSE-2019-2496,SUSE-SLE-Module-Basesystem-15-SP1-2019-2496 SKIP SUSE-OU-2019:2497-1 as SUSE-SLE-Module-Basesystem-15-2019-2497 is not security or has no CVEs. patches: SUSE-2019-2497,SUSE-SLE-Module-Basesystem-15-2019-2497 SKIP SUSE-OU-2019:2979-1 as SUSE-SLE-SERVER-12-SP4-2019-2979 is not security or has no CVEs. patches: SUSE-2019-2979,SUSE-SLE-DESKTOP-12-SP4-2019-2979,SUSE-SLE-SDK-12-SP4-2019-2979,SUSE-SLE-SERVER-12-SP4-2019-2979 SKIP SUSE-OU-2019:2980-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2980 is not security or has no CVEs. patches: SUSE-2019-2980,SUSE-SLE-Module-Basesystem-15-2019-2980,SUSE-SLE-Module-Basesystem-15-SP1-2019-2980,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2980,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2980 SKIP SUSE-OU-2019:3345-1 as SUSE-SLE-Module-Containers-15-SP1-2019-3345 is not security or has no CVEs. patches: SUSE-2019-3345,SUSE-SLE-Module-Containers-15-2019-3345,SUSE-SLE-Module-Containers-15-SP1-2019-3345 SKIP SUSE-OU-2019:3346-1 as SUSE-SLE-Module-Containers-12-2019-3346 is not security or has no CVEs. patches: SUSE-2019-3346,SUSE-SLE-Module-Containers-12-2019-3346 SKIP SUSE-OU-2020:0052-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-52 is not security or has no CVEs. patches: SUSE-2020-52,SUSE-SLE-Module-Basesystem-15-2020-52,SUSE-SLE-Module-Basesystem-15-SP1-2020-52,SUSE-SLE-Module-Server-Applications-15-2020-52,SUSE-SLE-Module-Server-Applications-15-SP1-2020-52 SKIP SUSE-OU-2020:0074-1 as SUSE-SLE-Module-Basesystem-15-2020-74 is not security or has no CVEs. patches: SUSE-2020-74,SUSE-SLE-Module-Basesystem-15-2020-74 SKIP SUSE-OU-2020:0097-1 as SUSE-SLE-Module-Basesystem-15-2020-97 is not security or has no CVEs. patches: SUSE-2020-97,SUSE-SLE-Module-Basesystem-15-2020-97 SKIP SUSE-OU-2020:0808-1 as SUSE-Storage-6-2020-808 is not security or has no CVEs. patches: SUSE-2020-808,SUSE-Storage-6-2020-808 SKIP SUSE-OU-2020:1076-1 as SUSE-2020-1076 is not security or has no CVEs. patches: SUSE-2020-1076,SUSE-SLE-Module-Basesystem-15-SP2-2020-1076,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1076 SKIP SUSE-OU-2020:1260-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1260 is not security or has no CVEs. patches: SUSE-2020-1260,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1260 SKIP SUSE-OU-2020:14583-1 as slessp4-vsftpd-14583 is not security or has no CVEs. patches: secsp3-vsftpd-14583,sleposp3-vsftpd-14583,slessp4-vsftpd-14583 SKIP SUSE-OU-2020:1519-1 as SUSE-SLE-SERVER-12-SP5-2020-1519 is not security or has no CVEs. patches: SUSE-2020-1519,SUSE-SLE-SERVER-12-SP5-2020-1519 SKIP SUSE-OU-2020:1527-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1527 is not security or has no CVEs. patches: SUSE-2020-1527,SUSE-SLE-Module-Basesystem-15-SP1-2020-1527,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1527 SKIP SUSE-OU-2020:1527-2 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1527 is not security or has no CVEs. patches: SUSE-2020-1527,SUSE-SLE-Module-Basesystem-15-SP2-2020-1527,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1527 SKIP SUSE-OU-2020:1627-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1627 is not security or has no CVEs. patches: SUSE-2020-1627,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1627 SKIP SUSE-OU-2020:1627-2 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1627 is not security or has no CVEs. patches: SUSE-2020-1627,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1627,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1627,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1627 SKIP SUSE-OU-2020:1674-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1674 is not security or has no CVEs. patches: SUSE-2020-1674,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1674 SKIP SUSE-OU-2020:1674-2 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1674 is not security or has no CVEs. patches: SUSE-2020-1674,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1674 SKIP SUSE-OU-2020:1675-1 as SUSE-SLE-SAP-12-SP5-2020-1675 is not security or has no CVEs. patches: SUSE-2020-1675,SUSE-SLE-SAP-12-SP3-2020-1675,SUSE-SLE-SAP-12-SP4-2020-1675,SUSE-SLE-SAP-12-SP5-2020-1675 SKIP SUSE-OU-2020:1676-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1676 is not security or has no CVEs. patches: SUSE-2020-1676,SUSE-SLE-Module-SAP-Applications-15-2020-1676,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1676 SKIP SUSE-OU-2020:1787-1 as SUSE-Storage-6-2020-1787 is not security or has no CVEs. patches: SUSE-2020-1787,SUSE-SLE-Module-HPC-15-SP1-2020-1787,SUSE-Storage-6-2020-1787 SKIP SUSE-OU-2020:1787-2 as SUSE-SLE-Module-HPC-15-SP2-2020-1787 is not security or has no CVEs. patches: SUSE-2020-1787,SUSE-SLE-Module-HPC-15-SP2-2020-1787 SKIP SUSE-OU-2020:1894-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1894 is not security or has no CVEs. patches: SUSE-2020-1894,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1894,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1894 SKIP SUSE-OU-2020:1911-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-1911 is not security or has no CVEs. patches: SUSE-2020-1911,SUSE-OpenStack-Cloud-9-2020-1911,SUSE-OpenStack-Cloud-Crowbar-9-2020-1911,SUSE-SLE-SAP-12-SP4-2020-1911,SUSE-SLE-SERVER-12-SP4-LTSS-2020-1911 SKIP SUSE-OU-2020:2087-1 as SUSE-SLE-POS-12-SP2-2020-2087 is not security or has no CVEs. patches: SUSE-2020-2087,SUSE-SLE-POS-12-SP2-2020-2087 SKIP SUSE-OU-2020:2135-1 as SUSE-SLE-SERVER-12-SP5-2020-2135 is not security or has no CVEs. patches: SUSE-2020-2135,SUSE-OpenStack-Cloud-7-2020-2135,SUSE-SLE-Module-Containers-12-2020-2135,SUSE-SLE-Module-Public-Cloud-12-2020-2135,SUSE-SLE-SDK-12-SP5-2020-2135,SUSE-SLE-SERVER-12-SP5-2020-2135 SKIP SUSE-OU-2020:2193-1 as SUSE-SLE-SERVER-12-SP5-2020-2193 is not security or has no CVEs. patches: SUSE-2020-2193,SUSE-SLE-Module-Public-Cloud-12-2020-2193,SUSE-SLE-SERVER-12-SP5-2020-2193 SKIP SUSE-OU-2020:2291-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2291 is not security or has no CVEs. patches: SUSE-2020-2291,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2291 SKIP SUSE-OU-2020:2291-2 as SUSE-SLE-Product-RT-15-SP2-2022-538 is not security or has no CVEs. patches: SUSE-2020-2291,SUSE-SLE-Product-RT-15-SP2-2022-538 SKIP SUSE-OU-2020:2550-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2550 is not security or has no CVEs. patches: SUSE-2020-2550,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2550,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2550 SKIP SUSE-OU-2020:2551-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2551 is not security or has no CVEs. patches: SUSE-2020-2551,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2551 SKIP SUSE-OU-2020:2568-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2568 is not security or has no CVEs. patches: SUSE-2020-2568,SUSE-SLE-Module-SAP-Applications-15-2020-2568,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2568,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2568 SKIP SUSE-OU-2020:2620-1 as SUSE-SLE-SERVER-12-SP5-2020-2620 is not security or has no CVEs. patches: SUSE-2020-2620,SUSE-SLE-SERVER-12-SP5-2020-2620 SKIP SUSE-OU-2020:2671-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2671 is not security or has no CVEs. patches: SUSE-2020-2671,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2671 SKIP SUSE-OU-2020:2758-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2758 is not security or has no CVEs. patches: SUSE-2020-2758,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2758,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2758 SKIP SUSE-OU-2020:2797-1 as SUSE-SLE-SAP-12-SP5-2020-2797 is not security or has no CVEs. patches: SUSE-2020-2797,SUSE-SLE-SAP-12-SP3-2020-2797,SUSE-SLE-SAP-12-SP4-2020-2797,SUSE-SLE-SAP-12-SP5-2020-2797 SKIP SUSE-OU-2020:2811-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2811 is not security or has no CVEs. patches: SUSE-2020-2811,SUSE-SLE-Module-SAP-Applications-15-2020-2811,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2811,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2811 SKIP SUSE-OU-2020:2891-1 as SUSE-SLE-Module-RT-15-SP2-2020-2891 is not security or has no CVEs. patches: SUSE-2020-2891,SUSE-SLE-Module-RT-15-SP2-2020-2891 SKIP SUSE-OU-2020:3026-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3026 is not security or has no CVEs. patches: SUSE-2020-3026,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3026,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3026,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3026,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3026,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3026,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3026 SKIP SUSE-OU-2020:3471-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3471 is not security or has no CVEs. patches: SUSE-2020-3471,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3471,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3471 SKIP SUSE-OU-2020:3481-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3481 is not security or has no CVEs. patches: SUSE-2020-3481,SUSE-SLE-Module-Basesystem-15-SP1-2020-3481,SUSE-SLE-Module-Basesystem-15-SP2-2020-3481,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3481,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3481 SKIP SUSE-OU-2020:3495-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3495 is not security or has no CVEs. patches: SUSE-2020-3495,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3495,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3495 SKIP SUSE-OU-2020:3499-1 as SUSE-SLE-Module-Public-Cloud-12-2020-3499 is not security or has no CVEs. patches: SUSE-2020-3499,SUSE-SLE-Module-Public-Cloud-12-2020-3499 SKIP SUSE-OU-2020:3561-1 as SUSE-SLE-Module-Containers-15-SP2-2020-3561 is not security or has no CVEs. patches: SUSE-2020-3561,SUSE-SLE-Module-Containers-15-SP2-2020-3561 SKIP SUSE-OU-2020:3795-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3795 is not security or has no CVEs. patches: SUSE-2020-3795,SUSE-SLE-Module-Basesystem-15-SP1-2020-3795,SUSE-SLE-Module-Basesystem-15-SP2-2020-3795 ERROR: notice SUSE-OU-2020:3829-1 has no valid patches out of: SUSE-2020-3829,SUSE-SLE-Module-Basesystem-15-SP3-2020-3829 SKIP SUSE-OU-2020:3835-1 as SUSE-SLE-SERVER-12-SP5-2020-3835 is not security or has no CVEs. patches: SUSE-2020-3835,SUSE-SLE-SERVER-12-SP5-2020-3835 SKIP SUSE-OU-2020:3870-1 as SUSE-SLE-Module-HPC-15-SP2-2020-3870 is not security or has no CVEs. patches: SUSE-2020-3870,SUSE-SLE-Module-Basesystem-15-SP2-2020-3870,SUSE-SLE-Module-HPC-15-SP2-2020-3870 SKIP SUSE-OU-2020:3906-1 as SUSE-SLE-Module-HPC-15-SP2-2020-3906 is not security or has no CVEs. patches: SUSE-2020-3906,SUSE-SLE-Module-HPC-15-SP2-2020-3906 SKIP SUSE-OU-2021:0339-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-339 is not security or has no CVEs. patches: SUSE-2021-339,SUSE-SLE-Module-Basesystem-15-SP2-2021-339,SUSE-SLE-Module-Development-Tools-15-SP2-2021-339 SKIP SUSE-OU-2021:0422-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-422 is not security or has no CVEs. patches: SUSE-2021-422,SUSE-SLE-Module-Basesystem-15-SP2-2021-422,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-422 SKIP SUSE-OU-2021:0441-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2021-441 is not security or has no CVEs. patches: SUSE-2021-441,SUSE-SLE-Module-Basesystem-15-SP2-2021-441,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-441,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-441 SKIP SUSE-OU-2021:0576-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-576 is not security or has no CVEs. patches: SUSE-2021-576,SUSE-SLE-Module-Basesystem-15-SP2-2021-576,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-576 SKIP SUSE-OU-2021:0582-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-582 is not security or has no CVEs. patches: SUSE-2021-582,SUSE-SLE-Module-Basesystem-15-SP2-2021-582,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-582 SKIP SUSE-OU-2021:0612-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-612 is not security or has no CVEs. patches: SUSE-2021-612,SUSE-SLE-Module-Basesystem-15-SP2-2021-612 SKIP SUSE-OU-2021:0979-1 as SUSE-SLE-WE-12-SP5-2021-979 is not security or has no CVEs. patches: SUSE-2021-979,SUSE-SLE-SDK-12-SP5-2021-979,SUSE-SLE-SERVER-12-SP5-2021-979,SUSE-SLE-WE-12-SP5-2021-979 SKIP SUSE-OU-2021:1296-1 as SUSE-SUSE-MicroOS-5.0-2021-1296 is not security or has no CVEs. patches: SUSE-2021-1296,SUSE-SLE-Module-Basesystem-15-SP2-2021-1296,SUSE-SUSE-MicroOS-5.0-2021-1296 SKIP SUSE-OU-2021:1299-1 as SUSE-SUSE-MicroOS-5.0-2021-1299 is not security or has no CVEs. patches: SUSE-2021-1299,SUSE-SLE-Module-Basesystem-15-SP2-2021-1299,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1299,SUSE-SUSE-MicroOS-5.0-2021-1299 SKIP SUSE-OU-2021:1425-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1425 is not security or has no CVEs. patches: SUSE-2021-1425,SUSE-SLE-Module-Basesystem-15-SP2-2021-1425 SKIP SUSE-OU-2021:1515-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1515 is not security or has no CVEs. patches: SUSE-2021-1515,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1515 SKIP SUSE-OU-2021:1518-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1518 is not security or has no CVEs. patches: SUSE-2021-1518,SUSE-SLE-Module-Basesystem-15-SP2-2021-1518,SUSE-SLE-Module-Legacy-15-SP3-2021-1518,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1518 SKIP SUSE-OU-2021:1591-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1591 is not security or has no CVEs. patches: SUSE-2021-1591,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1591 SKIP SUSE-OU-2021:1591-2 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1591 is not security or has no CVEs. patches: SUSE-2021-1591,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1591 SKIP SUSE-OU-2021:1592-1 as SUSE-SUSE-MicroOS-5.0-2021-1592 is not security or has no CVEs. patches: SUSE-2021-1592,SUSE-SLE-Module-Basesystem-15-SP2-2021-1592,SUSE-SUSE-MicroOS-5.0-2021-1592 SKIP SUSE-OU-2021:1847-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1847 is not security or has no CVEs. patches: SUSE-2021-1847,SUSE-SLE-Module-Basesystem-15-SP2-2021-1847,SUSE-SLE-Module-Basesystem-15-SP3-2021-1847,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1847,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1847 SKIP SUSE-OU-2021:2090-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2090 is not security or has no CVEs. patches: SUSE-2021-2090,SUSE-SLE-Module-Basesystem-15-SP2-2021-2090,SUSE-SLE-Module-Basesystem-15-SP3-2021-2090 SKIP SUSE-OU-2021:2248-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2248 is not security or has no CVEs. patches: SUSE-2021-2248,SUSE-SLE-Module-Basesystem-15-SP2-2021-2248,SUSE-SLE-Module-Basesystem-15-SP3-2021-2248,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2248,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2248 SKIP SUSE-OU-2021:2249-1 as SUSE-SUSE-MicroOS-5.0-2021-2249 is not security or has no CVEs. patches: SUSE-2021-2249,SUSE-SLE-Module-Basesystem-15-SP2-2021-2249,SUSE-SLE-Module-Basesystem-15-SP3-2021-2249,SUSE-SUSE-MicroOS-5.0-2021-2249 SKIP SUSE-OU-2021:2390-1 as SUSE-SLE-Module-Public-Cloud-12-2021-2390 is not security or has no CVEs. patches: SUSE-2021-2390,SUSE-SLE-Module-Public-Cloud-12-2021-2390 SKIP SUSE-OU-2021:2816-1 as SUSE-Storage-6-2021-2816 is not security or has no CVEs. patches: SUSE-2021-2816,SUSE-SLE-Module-Basesystem-15-SP2-2021-2816,SUSE-SLE-Module-Basesystem-15-SP3-2021-2816,SUSE-SLE-Module-Containers-15-SP2-2021-2816,SUSE-SLE-Module-Containers-15-SP3-2021-2816,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2816,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2816,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-2816,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2816,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2816,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-2816,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2816,SUSE-Storage-6-2021-2816 SKIP SUSE-OU-2021:3145-1 as SUSE-SLE-Module-Containers-15-SP3-2021-3145 is not security or has no CVEs. patches: SUSE-2021-3145,SUSE-SLE-Module-Containers-15-SP3-2021-3145 SKIP SUSE-OU-2021:3146-1 as SUSE-SLE-Module-Containers-15-SP3-2021-3146 is not security or has no CVEs. patches: SUSE-2021-3146,SUSE-SLE-Module-Containers-15-SP3-2021-3146 SKIP SUSE-OU-2021:3327-1 as SUSE-SUSE-MicroOS-5.1-2021-3327 is not security or has no CVEs. patches: SUSE-2021-3327,SUSE-SLE-Module-Basesystem-15-SP3-2021-3327,SUSE-SUSE-MicroOS-5.1-2021-3327 SKIP SUSE-OU-2021:3819-1 as SUSE-SLE-SERVER-12-SP5-2021-3819 is not security or has no CVEs. patches: SUSE-2021-3819,SUSE-SLE-SDK-12-SP5-2021-3819,SUSE-SLE-SERVER-12-SP5-2021-3819 SKIP SUSE-OU-2021:4162-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-4162 is not security or has no CVEs. patches: SUSE-2021-4162,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-4162,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-4162,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-4162 ERROR: notice SUSE-OU-2022:0276-1 has no valid patches out of: SUSE-2022-276,SUSE-SLE-Module-Basesystem-15-SP4-2022-276 SKIP SUSE-OU-2022:0752-1 as SUSE-SLE-Product-WE-15-SP3-2022-752 is not security or has no CVEs. patches: SUSE-2022-752,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-752,SUSE-SLE-Product-WE-15-SP3-2022-752 SKIP SUSE-OU-2022:0781-1 as SUSE-SLE-Product-WE-15-SP3-2022-781 is not security or has no CVEs. patches: SUSE-2022-781,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-781,SUSE-SLE-Product-WE-15-SP3-2022-781 SKIP SUSE-OU-2022:0885-1 as SUSE-SLE-Product-WE-15-SP3-2022-885 is not security or has no CVEs. patches: SUSE-2022-885,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-885,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-885,SUSE-SLE-Product-RT-15-SP2-2022-885,SUSE-SLE-Product-WE-15-SP3-2022-885 SKIP SUSE-OU-2022:0902-1 as SUSE-SLE-Product-WE-15-SP3-2022-902 is not security or has no CVEs. patches: SUSE-2022-902,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-902,SUSE-SLE-Product-WE-15-SP3-2022-902 ERROR: notice SUSE-OU-2022:0922-1 has no valid patches out of: SUSE-2022-922,SUSE-SLE-Module-Basesystem-15-SP4-2022-922 SKIP SUSE-OU-2022:1116-1 as SUSE-SLE-Product-WE-15-SP3-2022-1116 is not security or has no CVEs. patches: SUSE-2022-1116,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1116,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1116,SUSE-SLE-Product-WE-15-SP3-2022-1116,SUSE-SLE-Product-WE-15-SP4-2022-1116 SKIP SUSE-OU-2022:1134-1 as SUSE-SLE-Product-WE-15-SP3-2022-1134 is not security or has no CVEs. patches: SUSE-2022-1134,SUSE-SLE-Module-Basesystem-15-SP3-2022-1134,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1134,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1134,SUSE-SLE-Product-RT-15-SP2-2022-1134,SUSE-SLE-Product-WE-15-SP3-2022-1134 SKIP SUSE-OU-2022:1134-2 as SUSE-SUSE-MicroOS-5.2-2022-1134 is not security or has no CVEs. patches: SUSE-2022-1134,SUSE-SUSE-MicroOS-5.2-2022-1134 SKIP SUSE-OU-2022:1298-1 as openSUSE-SLE-15.3-2022-1298 is not security or has no CVEs. patches: SUSE-2022-1298,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1298,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1298,SUSE-SLE-Product-WE-15-SP3-2022-1298,SUSE-SLE-Product-WE-15-SP4-2022-1298,openSUSE-SLE-15.3-2022-1298,openSUSE-SLE-15.4-2022-1298 SKIP SUSE-OU-2022:1317-1 as openSUSE-SLE-15.3-2022-1317 is not security or has no CVEs. patches: SUSE-2022-1317,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1317,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1317,SUSE-SLE-Product-RT-15-SP2-2022-1317,openSUSE-SLE-15.3-2022-1317,openSUSE-SLE-15.4-2022-1317 SKIP SUSE-OU-2022:1492-1 as openSUSE-SLE-15.4-2022-1492 is not security or has no CVEs. patches: SUSE-2022-1492,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1492,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1492,SUSE-SLE-Product-WE-15-SP3-2022-1492,SUSE-SLE-Product-WE-15-SP4-2022-1492,openSUSE-SLE-15.3-2022-1492,openSUSE-SLE-15.4-2022-1492 SKIP SUSE-OU-2022:1493-1 as openSUSE-SLE-15.4-2022-1493 is not security or has no CVEs. patches: SUSE-2022-1493,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1493,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1493,SUSE-SLE-Product-WE-15-SP3-2022-1493,SUSE-SLE-Product-WE-15-SP4-2022-1493,openSUSE-SLE-15.3-2022-1493,openSUSE-SLE-15.4-2022-1493 SKIP SUSE-OU-2022:1494-1 as openSUSE-SLE-15.4-2022-1494 is not security or has no CVEs. patches: SUSE-2022-1494,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1494,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1494,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1494,SUSE-SLE-Product-RT-15-SP2-2022-1494,SUSE-SLE-Product-WE-15-SP3-2022-1494,SUSE-SLE-Product-WE-15-SP4-2022-1494,openSUSE-SLE-15.3-2022-1494,openSUSE-SLE-15.4-2022-1494 SKIP SUSE-OU-2022:1553-1 as openSUSE-SLE-15.4-2022-1553 is not security or has no CVEs. patches: SUSE-2022-1553,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1553,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1553,SUSE-SLE-Product-WE-15-SP3-2022-1553,SUSE-SLE-Product-WE-15-SP4-2022-1553,openSUSE-SLE-15.3-2022-1553,openSUSE-SLE-15.4-2022-1553 SKIP SUSE-OU-2022:1554-1 as openSUSE-SLE-15.4-2022-1554 is not security or has no CVEs. patches: SUSE-2022-1554,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1554,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1554,SUSE-SLE-Product-RT-15-SP2-2022-1554,SUSE-SLE-Product-WE-15-SP3-2022-1554,openSUSE-SLE-15.3-2022-1554,openSUSE-SLE-15.4-2022-1554 SKIP SUSE-OU-2022:1594-1 as openSUSE-SLE-15.4-2022-1594 is not security or has no CVEs. patches: SUSE-2022-1594,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1594,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1594,SUSE-SLE-Product-WE-15-SP3-2022-1594,SUSE-SLE-Product-WE-15-SP4-2022-1594,openSUSE-SLE-15.3-2022-1594,openSUSE-SLE-15.4-2022-1594 SKIP SUSE-OU-2022:1663-1 as openSUSE-SLE-15.4-2022-1663 is not security or has no CVEs. patches: SUSE-2022-1663,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1663,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1663,SUSE-SLE-Product-WE-15-SP3-2022-1663,SUSE-SLE-Product-WE-15-SP4-2022-1663,openSUSE-SLE-15.3-2022-1663,openSUSE-SLE-15.4-2022-1663 SKIP SUSE-OU-2022:1705-1 as openSUSE-SLE-15.3-2022-1705 is not security or has no CVEs. patches: SUSE-2022-1705,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1705,SUSE-SLE-Product-WE-15-SP3-2022-1705,openSUSE-SLE-15.3-2022-1705 SKIP SUSE-OU-2022:1706-1 as openSUSE-SLE-15.4-2022-1706 is not security or has no CVEs. patches: SUSE-2022-1706,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1706,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1706,SUSE-SLE-Product-WE-15-SP3-2022-1706,SUSE-SLE-Product-WE-15-SP4-2022-1706,openSUSE-SLE-15.3-2022-1706,openSUSE-SLE-15.4-2022-1706 SKIP SUSE-OU-2022:1712-1 as openSUSE-SLE-15.4-2022-1712 is not security or has no CVEs. patches: SUSE-2022-1712,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1712,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1712,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1712,SUSE-SLE-Product-WE-15-SP3-2022-1712,SUSE-SLE-Product-WE-15-SP4-2022-1712,openSUSE-SLE-15.3-2022-1712,openSUSE-SLE-15.4-2022-1712 SKIP SUSE-OU-2022:1734-1 as openSUSE-SLE-15.4-2022-1734 is not security or has no CVEs. patches: SUSE-2022-1734,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1734,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1734,SUSE-SLE-Product-WE-15-SP3-2022-1734,SUSE-SLE-Product-WE-15-SP4-2022-1734,openSUSE-SLE-15.3-2022-1734,openSUSE-SLE-15.4-2022-1734 SKIP SUSE-OU-2022:1735-1 as openSUSE-SLE-15.3-2022-1735 is not security or has no CVEs. patches: SUSE-2022-1735,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1735,SUSE-SLE-Product-WE-15-SP3-2022-1735,openSUSE-SLE-15.3-2022-1735 SKIP SUSE-OU-2022:1736-1 as openSUSE-SLE-15.4-2022-1736 is not security or has no CVEs. patches: SUSE-2022-1736,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1736,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1736,SUSE-SLE-Product-WE-15-SP3-2022-1736,SUSE-SLE-Product-WE-15-SP4-2022-1736,openSUSE-SLE-15.3-2022-1736,openSUSE-SLE-15.4-2022-1736 SKIP SUSE-OU-2022:1737-1 as openSUSE-SLE-15.3-2022-1737 is not security or has no CVEs. patches: SUSE-2022-1737,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1737,SUSE-SLE-Product-WE-15-SP3-2022-1737,openSUSE-SLE-15.3-2022-1737 SKIP SUSE-OU-2022:1738-1 as openSUSE-SLE-15.3-2022-1738 is not security or has no CVEs. patches: SUSE-2022-1738,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1738,SUSE-SLE-Product-WE-15-SP3-2022-1738,openSUSE-SLE-15.3-2022-1738 SKIP SUSE-OU-2022:1739-1 as openSUSE-SLE-15.4-2022-1739 is not security or has no CVEs. patches: SUSE-2022-1739,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1739,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1739,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1739,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1739,SUSE-SLE-Product-WE-15-SP3-2022-1739,SUSE-SLE-Product-WE-15-SP4-2022-1739,openSUSE-SLE-15.3-2022-1739,openSUSE-SLE-15.4-2022-1739 SKIP SUSE-OU-2022:1741-1 as openSUSE-SLE-15.4-2022-1741 is not security or has no CVEs. patches: SUSE-2022-1741,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1741,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1741,SUSE-SLE-Product-WE-15-SP3-2022-1741,SUSE-SLE-Product-WE-15-SP4-2022-1741,openSUSE-SLE-15.3-2022-1741,openSUSE-SLE-15.4-2022-1741 SKIP SUSE-OU-2022:1742-1 as openSUSE-SLE-15.4-2022-1742 is not security or has no CVEs. patches: SUSE-2022-1742,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1742,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1742,SUSE-SLE-Product-WE-15-SP3-2022-1742,SUSE-SLE-Product-WE-15-SP4-2022-1742,openSUSE-SLE-15.3-2022-1742,openSUSE-SLE-15.4-2022-1742 SKIP SUSE-OU-2022:1743-1 as openSUSE-SLE-15.4-2022-1743 is not security or has no CVEs. patches: SUSE-2022-1743,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1743,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1743,SUSE-SLE-Product-WE-15-SP3-2022-1743,SUSE-SLE-Product-WE-15-SP4-2022-1743,openSUSE-SLE-15.3-2022-1743,openSUSE-SLE-15.4-2022-1743 SKIP SUSE-OU-2022:1767-1 as openSUSE-SLE-15.4-2022-1767 is not security or has no CVEs. patches: SUSE-2022-1767,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1767,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1767,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1767,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1767,SUSE-SLE-Product-WE-15-SP3-2022-1767,SUSE-SLE-Product-WE-15-SP4-2022-1767,openSUSE-SLE-15.3-2022-1767,openSUSE-SLE-15.4-2022-1767 SKIP SUSE-OU-2022:1863-1 as openSUSE-SLE-15.4-2022-1863 is not security or has no CVEs. patches: SUSE-2022-1863,SUSE-SLE-Module-Basesystem-15-SP3-2022-1863,SUSE-SLE-Module-Basesystem-15-SP4-2022-1863,openSUSE-SLE-15.3-2022-1863,openSUSE-SLE-15.4-2022-1863 SKIP SUSE-OU-2022:2085-1 as openSUSE-SLE-15.4-2022-2085 is not security or has no CVEs. patches: SUSE-2022-2085,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2085,openSUSE-SLE-15.3-2022-2085,openSUSE-SLE-15.4-2022-2085 SKIP SUSE-OU-2022:2086-1 as openSUSE-SLE-15.4-2022-2086 is not security or has no CVEs. patches: SUSE-2022-2086,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2086,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2086,SUSE-SLE-Product-WE-15-SP3-2022-2086,SUSE-SLE-Product-WE-15-SP4-2022-2086,openSUSE-SLE-15.3-2022-2086,openSUSE-SLE-15.4-2022-2086 SKIP SUSE-OU-2022:2087-1 as openSUSE-SLE-15.4-2022-2087 is not security or has no CVEs. patches: SUSE-2022-2087,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2087,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2087,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2087,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2087,SUSE-SLE-Product-WE-15-SP3-2022-2087,SUSE-SLE-Product-WE-15-SP4-2022-2087,openSUSE-SLE-15.3-2022-2087,openSUSE-SLE-15.4-2022-2087 SKIP SUSE-OU-2022:2795-1 as openSUSE-SLE-15.4-2022-2795 is not security or has no CVEs. patches: SUSE-2022-2795,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2795,openSUSE-SLE-15.3-2022-2795,openSUSE-SLE-15.4-2022-2795 SKIP SUSE-OU-2022:2969-1 as openSUSE-SLE-15.4-2022-2969 is not security or has no CVEs. patches: SUSE-2022-2969,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2969,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2969,SUSE-SLE-Product-WE-15-SP4-2022-2969,openSUSE-SLE-15.4-2022-2969 SKIP SUSE-OU-2022:2970-1 as openSUSE-SLE-15.4-2022-2970 is not security or has no CVEs. patches: SUSE-2022-2970,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2970,openSUSE-SLE-15.3-2022-2970,openSUSE-SLE-15.4-2022-2970 SKIP SUSE-OU-2022:2971-1 as openSUSE-SLE-15.4-2022-2971 is not security or has no CVEs. patches: SUSE-2022-2971,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2971,openSUSE-SLE-15.3-2022-2971,openSUSE-SLE-15.4-2022-2971 SKIP SUSE-OU-2022:3685-1 as openSUSE-SLE-15.4-2022-3685 is not security or has no CVEs. patches: SUSE-2022-3685,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3685,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3685,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3685,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3685,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3685,SUSE-SLE-Product-HA-15-2022-3685,SUSE-SLE-Product-HA-15-SP1-2022-3685,SUSE-SLE-Product-HA-15-SP2-2022-3685,SUSE-SLE-Product-HA-15-SP3-2022-3685,SUSE-SLE-Product-HA-15-SP4-2022-3685,openSUSE-SLE-15.3-2022-3685,openSUSE-SLE-15.4-2022-3685 SKIP SUSE-OU-2022:3831-1 as openSUSE-SLE-15.3-2022-3831 is not security or has no CVEs. patches: SUSE-2022-3831,SUSE-SLE-Module-Basesystem-15-SP3-2022-3831,SUSE-SUSE-MicroOS-5.2-2022-3831,openSUSE-SLE-15.3-2022-3831 SKIP SUSE-OU-2022:4059-1 as openSUSE-SLE-15.4-2022-4059 is not security or has no CVEs. patches: SUSE-2022-4059,SUSE-SLE-Module-Basesystem-15-SP4-2022-4059,openSUSE-SLE-15.4-2022-4059 SKIP SUSE-OU-2022:4229-1 as openSUSE-SLE-15.4-2022-4229 is not security or has no CVEs. patches: SUSE-2022-4229,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4229,openSUSE-SLE-15.4-2022-4229 SKIP SUSE-OU-2023:0791-1 as openSUSE-SLE-15.4-2023-791 is not security or has no CVEs. patches: SUSE-2023-791,SUSE-SLE-Manager-Tools-For-Micro-5-2023-791,SUSE-SLE-Module-Basesystem-15-SP4-2023-791,SUSE-SLE-Product-RT-15-SP3-2023-791,openSUSE-SLE-15.4-2023-791 SKIP SUSE-OU-2023:2165-1 as openSUSE-SLE-15.4-2023-2165 is not security or has no CVEs. patches: SUSE-2023-2165,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2165,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2165,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2165,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2165,SUSE-SLE-Product-RT-15-SP3-2023-2165,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2165,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2165,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2165,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2165,SUSE-Storage-7-2023-2165,SUSE-Storage-7.1-2023-2165,openSUSE-SLE-15.4-2023-2165 SKIP SUSE-OU-2023:2281-1 as openSUSE-SLE-15.4-2023-2281 is not security or has no CVEs. patches: SUSE-2023-2281,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2281,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2281,openSUSE-SLE-15.4-2023-2281 SKIP SUSE-OU-2023:2436 as openSUSE-SLE-15.4-2023-2436 is not security or has no CVEs. patches: SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2436,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2436,SUSE-SLE-Product-WE-15-SP4-2023-2436,openSUSE-SLE-15.4-2023-2436 SKIP SUSE-OU-2023:2436-1 as openSUSE-SLE-15.4-2023-2436 is not security or has no CVEs. patches: SUSE-2023-2436,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2436,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2436,SUSE-SLE-Product-WE-15-SP4-2023-2436,openSUSE-SLE-15.4-2023-2436 SKIP SUSE-OU-2023:2529-1 as openSUSE-SLE-15.5-2023-2529 is not security or has no CVEs. patches: SUSE-2023-2529,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2529,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2529,openSUSE-SLE-15.4-2023-2529,openSUSE-SLE-15.5-2023-2529 SKIP SUSE-OU-2023:2841-1 as openSUSE-SLE-15.5-2023-2841 is not security or has no CVEs. patches: SUSE-2023-2841,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2841,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2841,SUSE-SLE-Product-HA-15-SP1-2023-2841,SUSE-SLE-Product-HA-15-SP2-2023-2841,SUSE-SLE-Product-HA-15-SP3-2023-2841,SUSE-SLE-Product-HA-15-SP4-2023-2841,SUSE-SLE-Product-HA-15-SP5-2023-2841,openSUSE-SLE-15.4-2023-2841,openSUSE-SLE-15.5-2023-2841 SKIP SUSE-OU-2023:2842-1 as openSUSE-SLE-15.5-2023-2842 is not security or has no CVEs. patches: SUSE-2023-2842,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2842,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2842,SUSE-SLE-Product-HA-15-SP4-2023-2842,SUSE-SLE-Product-HA-15-SP5-2023-2842,openSUSE-SLE-15.4-2023-2842,openSUSE-SLE-15.5-2023-2842 SKIP SUSE-OU-2023:3146-1 as openSUSE-SLE-15.5-2023-3146 is not security or has no CVEs. patches: SUSE-2023-3146,SUSE-SLE-Module-Basesystem-15-SP4-2023-3146,SUSE-SLE-Module-Basesystem-15-SP5-2023-3146,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3146,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3146,SUSE-SLE-Product-RT-15-SP3-2023-3146,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3146,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3146,openSUSE-SLE-15.4-2023-3146,openSUSE-SLE-15.5-2023-3146 SKIP SUSE-OU-2023:3550-1 as openSUSE-SLE-15.5-2023-3550 is not security or has no CVEs. patches: SUSE-2023-3550,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3550,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3550,openSUSE-SLE-15.4-2023-3550,openSUSE-SLE-15.5-2023-3550 SKIP SUSE-OU-2024:0104-1 as openSUSE-SLE-15.5-2024-104 is not security or has no CVEs. patches: SUSE-2024-104,openSUSE-SLE-15.5-2024-104 SKIP SUSE-OU-2024:0274-1 as openSUSE-SLE-15.5-2024-274 is not security or has no CVEs. patches: SUSE-2024-274,SUSE-SLE-Module-Basesystem-15-SP5-2024-274,openSUSE-SLE-15.5-2024-274 SKIP SUSE-OU-2024:0431-1 as openSUSE-SLE-15.5-2024-431 is not security or has no CVEs. patches: SUSE-2024-431,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-431,SUSE-SLE-Module-Server-Applications-15-SP5-2024-431,openSUSE-SLE-15.5-2024-431 SKIP SUSE-OU-2024:0774-1 as openSUSE-SLE-15.5-2024-774 is not security or has no CVEs. patches: SUSE-2024-774,SUSE-SLE-Module-HPC-15-SP5-2024-774,openSUSE-SLE-15.5-2024-774 SKIP SUSE-OU-2024:0801-1 as openSUSE-SLE-15.5-2024-801 is not security or has no CVEs. patches: SUSE-2024-801,SUSE-SLE-Module-Basesystem-15-SP5-2024-801,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-801,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-801,openSUSE-SLE-15.5-2024-801 SKIP SUSE-OU-2024:0992-1 as SUSE-SLE-SERVER-12-SP5-2024-992 is not security or has no CVEs. patches: SUSE-2024-992,SUSE-SLE-HA-12-SP5-2024-992,SUSE-SLE-SDK-12-SP5-2024-992,SUSE-SLE-SERVER-12-SP5-2024-992 SKIP SUSE-OU-2024:1501-1 as openSUSE-SLE-15.5-2024-1501 is not security or has no CVEs. patches: SUSE-2024-1501,SUSE-SLE-Module-Basesystem-15-SP6-2024-1501,openSUSE-SLE-15.5-2024-1501 SKIP SUSE-OU-2024:1542-1 as openSUSE-SLE-15.5-2024-1542 is not security or has no CVEs. patches: SUSE-2024-1542,SUSE-SLE-Module-Basesystem-15-SP5-2024-1542,openSUSE-SLE-15.5-2024-1542 SKIP SUSE-OU-2024:1542-2 as SUSE-SLE-Module-Basesystem-15-SP6-2024-1542 is not security or has no CVEs. patches: SUSE-2024-1542,SUSE-SLE-Module-Basesystem-15-SP6-2024-1542 SKIP SUSE-OU-2024:1920-1 as openSUSE-SLE-15.6-2024-1920 is not security or has no CVEs. patches: SUSE-2024-1920,SUSE-SLE-Module-Basesystem-15-SP6-2024-1920,openSUSE-SLE-15.5-2024-1920,openSUSE-SLE-15.6-2024-1920 SKIP SUSE-OU-2024:2093-1 as SUSE-2024-2093 is not security or has no CVEs. patches: SUSE-2024-2093,SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2024-2093,SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-2093,SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-2093 SKIP SUSE-OU-2024:2282-1 as openSUSE-SLE-15.6-2024-2282 is not security or has no CVEs. patches: SUSE-2024-2282,SUSE-SLE-Manager-Tools-For-Micro-5-2024-2282,SUSE-SLE-Micro-5.3-2024-2282,SUSE-SLE-Micro-5.4-2024-2282,SUSE-SLE-Micro-5.5-2024-2282,SUSE-SLE-Module-Basesystem-15-SP5-2024-2282,SUSE-SLE-Module-Basesystem-15-SP6-2024-2282,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2282,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2282,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2282,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2282,SUSE-SUSE-MicroOS-5.1-2024-2282,SUSE-SUSE-MicroOS-5.2-2024-2282,openSUSE-SLE-15.5-2024-2282,openSUSE-SLE-15.6-2024-2282 SKIP SUSE-OU-2024:2282-2 as SUSE-SUSE-MicroOS-5.2-2024-2282 is not security or has no CVEs. patches: SUSE-2024-2282,SUSE-SUSE-MicroOS-5.1-2024-2282,SUSE-SUSE-MicroOS-5.2-2024-2282 SKIP SUSE-OU-2024:2316-1 as openSUSE-SLE-15.6-2024-2316 is not security or has no CVEs. patches: SUSE-2024-2316,SUSE-SLE-Module-Basesystem-15-SP6-2024-2316,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2316,SUSE-SLE-Product-WE-15-SP6-2024-2316,openSUSE-SLE-15.6-2024-2316 SKIP SUSE-OU-2024:2483-1 as SUSE-SUSE-MicroOS-5.2-2024-2483 is not security or has no CVEs. patches: SUSE-2024-2483,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2483,SUSE-SUSE-MicroOS-5.1-2024-2483,SUSE-SUSE-MicroOS-5.2-2024-2483 SKIP SUSE-OU-2024:2694-1 as openSUSE-SLE-15.6-2024-2694 is not security or has no CVEs. patches: SUSE-2024-2694,SUSE-SLE-Module-Basesystem-15-SP6-2024-2694,openSUSE-SLE-15.6-2024-2694 SKIP SUSE-OU-2024:2877-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2877 is not security or has no CVEs. patches: SUSE-2024-2877,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2877 SKIP SUSE-OU-2024:2934-1 as openSUSE-SLE-15.6-2024-2934 is not security or has no CVEs. patches: SUSE-2024-2934,SUSE-SLE-Module-Containers-15-SP5-2024-2934,SUSE-SLE-Module-Containers-15-SP6-2024-2934,openSUSE-SLE-15.5-2024-2934,openSUSE-SLE-15.6-2024-2934 SKIP SUSE-OU-2024:3464-1 as openSUSE-SLE-15.6-2024-3464 is not security or has no CVEs. patches: SUSE-2024-3464,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3464,openSUSE-SLE-15.6-2024-3464 SKIP SUSE-OU-2024:3590-1 as openSUSE-SLE-15.5-2024-3590 is not security or has no CVEs. patches: SUSE-2024-3590,SUSE-SLE-Micro-5.3-2024-3590,SUSE-SLE-Micro-5.4-2024-3590,SUSE-SLE-Micro-5.5-2024-3590,SUSE-SLE-Module-Basesystem-15-SP5-2024-3590,SUSE-SUSE-MicroOS-5.1-2024-3590,SUSE-SUSE-MicroOS-5.2-2024-3590,openSUSE-Leap-Micro-5.5-2024-3590,openSUSE-SLE-15.5-2024-3590 SKIP SUSE-OU-2024:3739-1 as openSUSE-SLE-15.6-2024-3739 is not security or has no CVEs. patches: SUSE-2024-3739,SUSE-SLE-Micro-5.5-2024-3739,SUSE-SLE-Module-Basesystem-15-SP5-2024-3739,SUSE-SLE-Module-Basesystem-15-SP6-2024-3739,openSUSE-Leap-Micro-5.5-2024-3739,openSUSE-SLE-15.5-2024-3739,openSUSE-SLE-15.6-2024-3739 SKIP SUSE-RU-2015:0165-2 as sleclo40sp3-openstack-0115 is not security or has no CVEs. patches: sleclo40sp3-openstack-0115 ERROR: notice SUSE-RU-2015:0222-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-2015,SUSE-SLE-SDK-12-2015,SUSE-SLE-SERVER-12-2015 SKIP SUSE-RU-2015:0223-1 as slessp3-lvm-clvm-201501 is not security or has no CVEs. patches: sledsp3-lvm-clvm-201501,slehasp3-lvm-clvm-201501,slessp3-lvm-clvm-201501 SKIP SUSE-RU-2015:0227-1 as SUSE-SLE-SERVER-12-2015-55 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-55,SUSE-SLE-SDK-12-2015-55,SUSE-SLE-SERVER-12-2015-55 SKIP SUSE-RU-2015:0234-1 as sleman21-spacecmd is not security or has no CVEs. patches: sleman21-spacecmd SKIP SUSE-RU-2015:0244-1 as SUSE-SLE-SERVER-12-2015-63 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-63,SUSE-SLE-SERVER-12-2015-63 SKIP SUSE-RU-2015:0244-2 as SUSE-SLE-SERVER-12-2015-63 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-63,SUSE-SLE-SDK-12-2015-63,SUSE-SLE-SERVER-12-2015-63 SKIP SUSE-RU-2015:0246-1 as SUSE-SLE-Live-Patching-12-2015-62 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2015-62 SKIP SUSE-RU-2015:0251-1 as SUSE-SLE-SERVER-12-2015-64 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-64,SUSE-SLE-SDK-12-2015-64,SUSE-SLE-SERVER-12-2015-64 SKIP SUSE-RU-2015:0254-1 as SUSE-SLE-Live-Patching-12-2015-66 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2015-66 SKIP SUSE-RU-2015:0272-1 as SUSE-SLE-SERVER-12-2015-69 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-69,SUSE-SLE-SERVER-12-2015-69 SKIP SUSE-RU-2015:0275-1 as slessp3-gcc-shlib-transition is not security or has no CVEs. patches: sdksp3-gcc-shlib-transition,sledsp3-gcc-shlib-transition,slessp3-gcc-shlib-transition SKIP SUSE-RU-2015:0276-1 as slessp3-cpp47 is not security or has no CVEs. patches: sdksp3-cpp47,sledsp3-cpp47,slessp3-cpp47 SKIP SUSE-RU-2015:0293-1 as slessp3-xrdp-201412 is not security or has no CVEs. patches: sledsp3-xrdp-201412,slessp3-xrdp-201412 SKIP SUSE-RU-2015:0294-1 as slestso13-studio-help is not security or has no CVEs. patches: slestso13-studio-help SKIP SUSE-RU-2015:0295-1 as slessp3-timezone-2015a is not security or has no CVEs. patches: sdksp3-timezone-2015a,sledsp3-timezone-2015a,slessp2-timezone-2015a,slessp3-timezone-2015a SKIP SUSE-RU-2015:0295-2 as slessp1-timezone-2015a is not security or has no CVEs. patches: slessp1-timezone-2015a SKIP SUSE-RU-2015:0296-1 as slestso13-susestudio-139-201502 is not security or has no CVEs. patches: slestso13-susestudio-139-201502 SKIP SUSE-RU-2015:0297-1 as slestso13-susestudio-admin_en is not security or has no CVEs. patches: slestso13-susestudio-admin_en SKIP SUSE-RU-2015:0299-1 as SUSE-SLE-WE-12-2015-77 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-77,SUSE-SLE-SDK-12-2015-77,SUSE-SLE-SERVER-12-2015-77,SUSE-SLE-WE-12-2015-77 SKIP SUSE-RU-2015:0323-1 as sleclo40sp3-crowbar-barclamp-ceph is not security or has no CVEs. patches: sleclo40sp3-crowbar-barclamp-ceph SKIP SUSE-RU-2015:0326-1 as SUSE-SLE-SERVER-12-2015-85 is not security or has no CVEs. patches: SUSE-SLE-BSK-12-2015-85,SUSE-SLE-DESKTOP-12-2015-85,SUSE-SLE-SERVER-12-2015-85 SKIP SUSE-RU-2015:0334-1 as sleclo40sp3-python-amqp is not security or has no CVEs. patches: sleclo40sp3-python-amqp SKIP SUSE-RU-2015:0339-1 as SUSE-SLE-SDK-12-2015-87 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-87 SKIP SUSE-RU-2015:0341-1 as slessp3-dolphin is not security or has no CVEs. patches: sdksp3-dolphin,sledsp3-dolphin,slessp3-dolphin SKIP SUSE-RU-2015:0342-1 as slessp3-gnome-packagekit is not security or has no CVEs. patches: sledsp3-gnome-packagekit,slessp3-gnome-packagekit SKIP SUSE-RU-2015:0350-1 as SUSE-SLE-WE-12-2015-89 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-89,SUSE-SLE-WE-12-2015-89 SKIP SUSE-RU-2015:0352-1 as SUSE-SLE-SERVER-12-2015-90 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-90 SKIP SUSE-RU-2015:0356-1 as SUSE-SLE-Module-Public-Cloud-12-2015-93 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-93 SKIP SUSE-RU-2015:0358-1 as sleclo40sp3-ceilometer-0115 is not security or has no CVEs. patches: sleclo40sp3-ceilometer-0115 SKIP SUSE-RU-2015:0359-1 as slessp3-apache2-mod_perl is not security or has no CVEs. patches: sdksp3-apache2-mod_perl,slessp3-apache2-mod_perl SKIP SUSE-RU-2015:0368-1 as slessp3-WALinuxAgent is not security or has no CVEs. patches: slessp3-WALinuxAgent SKIP SUSE-RU-2015:0369-1 as sleclo40sp3-glance-0115 is not security or has no CVEs. patches: sleclo40sp3-glance-0115 SKIP SUSE-RU-2015:0373-1 as SUSE-SLE-SERVER-12-2015-98 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-98,SUSE-SLE-SDK-12-2015-98,SUSE-SLE-SERVER-12-2015-98 SKIP SUSE-RU-2015:0374-1 as SUSE-SLE-SERVER-12-2015-97 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-97,SUSE-SLE-SDK-12-2015-97,SUSE-SLE-SERVER-12-2015-97 SKIP SUSE-RU-2015:0380-1 as sleclo40sp3-crowbar-barclamp-nova is not security or has no CVEs. patches: sleclo40sp3-crowbar-barclamp-nova SKIP SUSE-RU-2015:0383-1 as SUSE-SLE-SERVER-12-2015-99 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-99,SUSE-SLE-SERVER-12-2015-99 SKIP SUSE-RU-2015:0385-1 as slessp3-libsss_idmap-devel is not security or has no CVEs. patches: sdksp3-libsss_idmap-devel,sledsp3-libsss_idmap-devel,slessp3-libsss_idmap-devel SKIP SUSE-RU-2015:0388-1 as slessp1-libnuma-devel is not security or has no CVEs. patches: slessp1-libnuma-devel SKIP SUSE-RU-2015:0389-1 as slessp3-apache2-mod_apparmor is not security or has no CVEs. patches: sdksp3-apache2-mod_apparmor,sledsp3-apache2-mod_apparmor,slessp3-apache2-mod_apparmor SKIP SUSE-RU-2015:0390-1 as SUSE-SLE-Manager-Tools-12-2015-101 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-101 SKIP SUSE-RU-2015:0391-1 as sleclo40sp3-keystone-0115 is not security or has no CVEs. patches: sleclo40sp3-keystone-0115 SKIP SUSE-RU-2015:0394-1 as slemap21-suse-manager-proxy-21-201502 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201502 SKIP SUSE-RU-2015:0396-1 as slessp3-client-tools-21-201502 is not security or has no CVEs. patches: sledsp3-client-tools-21-201502,slesctsp3-client-tools-21-201502,slessp3-client-tools-21-201502 SKIP SUSE-RU-2015:0397-1 as slessp3-apache2-mod_python is not security or has no CVEs. patches: sdksp3-apache2-mod_python,slessp3-apache2-mod_python SKIP SUSE-RU-2015:0409-1 as sledsp3-f-spot is not security or has no CVEs. patches: sledsp3-f-spot SKIP SUSE-RU-2015:0411-1 as SUSE-SLE-SERVER-12-2015-103 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-103,SUSE-SLE-SERVER-12-2015-103 SKIP SUSE-RU-2015:0411-2 as SUSE-SLE-SDK-12-2015-103 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-103 SKIP SUSE-RU-2015:0411-3 as SUSE-SLE-SERVER-12-2015-103 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-103 SKIP SUSE-RU-2015:0416-1 as sleclo40sp3-ceilometer-mongodb-0115 is not security or has no CVEs. patches: sleclo40sp3-ceilometer-mongodb-0115 SKIP SUSE-RU-2015:0430-1 as slessp3-parted is not security or has no CVEs. patches: sdksp3-parted,sledsp3-parted,slessp3-parted SKIP SUSE-RU-2015:0435-1 as slessp3-yast2-iscsi-client is not security or has no CVEs. patches: sledsp3-yast2-iscsi-client,slessp3-yast2-iscsi-client SKIP SUSE-RU-2015:0437-1 as sleclo50sp3-release-notes-suse-cloud is not security or has no CVEs. patches: sleclo50sp3-release-notes-suse-cloud SKIP SUSE-RU-2015:0442-1 as SUSE-SLE-SERVER-12-2015-107 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-107,SUSE-SLE-SERVER-12-2015-107 SKIP SUSE-RU-2015:0452-1 as SUSE-SLE-SERVER-12-2015-109 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-109 SKIP SUSE-RU-2015:0456-1 as SUSE-SLE-SERVER-12-2015-114 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-114,SUSE-SLE-SDK-12-2015-114,SUSE-SLE-SERVER-12-2015-114 SKIP SUSE-RU-2015:0459-1 as SUSE-SLE-SERVER-12-2015-113 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-113 SKIP SUSE-RU-2015:0460-1 as SUSE-SLE-SERVER-12-2015-115 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-115 SKIP SUSE-RU-2015:0461-1 as slessp3-autoconf is not security or has no CVEs. patches: sdksp3-autoconf,slessp3-autoconf SKIP SUSE-RU-2015:0464-1 as slessp3-open-iscsi is not security or has no CVEs. patches: sledsp3-open-iscsi,slessp3-open-iscsi SKIP SUSE-RU-2015:0485-1 as slessp3-gnu-efi is not security or has no CVEs. patches: sdksp3-gnu-efi,slessp3-gnu-efi SKIP SUSE-RU-2015:0494-1 as slessp3-grub2 is not security or has no CVEs. patches: sledsp3-grub2,slessp3-grub2 SKIP SUSE-RU-2015:0495-1 as SUSE-SLE-SERVER-12-2015-121 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-121,SUSE-SLE-SDK-12-2015-121,SUSE-SLE-SERVER-12-2015-121 SKIP SUSE-RU-2015:0507-1 as SUSE-SLE-SERVER-12-2015-124 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-124,SUSE-SLE-SERVER-12-2015-124 SKIP SUSE-RU-2015:0507-2 as SUSE-SLE-DESKTOP-12-2015-124 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-124 SKIP SUSE-RU-2015:0509-1 as slessp3-vm-install is not security or has no CVEs. patches: sledsp3-vm-install,slessp3-vm-install SKIP SUSE-RU-2015:0513-1 as sleclo40sp3-ceilometer-mongodb-0115 is not security or has no CVEs. patches: sleclo40sp3-ceilometer-mongodb-0115 SKIP SUSE-RU-2015:0514-1 as slehasp3-slehae-201501 is not security or has no CVEs. patches: slehasp3-slehae-201501 SKIP SUSE-RU-2015:0524-1 as SUSE-SLE-SERVER-12-2015-128 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-128,SUSE-SLE-SDK-12-2015-128,SUSE-SLE-SERVER-12-2015-128 SKIP SUSE-RU-2015:0525-1 as sleclo40sp3-neutron-0115 is not security or has no CVEs. patches: sleclo40sp3-neutron-0115 SKIP SUSE-RU-2015:0530-1 as slessp3-sed is not security or has no CVEs. patches: sledsp3-sed,slessp3-sed SKIP SUSE-RU-2015:0531-1 as slessp3-procinfo is not security or has no CVEs. patches: sledsp3-procinfo,slessp3-procinfo SKIP SUSE-RU-2015:0532-1 as slessp3-microcode_ctl is not security or has no CVEs. patches: sledsp3-microcode_ctl,slessp3-microcode_ctl SKIP SUSE-RU-2015:0533-1 as slessp3-python-rtslib is not security or has no CVEs. patches: slessp3-python-rtslib SKIP SUSE-RU-2015:0535-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-131 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-131 SKIP SUSE-RU-2015:0539-1 as SUSE-SLE-SERVER-12-2015-132 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-132,SUSE-SLE-SERVER-12-2015-132 SKIP SUSE-RU-2015:0544-1 as SUSE-SLE-SERVER-12-2015-134 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-134,SUSE-SLE-SERVER-12-2015-134 SKIP SUSE-RU-2015:0552-1 as slessp3-man-pages is not security or has no CVEs. patches: sledsp3-man-pages,slessp3-man-pages SKIP SUSE-RU-2015:0556-1 as SUSE-SLE-Module-Public-Cloud-12-2015-137 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-137 SKIP SUSE-RU-2015:0557-1 as SUSE-SLE-Module-Public-Cloud-12-2015-139 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-139 SKIP SUSE-RU-2015:0558-1 as SUSE-SLE-Module-Public-Cloud-12-2015-136 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-136 SKIP SUSE-RU-2015:0559-1 as SUSE-SLE-Module-Public-Cloud-12-2015-138 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-138 SKIP SUSE-RU-2015:0560-1 as SUSE-SLE-Module-Public-Cloud-12-2015-140 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-140 SKIP SUSE-RU-2015:0561-1 as slessp3-sax2 is not security or has no CVEs. patches: sdksp3-sax2,sledsp3-sax2,slessp3-sax2 SKIP SUSE-RU-2015:0564-1 as slessp3-kbd is not security or has no CVEs. patches: sledsp3-kbd,slessp3-kbd SKIP SUSE-RU-2015:0565-1 as slessp3-logwatch is not security or has no CVEs. patches: slessp3-logwatch SKIP SUSE-RU-2015:0576-1 as slessp3-logrotate is not security or has no CVEs. patches: sledsp3-logrotate,slessp3-logrotate SKIP SUSE-RU-2015:0577-1 as slessp3-less is not security or has no CVEs. patches: sledsp3-less,slessp3-less SKIP SUSE-RU-2015:0579-1 as slessp3-libtirpc-nfs-201502 is not security or has no CVEs. patches: sdksp3-libtirpc-nfs-201502,sledsp3-libtirpc-nfs-201502,slessp3-libtirpc-nfs-201502 SKIP SUSE-RU-2015:0592-1 as slessp3-cron is not security or has no CVEs. patches: sledsp3-cron,slessp3-cron SKIP SUSE-RU-2015:0594-1 as slessp3-glib2 is not security or has no CVEs. patches: sdksp3-glib2,sledsp3-glib2,slessp3-glib2 SKIP SUSE-RU-2015:0601-1 as SUSE-SLE-SERVER-12-2015-145 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-145,SUSE-SLE-SERVER-12-2015-145 SKIP SUSE-RU-2015:0603-1 as SUSE-SLE-SERVER-12-2015-146 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-146 SKIP SUSE-RU-2015:0603-2 as SUSE-SLE-DESKTOP-12-2015-146 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-146 SKIP SUSE-RU-2015:0604-1 as slessp3-yast2-ca-201501 is not security or has no CVEs. patches: sdksp3-yast2-ca-201501,sledsp3-yast2-ca-201501,slessp3-yast2-ca-201501 SKIP SUSE-RU-2015:0605-1 as slessp3-python-netifaces is not security or has no CVEs. patches: slessp3-python-netifaces SKIP SUSE-RU-2015:0606-1 as slessp2-timezone-2015b is not security or has no CVEs. patches: slessp1-timezone-2015b,slessp2-timezone-2015b SKIP SUSE-RU-2015:0606-2 as slessp3-timezone-2015b is not security or has no CVEs. patches: sdksp3-timezone-2015b,sledsp3-timezone-2015b,slessp3-timezone-2015b SKIP SUSE-RU-2015:0610-1 as sleman21-release-notes-susemanager is not security or has no CVEs. patches: sleman21-release-notes-susemanager SKIP SUSE-RU-2015:0612-1 as slessp3-vhostmd is not security or has no CVEs. patches: sdksp3-vhostmd,slessp3-vhostmd SKIP SUSE-RU-2015:0619-1 as slessp3-yast2-update is not security or has no CVEs. patches: sledsp3-yast2-update,slessp3-yast2-update SKIP SUSE-RU-2015:0633-1 as sledsp3-sled-admin_en-pdf is not security or has no CVEs. patches: sledsp3-sled-admin_en-pdf SKIP SUSE-RU-2015:0635-1 as slessp3-irqbalance is not security or has no CVEs. patches: sledsp3-irqbalance,slessp3-irqbalance SKIP SUSE-RU-2015:0638-1 as SUSE-SLE-SERVER-12-2015-149 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-149,SUSE-SLE-SDK-12-2015-149,SUSE-SLE-SERVER-12-2015-149 SKIP SUSE-RU-2015:0649-1 as slessp2-hal-201502 is not security or has no CVEs. patches: slessp2-hal-201502 SKIP SUSE-RU-2015:0650-1 as sleclo40sp3-ceph-201503 is not security or has no CVEs. patches: sleclo40sp3-ceph-201503 SKIP SUSE-RU-2015:0650-2 as slessp3-kvm-libvirt-201503 is not security or has no CVEs. patches: sdksp3-kvm-libvirt-201503,sledsp3-kvm-libvirt-201503,slessp3-kvm-libvirt-201503 SKIP SUSE-RU-2015:0651-1 as slessp2-firefox-cpp47 is not security or has no CVEs. patches: slessp1-firefox-cpp47,slessp2-firefox-cpp47 SKIP SUSE-RU-2015:0654-1 as slessp3-ding-libs is not security or has no CVEs. patches: sdksp3-ding-libs,sledsp3-ding-libs,slessp3-ding-libs SKIP SUSE-RU-2015:0655-1 as slessp3-hal-201502 is not security or has no CVEs. patches: sdksp3-hal-201502,sledsp3-hal-201502,slessp3-hal-201502 SKIP SUSE-RU-2015:0661-1 as slesmtsp3-sle-smt_en is not security or has no CVEs. patches: slesmtsp3-sle-smt_en SKIP SUSE-RU-2015:0662-1 as slesmtsp3-sle-smt-release is not security or has no CVEs. patches: slesmtsp3-sle-smt-release SKIP SUSE-RU-2015:0662-2 as slesmtsp3-release-notes-smt is not security or has no CVEs. patches: slesmtsp3-release-notes-smt SKIP SUSE-RU-2015:0666-1 as SUSE-SLE-SERVER-12-2015-153 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-153,SUSE-SLE-SERVER-12-2015-153 SKIP SUSE-RU-2015:0671-1 as slessp3-osasnmpd is not security or has no CVEs. patches: slessp3-osasnmpd SKIP SUSE-RU-2015:0690-1 as slessp3-ethtool is not security or has no CVEs. patches: sledsp3-ethtool,slessp3-ethtool SKIP SUSE-RU-2015:0691-1 as slessp3-tcsh is not security or has no CVEs. patches: sledsp3-tcsh,slessp3-tcsh SKIP SUSE-RU-2015:0697-1 as slessp3-iproute2 is not security or has no CVEs. patches: sdksp3-iproute2,sledsp3-iproute2,slessp3-iproute2 SKIP SUSE-RU-2015:0698-1 as slesmtsp3-smt-211 is not security or has no CVEs. patches: slesmtsp3-smt-211 SKIP SUSE-RU-2015:0700-1 as slessp3-sysconfig is not security or has no CVEs. patches: sledsp3-sysconfig,slessp3-sysconfig SKIP SUSE-RU-2015:0703-1 as SUSE-SLE-WE-12-2015-164 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-164,SUSE-SLE-SDK-12-2015-164,SUSE-SLE-SERVER-12-2015-164,SUSE-SLE-WE-12-2015-164 SKIP SUSE-RU-2015:0707-1 as slewyst13-rubygem-webyast-registration is not security or has no CVEs. patches: sleslms13-rubygem-webyast-registration,slestso13-rubygem-webyast-registration,slewyst13-rubygem-webyast-registration SKIP SUSE-RU-2015:0708-1 as slewyst13-rubygem-webyast-software is not security or has no CVEs. patches: sleslms13-rubygem-webyast-software,slewyst13-rubygem-webyast-software SKIP SUSE-RU-2015:0710-1 as slessp3-autofs is not security or has no CVEs. patches: sledsp3-autofs,slessp3-autofs SKIP SUSE-RU-2015:0734-1 as SUSE-SLE-SERVER-12-2015-169 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-169,SUSE-SLE-SERVER-12-2015-169 SKIP SUSE-RU-2015:0750-1 as slehasp3-sleha-bootstrap is not security or has no CVEs. patches: slehasp3-sleha-bootstrap SKIP SUSE-RU-2015:0752-1 as slessp3-timezone-2015c is not security or has no CVEs. patches: sdksp3-timezone-2015c,sledsp3-timezone-2015c,slessp1-timezone-2015c,slessp2-timezone-2015c,slessp3-timezone-2015c SKIP SUSE-RU-2015:0755-1 as slessp3-netcat-openbsd is not security or has no CVEs. patches: sledsp3-netcat-openbsd,slessp3-netcat-openbsd SKIP SUSE-RU-2015:0759-1 as slessp3-python-201504 is not security or has no CVEs. patches: sdksp3-python-201504,sledsp3-python-201504,slessp3-python-201504 SKIP SUSE-RU-2015:0765-1 as slessp3-lprng is not security or has no CVEs. patches: sdksp3-lprng,slessp3-lprng SKIP SUSE-RU-2015:0766-1 as slessp3-mtx is not security or has no CVEs. patches: sdksp3-mtx,slessp3-mtx SKIP SUSE-RU-2015:0768-1 as slessp3-python-pyasn1 is not security or has no CVEs. patches: sdksp3-python-setuptools,sledsp3-python-setuptools,slessp3-python-pyasn1 SKIP SUSE-RU-2015:0778-1 as SUSE-SLE-HA-12-2015-173 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-173 SKIP SUSE-RU-2015:0780-1 as slessp3-pciutils is not security or has no CVEs. patches: sdksp3-pciutils,sledsp3-pciutils,slessp3-pciutils SKIP SUSE-RU-2015:0781-1 as slessp3-libgudev-1_0-0 is not security or has no CVEs. patches: sdksp3-libgudev-1_0-0,sledsp3-libgudev-1_0-0,slessp3-libgudev-1_0-0 SKIP SUSE-RU-2015:0784-1 as SUSE-SLE-SERVER-12-2015-174 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-174,SUSE-SLE-SERVER-12-2015-174 SKIP SUSE-RU-2015:0788-1 as SUSE-SLE-SERVER-12-2015-175 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-175,SUSE-SLE-SERVER-12-2015-175 SKIP SUSE-RU-2015:0790-1 as slessp3-libgtop is not security or has no CVEs. patches: sdksp3-libgtop,sledsp3-libgtop,slessp3-libgtop SKIP SUSE-RU-2015:0791-1 as slessp3-timezone-2015c-2 is not security or has no CVEs. patches: sdksp3-timezone-2015c-2,sledsp3-timezone-2015c-2,slessp1-timezone-2015c-2,slessp2-timezone-2015c-2,slessp3-timezone-2015c-2 SKIP SUSE-RU-2015:0796-1 as slessp3-kiwi is not security or has no CVEs. patches: sdksp3-kiwi,sleposp3-kiwi,slessp3-kiwi SKIP SUSE-RU-2015:0797-1 as slessp3-docbook_4 is not security or has no CVEs. patches: sledsp3-docbook_4,slessp3-docbook_4 SKIP SUSE-RU-2015:0802-1 as sleclo50sp3-python-keyring is not security or has no CVEs. patches: sdksp3-python-keyring,sleclo40sp3-python-keyring,sleclo50sp3-python-keyring SKIP SUSE-RU-2015:0804-1 as slessp3-perl-Net-SSLeay is not security or has no CVEs. patches: sledsp3-perl-Net-SSLeay,slessp3-perl-Net-SSLeay SKIP SUSE-RU-2015:0809-1 as slessp3-lvm-dm-201503 is not security or has no CVEs. patches: sdksp3-lvm-dm-201503,sledsp3-lvm-dm-201503,slehasp3-lvm-dm-201503,slessp3-lvm-dm-201503 SKIP SUSE-RU-2015:0810-1 as slessp3-zlib is not security or has no CVEs. patches: sdksp3-zlib,sledsp3-zlib,slessp3-zlib SKIP SUSE-RU-2015:0811-1 as slessp3-libslab-gnome-mm-201503 is not security or has no CVEs. patches: sdksp3-libslab-gnome-mm-201503,sledsp3-libslab-gnome-mm-201503,slessp3-libslab-gnome-mm-201503 SKIP SUSE-RU-2015:0815-1 as slessp3-OpenIPMI is not security or has no CVEs. patches: sdksp3-OpenIPMI,sledsp3-OpenIPMI,slessp3-OpenIPMI SKIP SUSE-RU-2015:0816-1 as SUSE-SLE-Module-Public-Cloud-12-2015-181 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-181 SKIP SUSE-RU-2015:0829-1 as SUSE-SLE-SERVER-12-2015-182 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-182 SKIP SUSE-RU-2015:0830-1 as slessp3-WALinuxAgent is not security or has no CVEs. patches: slessp3-WALinuxAgent SKIP SUSE-RU-2015:0838-1 as slessp3-ant-201503 is not security or has no CVEs. patches: sdksp3-ant-201503,slessp3-ant-201503 SKIP SUSE-RU-2015:0840-1 as SUSE-SLE-SERVER-12-2015-186 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-186 SKIP SUSE-RU-2015:0844-1 as SUSE-SLE-Manager-Tools-12-2015-188 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-188 SKIP SUSE-RU-2015:0845-1 as slessp3-client-tools-21-201504 is not security or has no CVEs. patches: sledsp3-client-tools-21-201504,slessp3-client-tools-21-201504 SKIP SUSE-RU-2015:0846-1 as sleman21-suse-manager-21-201504 is not security or has no CVEs. patches: sleman21-suse-manager-21-201504 SKIP SUSE-RU-2015:0847-1 as slemap21-suse-manager-proxy-21-201504 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201504 SKIP SUSE-RU-2015:0848-1 as slesctsp3-client-tools-21-201504 is not security or has no CVEs. patches: slesctsp3-client-tools-21-201504 SKIP SUSE-RU-2015:0850-1 as slessp3-nfs-client is not security or has no CVEs. patches: sledsp3-nfs-client,slessp3-nfs-client SKIP SUSE-RU-2015:0851-1 as sleclo50sp3-crowbar-barclamp-hyperv is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-hyperv SKIP SUSE-RU-2015:0852-1 as SUSE-SLE-SERVER-12-2015-190 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-190 SKIP SUSE-RU-2015:0852-2 as SUSE-SLE-DESKTOP-12-2015-190 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-190 SKIP SUSE-RU-2015:0862-1 as slestso13-studio-help is not security or has no CVEs. patches: slestso13-studio-help SKIP SUSE-RU-2015:0864-1 as SUSE-SLE-SERVER-12-2015-191 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-191,SUSE-SLE-SDK-12-2015-191,SUSE-SLE-SERVER-12-2015-191 SKIP SUSE-RU-2015:0867-1 as sleclo50sp3-crowbar-barclamp-crowbar is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-crowbar SKIP SUSE-RU-2015:0872-1 as sleclo50sp3-yast2-crowbar is not security or has no CVEs. patches: sleclo50sp3-yast2-crowbar SKIP SUSE-RU-2015:0873-1 as SUSE-SLE-SERVER-12-2015-195 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-195,SUSE-SLE-SERVER-12-2015-195 SKIP SUSE-RU-2015:0874-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-196 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-196,SUSE-SLE-Module-Adv-Systems-Management-12-2015-196 SKIP SUSE-RU-2015:0875-1 as slessp3-tightvnc is not security or has no CVEs. patches: sledsp3-tightvnc,slessp3-tightvnc SKIP SUSE-RU-2015:0881-1 as slessp3-kdump is not security or has no CVEs. patches: sledsp3-kdump,slessp3-kdump SKIP SUSE-RU-2015:0885-1 as slessp3-libgudev-1_0-0 is not security or has no CVEs. patches: sdksp3-libgudev-1_0-0,sledsp3-libgudev-1_0-0,slessp3-libgudev-1_0-0 SKIP SUSE-RU-2015:0891-1 as slessp3-microcode_ctl is not security or has no CVEs. patches: sledsp3-microcode_ctl,slessp3-microcode_ctl SKIP SUSE-RU-2015:0898-1 as SUSE-SLE-WE-12-2015-202 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-202,SUSE-SLE-WE-12-2015-202 SKIP SUSE-RU-2015:0899-1 as slessp3-samba-201504 is not security or has no CVEs. patches: sdksp3-samba-201504,sledsp3-samba-201504,slessp3-samba-201504 SKIP SUSE-RU-2015:0900-1 as SUSE-SLE-WE-12-2015-203 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-203,SUSE-SLE-WE-12-2015-203 SKIP SUSE-RU-2015:0903-1 as sleclo50sp3-crowbar is not security or has no CVEs. patches: sleclo50sp3-crowbar SKIP SUSE-RU-2015:0903-2 as sleclo50sp3-python-oslo.db is not security or has no CVEs. patches: sleclo50sp3-python-oslo.db SKIP SUSE-RU-2015:0915-1 as SUSE-SLE-SERVER-12-2015-205 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-205 SKIP SUSE-RU-2015:0917-1 as sleclo50sp3-crowbar-barclamp-ntp is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-ntp SKIP SUSE-RU-2015:0918-1 as slessp3-net-tools is not security or has no CVEs. patches: sledsp3-net-tools,slessp3-net-tools SKIP SUSE-RU-2015:0924-1 as SUSE-SLE-SERVER-12-2015-207 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-207,SUSE-SLE-SERVER-12-2015-207 SKIP SUSE-RU-2015:0926-1 as sleclo50sp3-openstack-dashboard-theme-SUSE is not security or has no CVEs. patches: sleclo50sp3-openstack-dashboard-theme-SUSE SKIP SUSE-RU-2015:0938-1 as SUSE-SLE-WE-12-2015-209 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-209,SUSE-SLE-SDK-12-2015-209,SUSE-SLE-SERVER-12-2015-209,SUSE-SLE-WE-12-2015-209 SKIP SUSE-RU-2015:0941-1 as SUSE-SLE-SERVER-12-2015-212 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-212,SUSE-SLE-SERVER-12-2015-212 SKIP SUSE-RU-2015:0947-1 as slessp3-yast2-packager is not security or has no CVEs. patches: sledsp3-yast2-packager,slessp3-yast2-packager SKIP SUSE-RU-2015:0950-1 as SUSE-SLE-WE-12-2015-213 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-213,SUSE-SLE-SDK-12-2015-213,SUSE-SLE-SERVER-12-2015-213,SUSE-SLE-WE-12-2015-213 SKIP SUSE-RU-2015:0951-1 as SUSE-SLE-SERVER-12-2015-214 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-214,SUSE-SLE-SERVER-12-2015-214 SKIP SUSE-RU-2015:0954-1 as slesmtsp3-res-signingkeys is not security or has no CVEs. patches: slesmtsp3-res-signingkeys SKIP SUSE-RU-2015:0961-1 as SUSE-SLE-SERVER-12-2015-220 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-220 SKIP SUSE-RU-2015:0961-2 as SUSE-SLE-SERVER-12-2015-220 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-220,SUSE-SLE-SERVER-12-2015-220 SKIP SUSE-RU-2015:0963-1 as slessp3-gvfs is not security or has no CVEs. patches: sdksp3-gvfs,sledsp3-gvfs,slessp3-gvfs SKIP SUSE-RU-2015:0964-1 as SUSE-SLE-SERVER-12-2015-221 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-221,SUSE-SLE-SERVER-12-2015-221 SKIP SUSE-RU-2015:0965-1 as SUSE-SLE-SERVER-12-2015-222 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-222,SUSE-SLE-SERVER-12-2015-222 SKIP SUSE-RU-2015:0970-1 as SUSE-SLE-SERVER-12-2015-224 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-224 SKIP SUSE-RU-2015:0971-1 as slehasp3-cmirrord is not security or has no CVEs. patches: slehasp3-cmirrord SKIP SUSE-RU-2015:0972-1 as slessp3-libgtop is not security or has no CVEs. patches: sdksp3-libgtop,sledsp3-libgtop,slessp3-libgtop SKIP SUSE-RU-2015:0973-1 as SUSE-SLE-WE-12-2015-225 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-225,SUSE-SLE-SDK-12-2015-225,SUSE-SLE-SERVER-12-2015-225,SUSE-SLE-WE-12-2015-225 SKIP SUSE-RU-2015:0975-1 as SUSE-SLE-SERVER-12-2015-227 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-227,SUSE-SLE-SERVER-12-2015-227 SKIP SUSE-RU-2015:0976-1 as SUSE-SLE-SERVER-12-2015-228 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-228,SUSE-SLE-SDK-12-2015-228,SUSE-SLE-SERVER-12-2015-228 SKIP SUSE-RU-2015:0980-1 as sleclo40sp3-crowbar is not security or has no CVEs. patches: sleclo40sp3-crowbar SKIP SUSE-RU-2015:0981-1 as sleclo50sp3-ceph-cinder-glance-201505 is not security or has no CVEs. patches: sleclo50sp3-ceph-cinder-glance-201505 SKIP SUSE-RU-2015:0982-1 as slessp3-lio-mibs is not security or has no CVEs. patches: slessp3-lio-mibs SKIP SUSE-RU-2015:0986-1 as SUSE-SLE-HA-12-2015-232 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-232 SKIP SUSE-RU-2015:0988-1 as SUSE-SLE-SERVER-12-2015-233 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-233 SKIP SUSE-RU-2015:0988-2 as SUSE-SLE-SERVER-12-2015-233 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-233 SKIP SUSE-RU-2015:0989-1 as SUSE-SLE-SERVER-12-2015-234 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-234 SKIP SUSE-RU-2015:0989-2 as SUSE-SLE-SERVER-12-2015-234 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-234,SUSE-SLE-SERVER-12-2015-234 SKIP SUSE-RU-2015:0996-1 as sleclo40sp3-crowbar-barclamp-crowbar is not security or has no CVEs. patches: sleclo40sp3-crowbar-barclamp-crowbar SKIP SUSE-RU-2015:0998-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-237 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-237 SKIP SUSE-RU-2015:0999-1 as SUSE-SLE-SERVER-12-2015-238 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-238 SKIP SUSE-RU-2015:1000-1 as SUSE-SLE-SERVER-12-2015-239 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-239 SKIP SUSE-RU-2015:1001-1 as SUSE-SLE-SERVER-12-2015-240 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-240 SKIP SUSE-RU-2015:1012-1 as sleclo50sp3-python-oslo.messaging is not security or has no CVEs. patches: sleclo50sp3-python-oslo.messaging SKIP SUSE-RU-2015:1017-1 as SUSE-SLE-WE-12-2015-246 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-246,SUSE-SLE-SDK-12-2015-246,SUSE-SLE-WE-12-2015-246 SKIP SUSE-RU-2015:1026-1 as SUSE-SLE-SERVER-12-2015-249 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-249,SUSE-SLE-SDK-12-2015-249,SUSE-SLE-SERVER-12-2015-249 SKIP SUSE-RU-2015:1027-1 as SUSE-SLE-Module-Public-Cloud-12-2015-252 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-252 SKIP SUSE-RU-2015:1029-1 as sleclo50sp3-crowbar-barclamp-ceph is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-ceph SKIP SUSE-RU-2015:1032-1 as sleclo50sp3-couchdb is not security or has no CVEs. patches: sleclo50sp3-couchdb SKIP SUSE-RU-2015:1033-1 as SUSE-SLE-SERVER-12-2015-253 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-253,SUSE-SLE-SERVER-12-2015-253 SKIP SUSE-RU-2015:1034-1 as SUSE-SLE-SERVER-12-2015-254 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-254 SKIP SUSE-RU-2015:1035-1 as SUSE-SLE-SERVER-12-2015-255 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-255,SUSE-SLE-SDK-12-2015-255,SUSE-SLE-SERVER-12-2015-255 SKIP SUSE-RU-2015:1036-1 as SUSE-SLE-SERVER-12-2015-257 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-257 SKIP SUSE-RU-2015:1037-1 as SUSE-SLE-SERVER-12-2015-258 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-258,SUSE-SLE-SDK-12-2015-258,SUSE-SLE-SERVER-12-2015-258 SKIP SUSE-RU-2015:1038-1 as SUSE-SLE-SERVER-12-2015-260 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-260,SUSE-SLE-SERVER-12-2015-260 SKIP SUSE-RU-2015:1039-1 as SUSE-SLE-HA-12-2015-259 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-259 SKIP SUSE-RU-2015:1040-1 as SUSE-SLE-SERVER-12-2015-261 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-261,SUSE-SLE-SERVER-12-2015-261 SKIP SUSE-RU-2015:1054-1 as slessp3-xorg-x11-driver-video is not security or has no CVEs. patches: sledsp3-xorg-x11-driver-video,slessp3-xorg-x11-driver-video SKIP SUSE-RU-2015:1055-1 as slessp3-microcode_ctl is not security or has no CVEs. patches: sledsp3-microcode_ctl,slessp3-microcode_ctl SKIP SUSE-RU-2015:1065-1 as slessp3-aaa_base is not security or has no CVEs. patches: sledsp3-aaa_base,slessp3-aaa_base SKIP SUSE-RU-2015:1072-1 as slessp3-yast2-network-201506 is not security or has no CVEs. patches: sdksp3-yast2-network-201506,sledsp3-yast2-network-201506,slessp3-yast2-network-201506 SKIP SUSE-RU-2015:1074-1 as slessp3-libdrm-baytrail is not security or has no CVEs. patches: sdksp3-libdrm-baytrail,sledsp3-libdrm-baytrail,slessp3-libdrm-baytrail SKIP SUSE-RU-2015:1075-1 as SUSE-SLE-SERVER-12-2015-272 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-272,SUSE-SLE-SERVER-12-2015-272 SKIP SUSE-RU-2015:1079-1 as SUSE-SLE-SERVER-12-2015-274 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-274,SUSE-SLE-SDK-12-2015-274,SUSE-SLE-SERVER-12-2015-274 SKIP SUSE-RU-2015:1081-1 as SUSE-SLE-SERVER-12-2015-275 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-275,SUSE-SLE-SDK-12-2015-275,SUSE-SLE-SERVER-12-2015-275 SKIP SUSE-RU-2015:1084-1 as sleman21-release-notes-susemanager is not security or has no CVEs. patches: sleman21-release-notes-susemanager SKIP SUSE-RU-2015:1087-1 as SUSE-SLE-SERVER-12-2015-276 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-276,SUSE-SLE-SERVER-12-2015-276 SKIP SUSE-RU-2015:1088-1 as sleclo50sp3-neutron-nova-0415 is not security or has no CVEs. patches: sleclo50sp3-neutron-nova-0415 SKIP SUSE-RU-2015:1089-1 as sleman21-susemanager-sync-data is not security or has no CVEs. patches: sleman21-susemanager-sync-data SKIP SUSE-RU-2015:1093-1 as SUSE-SLE-SERVER-12-2015-277 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-277,SUSE-SLE-SERVER-12-2015-277 ERROR: notice SUSE-RU-2015:1101-1 has no valid patches out of: sledsp4-dmraid-223,slessp4-dmraid-223 ERROR: notice SUSE-RU-2015:1104-1 has no valid patches out of: sledsp4-zypper-0415-180,slessp4-zypper-0415-180 SKIP SUSE-RU-2015:1105-1 as SUSE-SLE12-CLOUD-5-2015-242 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-242 ERROR: notice SUSE-RU-2015:1106-1 has no valid patches out of: sledsp4-openiscsi-256,slessp4-openiscsi-256 SKIP SUSE-RU-2015:1107-1 as SUSE-SLE12-CLOUD-5-2015-243 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-243 ERROR: notice SUSE-RU-2015:1108-1 has no valid patches out of: sledsp4-openiscsi-256,slessp4-openiscsi-256 SKIP SUSE-RU-2015:1110-1 as SUSE-SLE12-CLOUD-5-2015-243 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-243 SKIP SUSE-RU-2015:1113-1 as SUSE-SLE12-CLOUD-5-2015-241 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-241 ERROR: notice SUSE-RU-2015:1114-1 has no valid patches out of: sdksp4-kernel-ec2-231,sledsp4-kernel-ec2-231,slessp4-kernel-ec2-231 ERROR: notice SUSE-RU-2015:1115-1 has no valid patches out of: sdksp4-lldpad-216,slessp4-lldpad-216 ERROR: notice SUSE-RU-2015:1117-1 has no valid patches out of: sdksp4-util-linux-218,sledsp4-util-linux-218,slessp4-util-linux-218 SKIP SUSE-RU-2015:1118-1 as SUSE-SLE12-CLOUD-5-2015-241 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-241 ERROR: notice SUSE-RU-2015:1119-1 has no valid patches out of: sdksp4-kernel-ec2-231,sledsp4-kernel-ec2-231,slessp4-kernel-ec2-231 ERROR: notice SUSE-RU-2015:1120-1 has no valid patches out of: sdksp4-lldpad-216,slessp4-lldpad-216 ERROR: notice SUSE-RU-2015:1121-1 has no valid patches out of: sdksp4-bluez-251,sledsp4-bluez-251,slessp4-bluez-251 ERROR: notice SUSE-RU-2015:1122-1 has no valid patches out of: sdksp4-sg3_utils-0415-179,sledsp4-sg3_utils-0415-179,slessp4-sg3_utils-0415-179 ERROR: notice SUSE-RU-2015:1123-1 has no valid patches out of: sdksp4-util-linux-218,sledsp4-util-linux-218,slessp4-util-linux-218 ERROR: notice SUSE-RU-2015:1124-1 has no valid patches out of: sdksp4-bluez-251,sledsp4-bluez-251,slessp4-bluez-251 ERROR: notice SUSE-RU-2015:1125-1 has no valid patches out of: sdksp4-sg3_utils-0415-179,sledsp4-sg3_utils-0415-179,slessp4-sg3_utils-0415-179 SKIP SUSE-RU-2015:1126-1 as sleclo40sp3-hyperv-pacemaker-0415 is not security or has no CVEs. patches: sleclo40sp3-hyperv-pacemaker-0415 SKIP SUSE-RU-2015:1142-1 as SUSE-SLE-SERVER-12-2015-283 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-283,SUSE-SLE-SERVER-12-2015-283 SKIP SUSE-RU-2015:1145-1 as slessp3-timezone-2015e is not security or has no CVEs. patches: sdksp3-timezone-2015e,sledsp3-timezone-2015e,slessp3-timezone-2015e SKIP SUSE-RU-2015:1149-1 as SUSE-SLE-WE-12-2015-284 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-284,SUSE-SLE-WE-12-2015-284 SKIP SUSE-RU-2015:1154-1 as SUSE-SLE-SERVER-12-2015-286 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-286,SUSE-SLE-SERVER-12-2015-286 SKIP SUSE-RU-2015:1158-1 as SUSE-SLE-Module-Public-Cloud-12-2015-287 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-287,SUSE-SLE-Module-Public-Cloud-12-2015-287 SKIP SUSE-RU-2015:1159-1 as sleclo40sp3-crowbar-barclamp-glance is not security or has no CVEs. patches: sleclo40sp3-crowbar-barclamp-glance SKIP SUSE-RU-2015:1163-1 as SUSE-SLE-SERVER-12-2015-290 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-290,SUSE-SLE-SERVER-12-2015-290 SKIP SUSE-RU-2015:1164-1 as SUSE-SLE-Module-Public-Cloud-12-2015-289 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-289 SKIP SUSE-RU-2015:1165-1 as SUSE-Storage-1.0-2015-293 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-293,SUSE-Storage-1.0-2015-293 SKIP SUSE-RU-2015:1166-1 as SUSE-SLE-SERVER-12-2015-291 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-291,SUSE-SLE-SERVER-12-2015-291 SKIP SUSE-RU-2015:1167-1 as SUSE-Storage-1.0-2015-292 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-292,SUSE-Storage-1.0-2015-292 SKIP SUSE-RU-2015:1176-1 as SUSE-SLE-SERVER-12-2015-295 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-295,SUSE-SLE-SDK-12-2015-295,SUSE-SLE-SERVER-12-2015-295 SKIP SUSE-RU-2015:1178-1 as sleclo40sp3-crowbar-barclamp-network is not security or has no CVEs. patches: sleclo40sp3-crowbar-barclamp-network SKIP SUSE-RU-2015:1186-1 as sleclo50sp3-ruby2.1-rubygem-chef is not security or has no CVEs. patches: sleclo50sp3-ruby2.1-rubygem-chef SKIP SUSE-RU-2015:1187-1 as sleclo40sp3-openstack-neutron is not security or has no CVEs. patches: sleclo40sp3-openstack-neutron SKIP SUSE-RU-2015:1188-1 as sleclo50sp3-rubygem-merb-core-ohai-0415 is not security or has no CVEs. patches: sleclo50sp3-rubygem-merb-core-ohai-0415 SKIP SUSE-RU-2015:1198-1 as SUSE-SLE-SERVER-12-2015-298 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-298 SKIP SUSE-RU-2015:1198-2 as SUSE-SLE-SERVER-12-2015-298 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-298,SUSE-SLE-SERVER-12-2015-298 SKIP SUSE-RU-2015:1199-1 as SUSE-SLE-Live-Patching-12-2015-299 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2015-299 SKIP SUSE-RU-2015:1201-1 as SUSE-SLE-Module-Public-Cloud-12-2015-301 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-301 SKIP SUSE-RU-2015:1202-1 as pubclsp3-cloud-init is not security or has no CVEs. patches: pubclsp3-cloud-init SKIP SUSE-RU-2015:1203-1 as SUSE-SLE-SERVER-12-2015-302 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-302,SUSE-SLE-SERVER-12-2015-302 SKIP SUSE-RU-2015:1217-1 as sleclo40sp3-crowbar-barclamp-nova is not security or has no CVEs. patches: sleclo40sp3-crowbar-barclamp-nova SKIP SUSE-RU-2015:1219-1 as SUSE-SLE-HA-GEO-12-2015-308 is not security or has no CVEs. patches: SUSE-SLE-HA-GEO-12-2015-308 SKIP SUSE-RU-2015:1220-1 as SUSE-SLE-SERVER-12-2015-309 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-309 SKIP SUSE-RU-2015:1221-1 as SUSE-SLE-SERVER-12-2015-310 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-310 SKIP SUSE-RU-2015:1221-2 as SUSE-SLE-SERVER-12-2015-310 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-310 SKIP SUSE-RU-2015:1222-1 as SUSE-SLE-SERVER-12-2015-313 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-313,SUSE-SLE-SERVER-12-2015-313 SKIP SUSE-RU-2015:1222-2 as SUSE-SLE-SERVER-12-2015-313 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-313,SUSE-SLE-SDK-12-2015-313,SUSE-SLE-SERVER-12-2015-313 SKIP SUSE-RU-2015:1223-1 as SUSE-SLE-SERVER-12-2015-312 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-312 SKIP SUSE-RU-2015:1223-2 as SUSE-SLE-SERVER-12-2015-312 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-312 SKIP SUSE-RU-2015:1225-1 as SUSE-SLE-SERVER-12-2015-314 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-314,SUSE-SLE-HA-12-2015-314,SUSE-SLE-SDK-12-2015-314,SUSE-SLE-SERVER-12-2015-314 SKIP SUSE-RU-2015:1241-1 as SUSE-SLE-SERVER-12-2015-316 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-316,SUSE-SLE-SERVER-12-2015-316 SKIP SUSE-RU-2015:1243-1 as sleclo40sp3-cinder-0415 is not security or has no CVEs. patches: sleclo40sp3-cinder-0415 SKIP SUSE-RU-2015:1246-1 as slessp4-inst-source-utils-3 is not security or has no CVEs. patches: sdksp3-inst-source-utils-3,sdksp4-inst-source-utils-3,sledsp3-inst-source-utils-3,sledsp4-inst-source-utils-3,slessp3-inst-source-utils-3,slessp4-inst-source-utils-3 SKIP SUSE-RU-2015:1248-1 as SUSE-SLE-SERVER-12-2015-319 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-319 SKIP SUSE-RU-2015:1251-1 as SUSE-SLE-SERVER-12-2015-326 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-326,SUSE-SLE-SERVER-12-2015-326 SKIP SUSE-RU-2015:1257-1 as SUSE-SLE-SERVER-12-2015-325 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-325,SUSE-SLE-SERVER-12-2015-325 SKIP SUSE-RU-2015:1270-1 as sleclo50sp3-openstack-manila-0615 is not security or has no CVEs. patches: sleclo50sp3-openstack-manila-0615 SKIP SUSE-RU-2015:1272-1 as slessp4-sles-manuals_en-201507-12003 is not security or has no CVEs. patches: sledsp4-sles-manuals_en-201507-12003,slessp4-sles-manuals_en-201507-12003 SKIP SUSE-RU-2015:1275-1 as SUSE-SLE-SERVER-12-2015-334 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-334,SUSE-SLE-SERVER-12-2015-334 SKIP SUSE-RU-2015:1283-1 as SUSE-SLE12-CLOUD-5-2015-338 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-338 SKIP SUSE-RU-2015:1284-1 as sleclo50sp3-supportutils-plugin-susecloud-201507-12005 is not security or has no CVEs. patches: sleclo50sp3-supportutils-plugin-susecloud-201507-12005 SKIP SUSE-RU-2015:1297-1 as SUSE-SLE-SERVER-12-2015-342 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-342,SUSE-SLE-SERVER-12-2015-342 SKIP SUSE-RU-2015:1303-1 as SUSE-SLE-SERVER-12-2015-345 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-345,SUSE-SLE-SDK-12-2015-345,SUSE-SLE-SERVER-12-2015-345 SKIP SUSE-RU-2015:1306-1 as slesctsp3-client-tools-21-201506 is not security or has no CVEs. patches: slesctsp3-client-tools-21-201506 SKIP SUSE-RU-2015:1307-1 as slemap21-suse-manager-proxy-21-201506 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201506 SKIP SUSE-RU-2015:1308-1 as slessp3-client-tools-21-201506 is not security or has no CVEs. patches: sledsp3-client-tools-21-201506,slessp3-client-tools-21-201506 SKIP SUSE-RU-2015:1309-1 as slessp3-SLES-SP4-Migration is not security or has no CVEs. patches: sdksp3-SDK-SP4-Migration,sledsp3-SLED-SP4-Migration,slehasp3-SLE-HA-SP4-Migration,slessp3-SLES-SP4-Migration SKIP SUSE-RU-2015:1310-1 as sleman21-suse-manager-21-201506 is not security or has no CVEs. patches: sleman21-suse-manager-21-201506 SKIP SUSE-RU-2015:1313-1 as SUSE-SLE-SERVER-12-2015-349 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-349,SUSE-SLE-SERVER-12-2015-349 SKIP SUSE-RU-2015:1314-1 as SUSE-SLE-Manager-Tools-12-2015-350 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-350 SKIP SUSE-RU-2015:1318-1 as SUSE-SLE-SERVER-12-2015-354 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-354,SUSE-SLE-SDK-12-2015-354,SUSE-SLE-SERVER-12-2015-354 SKIP SUSE-RU-2015:1321-1 as slessp3-release-notes-sles-201506 is not security or has no CVEs. patches: slessp3-release-notes-sles-201506 SKIP SUSE-RU-2015:1327-1 as SUSE-SLE-SERVER-12-2015-357 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-357 SKIP SUSE-RU-2015:1330-1 as SUSE-SLE-WE-12-2015-361 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-361,SUSE-SLE-SDK-12-2015-361,SUSE-SLE-SERVER-12-2015-361,SUSE-SLE-WE-12-2015-361 SKIP SUSE-RU-2015:1338-1 as sleman21-spacewalk-backend-12016 is not security or has no CVEs. patches: sleman21-spacewalk-backend-12016 SKIP SUSE-RU-2015:1339-1 as sleman21-suse-manager-21-201507-12015 is not security or has no CVEs. patches: sleman21-suse-manager-21-201507-12015 SKIP SUSE-RU-2015:1349-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-370 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-370 SKIP SUSE-RU-2015:1350-1 as SUSE-SLE-SERVER-12-2015-372 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-372,SUSE-SLE-SERVER-12-2015-372 SKIP SUSE-RU-2015:1354-1 as sleclo50sp3-provisioner-cloud-upgrade-201506 is not security or has no CVEs. patches: sleclo50sp3-provisioner-cloud-upgrade-201506 SKIP SUSE-RU-2015:1355-1 as SUSE-SLE-Module-Public-Cloud-12-2015-377 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-377 SKIP SUSE-RU-2015:1356-1 as SUSE-SLE-SERVER-12-2015-376 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-376,SUSE-SLE-SDK-12-2015-376,SUSE-SLE-SERVER-12-2015-376 SKIP SUSE-RU-2015:1357-1 as slessp4-open-iscsi-12018 is not security or has no CVEs. patches: sledsp4-open-iscsi-12018,slessp4-open-iscsi-12018 SKIP SUSE-RU-2015:1358-1 as SUSE-SLE-Module-Public-Cloud-12-2015-378 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-378 SKIP SUSE-RU-2015:1360-1 as slessp4-open-fcoe-12019 is not security or has no CVEs. patches: slessp4-open-fcoe-12019 SKIP SUSE-RU-2015:1362-1 as SUSE-SLE-SERVER-12-2015-383 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-383,SUSE-SLE-SERVER-12-2015-383 SKIP SUSE-RU-2015:1363-1 as slessp4-xorg-x11-driver-input-12021 is not security or has no CVEs. patches: sledsp3-xorg-x11-driver-input-12021,sledsp4-xorg-x11-driver-input-12021,slessp3-xorg-x11-driver-input-12021,slessp4-xorg-x11-driver-input-12021 SKIP SUSE-RU-2015:1365-1 as sleclo50sp3-crowbar-barclamp-glance-12022 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-glance-12022 SKIP SUSE-RU-2015:1366-1 as slessp4-sysconfig-12023 is not security or has no CVEs. patches: sledsp3-sysconfig-12023,sledsp4-sysconfig-12023,slessp3-sysconfig-12023,slessp4-sysconfig-12023 SKIP SUSE-RU-2015:1381-1 as SUSE-SLE-SERVER-12-2015-397 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-397,SUSE-SLE-SDK-12-2015-397,SUSE-SLE-SERVER-12-2015-397 SKIP SUSE-RU-2015:1386-1 as SUSE-SLE-Module-Containers-12-2015-400 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-400 SKIP SUSE-RU-2015:1392-1 as sleclo50sp3-crowbar-201507-12029 is not security or has no CVEs. patches: sleclo50sp3-crowbar-201507-12029 SKIP SUSE-RU-2015:1393-1 as sleclo50sp3-openstack-trove-201507-12030 is not security or has no CVEs. patches: sleclo50sp3-openstack-trove-201507-12030 SKIP SUSE-RU-2015:1394-1 as SUSE-SLE-Module-Containers-12-2015-404 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-404 SKIP SUSE-RU-2015:1395-1 as slehagsp4-release-notes-ha-geo-12031 is not security or has no CVEs. patches: slehagsp4-release-notes-ha-geo-12031 SKIP SUSE-RU-2015:1396-1 as slessp3-sgml-skel-12032 is not security or has no CVEs. patches: slessp3-sgml-skel-12032 SKIP SUSE-RU-2015:1396-2 as slessp4-sgml-skel-12032 is not security or has no CVEs. patches: sledsp3-sgml-skel-12032,sledsp4-sgml-skel-12032,slessp3-sgml-skel-12032,slessp4-sgml-skel-12032 SKIP SUSE-RU-2015:1397-1 as SUSE-SLE12-CLOUD-5-2015-406 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-406 SKIP SUSE-RU-2015:1398-1 as slertesp3-SLERT-SP4-Migration is not security or has no CVEs. patches: slertesp3-SLERT-SP4-Migration SKIP SUSE-RU-2015:1399-1 as SUSE-SLE-SERVER-12-2015-408 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-408,SUSE-SLE-SERVER-12-2015-408 SKIP SUSE-RU-2015:1405-1 as SUSE-SLE-SERVER-12-2015-412 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-412,SUSE-SLE-SERVER-12-2015-412 SKIP SUSE-RU-2015:1406-1 as slessp4-cpio-12034 is not security or has no CVEs. patches: sledsp3-cpio-12034,sledsp4-cpio-12034,slessp3-cpio-12034,slessp4-cpio-12034 SKIP SUSE-RU-2015:1407-1 as SUSE-SLE-SERVER-12-2015-411 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-411,SUSE-SLE-SERVER-12-2015-411 SKIP SUSE-RU-2015:1413-1 as SUSE-SLE-SERVER-12-2015-416 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-416,SUSE-SLE-SERVER-12-2015-416 SKIP SUSE-RU-2015:1414-1 as slessp4-timezone-2015f-12037 is not security or has no CVEs. patches: sdksp3-timezone-2015f-12037,sdksp4-timezone-2015f-12037,sledsp3-timezone-2015f-12037,sledsp4-timezone-2015f-12037,slessp1-timezone-2015f-12037,slessp2-timezone-2015f-12037,slessp3-timezone-2015f-12037,slessp4-timezone-2015f-12037 SKIP SUSE-RU-2015:1416-1 as SUSE-SLE-SERVER-12-2015-421 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-421,SUSE-SLE-SERVER-12-2015-421 SKIP SUSE-RU-2015:1418-1 as SUSE-SLE-SERVER-12-2015-423 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-423 SKIP SUSE-RU-2015:1419-1 as SUSE-SLE-SERVER-12-2015-426 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-426,SUSE-SLE-SERVER-12-2015-426 SKIP SUSE-RU-2015:1423-1 as SUSE-SLE-Module-Web-Scripting-12-2015-427 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2015-427,SUSE-SLE-Manager-Tools-12-2015-427,SUSE-SLE-Module-Adv-Systems-Management-12-2015-427,SUSE-SLE-Module-Containers-12-2015-427,SUSE-SLE-Module-Legacy-12-2015-427,SUSE-SLE-Module-Public-Cloud-12-2015-427,SUSE-SLE-Module-Web-Scripting-12-2015-427 SKIP SUSE-RU-2015:1427-1 as SUSE-SLE-SDK-12-2015-430 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-430,SUSE-SLE-SDK-12-2015-430 SKIP SUSE-RU-2015:1431-1 as slessp3-udev-12043 is not security or has no CVEs. patches: sdksp3-udev-12043,sledsp3-udev-12043,slessp3-udev-12043 SKIP SUSE-RU-2015:1432-1 as slessp4-udev-12044 is not security or has no CVEs. patches: sdksp4-udev-12044,sledsp4-udev-12044,slessp4-udev-12044 SKIP SUSE-RU-2015:1435-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-438 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-438 SKIP SUSE-RU-2015:1436-1 as SUSE-SLE-SERVER-12-2015-439 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-439,SUSE-SLE-SERVER-12-2015-439 SKIP SUSE-RU-2015:1438-1 as SUSE-SLE-SDK-12-2015-441 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-441 SKIP SUSE-RU-2015:1441-1 as slessp4-sax2-12047 is not security or has no CVEs. patches: sdksp4-sax2-12047,sledsp4-sax2-12047,slessp4-sax2-12047 SKIP SUSE-RU-2015:1442-1 as SUSE-SLE-Module-Public-Cloud-12-2015-445 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-445 SKIP SUSE-RU-2015:1443-1 as SUSE-SLE-SERVER-12-2015-447 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-447,SUSE-SLE-SERVER-12-2015-447 SKIP SUSE-RU-2015:1446-1 as SUSE-SLE-Module-Public-Cloud-12-2015-450 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-450 SKIP SUSE-RU-2015:1447-1 as SUSE-SLE-SERVER-12-2015-451 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-451 SKIP SUSE-RU-2015:1448-1 as sleclo50sp3-crowbar-barclamp-heat-12050 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-heat-12050 SKIP SUSE-RU-2015:1450-1 as slessp4-release-notes-sles-12051 is not security or has no CVEs. patches: slessp4-release-notes-sles-12051 SKIP SUSE-RU-2015:1451-1 as sleclo50sp3-crowbar-barclamp-dns-12052 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-dns-12052 SKIP SUSE-RU-2015:1456-1 as SUSE-SLE-WE-12-2015-458 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-458,SUSE-SLE-WE-12-2015-458 SKIP SUSE-RU-2015:1457-1 as SUSE-SLE-SDK-12-2015-459 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-459 SKIP SUSE-RU-2015:1463-1 as sleman21-release-notes-susemanager-12054 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-12054 SKIP SUSE-RU-2015:1464-1 as sleclo40sp3-keystone-201508-12055 is not security or has no CVEs. patches: sleclo40sp3-keystone-201508-12055 SKIP SUSE-RU-2015:1467-1 as SUSE-SLE-SERVER-12-2015-465 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-465,SUSE-SLE-SDK-12-2015-465,SUSE-SLE-SERVER-12-2015-465 SKIP SUSE-RU-2015:1468-1 as pubclsp3-cloud-regionsrv-client-12058 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-12058 SKIP SUSE-RU-2015:1470-1 as sleclo50sp3-crowbar-barclamp-ipmi-12061 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-ipmi-12061 SKIP SUSE-RU-2015:1471-1 as sleclo50sp3-rubygem-bunny-0_6-12060 is not security or has no CVEs. patches: sleclo50sp3-rubygem-bunny-0_6-12060 SKIP SUSE-RU-2015:1474-1 as sleclo50sp3-crowbar-barclamp-swift-12063 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-swift-12063 SKIP SUSE-RU-2015:1483-1 as SUSE-SLE-SERVER-12-2015-480 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-480,SUSE-SLE-SERVER-12-2015-480 SKIP SUSE-RU-2015:1493-1 as SUSE-SLE-SERVER-12-2015-489 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-489,SUSE-SLE-SDK-12-2015-489,SUSE-SLE-SERVER-12-2015-489 SKIP SUSE-RU-2015:1494-1 as SUSE-SLE-SERVER-12-2015-490 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-490,SUSE-SLE-SERVER-12-2015-490 SKIP SUSE-RU-2015:1494-2 as SUSE-SLE-DESKTOP-12-2015-490 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-490 SKIP SUSE-RU-2015:1495-1 as SUSE-SLE-WE-12-2015-491 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-491,SUSE-SLE-WE-12-2015-491 SKIP SUSE-RU-2015:1497-1 as slesappsp3-SLES-SAP-SP4-Migration is not security or has no CVEs. patches: slesappsp3-SLES-SAP-SP4-Migration SKIP SUSE-RU-2015:1498-1 as SUSE-SLE-WE-12-2015-493 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-493,SUSE-SLE-SDK-12-2015-493,SUSE-SLE-SERVER-12-2015-493,SUSE-SLE-WE-12-2015-493 SKIP SUSE-RU-2015:1505-1 as SUSE-SLE-SDK-12-2015-495 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-495 SKIP SUSE-RU-2015:1507-1 as SUSE-Storage-1.0-2015-496 is not security or has no CVEs. patches: SUSE-Storage-1.0-2015-496 SKIP SUSE-RU-2015:1508-1 as SUSE-SLE-SERVER-12-2015-498 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-498 SKIP SUSE-RU-2015:1508-2 as SUSE-SLE-DESKTOP-12-2015-498 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-498 SKIP SUSE-RU-2015:1512-1 as SUSE-SLE-SERVER-12-2015-503 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-503,SUSE-SLE-SERVER-12-2015-503 SKIP SUSE-RU-2015:1514-1 as sleclo50sp3-crowbar-barclamp-database-pacemaker-rabbitmq-201507-12073 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-database-pacemaker-rabbitmq-201507-12073 SKIP SUSE-RU-2015:1516-1 as slesappsp4-SAPHanaSR-12078 is not security or has no CVEs. patches: slesappsp4-SAPHanaSR-12078 SKIP SUSE-RU-2015:1517-1 as slessp3-open-iscsi-12075 is not security or has no CVEs. patches: sledsp3-open-iscsi-12075,slessp3-open-iscsi-12075 SKIP SUSE-RU-2015:1520-1 as SUSE-SLE-SAP-12-2015-512 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2015-512 SKIP SUSE-RU-2015:1521-1 as SUSE-SLE-SERVER-12-2015-508 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-508,SUSE-SLE-SDK-12-2015-508,SUSE-SLE-SERVER-12-2015-508 SKIP SUSE-RU-2015:1523-1 as slesappsp3-SAPHanaSR-12077 is not security or has no CVEs. patches: slesappsp3-SAPHanaSR-12077 SKIP SUSE-RU-2015:1527-1 as sledsp3-release-notes-sled-201508-12082 is not security or has no CVEs. patches: sledsp3-release-notes-sled-201508-12082 SKIP SUSE-RU-2015:1529-1 as SUSE-SLE-SERVER-12-2015-520 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-520 SKIP SUSE-RU-2015:1529-2 as SUSE-SLE-SERVER-12-2015-520 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-520,SUSE-SLE-SERVER-12-2015-520 SKIP SUSE-RU-2015:1530-1 as slessp3-yast2-12084 is not security or has no CVEs. patches: sdksp3-yast2-12084,sledsp3-yast2-12084,slessp3-yast2-12084 SKIP SUSE-RU-2015:1531-1 as SUSE-SLE-SERVER-12-2015-521 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-521,SUSE-SLE-SDK-12-2015-521,SUSE-SLE-SERVER-12-2015-521 SKIP SUSE-RU-2015:1541-1 as slessp4-autofs-12086 is not security or has no CVEs. patches: sledsp3-autofs-12086,sledsp4-autofs-12086,slessp3-autofs-12086,slessp4-autofs-12086 SKIP SUSE-RU-2015:1542-1 as slessp3-WALinuxAgent-12085 is not security or has no CVEs. patches: pubclsp3-WALinuxAgent-12085,slessp3-WALinuxAgent-12085 SKIP SUSE-RU-2015:1543-1 as SUSE-SLE-SERVER-12-2015-525 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-525,SUSE-SLE-SERVER-12-2015-525 SKIP SUSE-RU-2015:1548-1 as SUSE-SLE-Module-Public-Cloud-12-2015-529 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-529 SKIP SUSE-RU-2015:1549-1 as SUSE-SLE-SERVER-12-2015-530 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-530,SUSE-SLE-SERVER-12-2015-530 SKIP SUSE-RU-2015:1550-1 as slessp4-sed-12088 is not security or has no CVEs. patches: sledsp3-sed-12088,sledsp4-sed-12088,slessp3-sed-12088,slessp4-sed-12088 SKIP SUSE-RU-2015:1551-1 as SUSE-SLE-SERVER-12-2015-531 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-531,SUSE-SLE-SERVER-12-2015-531 SKIP SUSE-RU-2015:1552-1 as SUSE-SLE-SERVER-12-2015-533 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-533,SUSE-SLE-SERVER-12-2015-533 SKIP SUSE-RU-2015:1553-1 as slessp4-usbutils-12089 is not security or has no CVEs. patches: sledsp4-usbutils-12089,slessp4-usbutils-12089 SKIP SUSE-RU-2015:1554-1 as SUSE-SLE-SERVER-12-2015-535 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-535,SUSE-SLE-SERVER-12-2015-535 SKIP SUSE-RU-2015:1555-1 as SUSE-SLE-Module-Containers-12-2015-538 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-538 SKIP SUSE-RU-2015:1559-1 as SUSE-SLE-SDK-12-2015-543 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-543,SUSE-SLE-SDK-12-2015-543 SKIP SUSE-RU-2015:1560-1 as slessp3-release-notes-sles-201508-12091 is not security or has no CVEs. patches: slessp3-release-notes-sles-201508-12091 SKIP SUSE-RU-2015:1561-1 as SUSE-SLE-SERVER-12-2015-545 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-545,SUSE-SLE-SERVER-12-2015-545 SKIP SUSE-RU-2015:1562-1 as SUSE-SLE-SERVER-12-2015-546 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-546,SUSE-SLE-SERVER-12-2015-546 SKIP SUSE-RU-2015:1563-1 as SUSE-SLE-SERVER-12-2015-548 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-548,SUSE-SLE-SDK-12-2015-548,SUSE-SLE-SERVER-12-2015-548 SKIP SUSE-RU-2015:1564-1 as SUSE-SLE-SERVER-12-2015-547 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-547 SKIP SUSE-RU-2015:1567-1 as slessp4-release-notes-sles-12093 is not security or has no CVEs. patches: slessp4-release-notes-sles-12093 SKIP SUSE-RU-2015:1568-1 as SUSE-SLE-SERVER-12-2015-553 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-553,SUSE-SLE-SERVER-12-2015-553 SKIP SUSE-RU-2015:1569-1 as SUSE-SLE-SERVER-12-2015-552 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-552,SUSE-SLE-SDK-12-2015-552,SUSE-SLE-SERVER-12-2015-552 SKIP SUSE-RU-2015:1570-1 as sleclo50sp3-rubygem-chef-12094 is not security or has no CVEs. patches: sleclo50sp3-rubygem-chef-12094 SKIP SUSE-RU-2015:1573-1 as SUSE-Storage-1.0-2015-556 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-556,SUSE-SLE-Module-Public-Cloud-12-2015-556,SUSE-SLE-SERVER-12-2015-556,SUSE-SLE12-CLOUD-5-2015-556,SUSE-Storage-1.0-2015-556 SKIP SUSE-RU-2015:1576-1 as SUSE-Storage-1.0-2015-557 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-557,SUSE-Storage-1.0-2015-557 SKIP SUSE-RU-2015:1584-1 as SUSE-SLE-SERVER-12-2015-559 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-559,SUSE-SLE-HA-12-2015-559,SUSE-SLE-Module-Public-Cloud-12-2015-559,SUSE-SLE-SERVER-12-2015-559 SKIP SUSE-RU-2015:1585-1 as SUSE-SLE-HA-12-2015-560 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-560 SKIP SUSE-RU-2015:1587-1 as SUSE-SLE-SERVER-12-2015-561 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-561,SUSE-SLE-SERVER-12-2015-561 SKIP SUSE-RU-2015:1588-1 as SUSE-SLE-SDK-12-2015-562 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-562,SUSE-SLE-SDK-12-2015-562 SKIP SUSE-RU-2015:1589-1 as slessp3-ipmitool-12097 is not security or has no CVEs. patches: sledsp3-ipmitool-12097,slessp3-ipmitool-12097 SKIP SUSE-RU-2015:1590-1 as SUSE-SLE-SERVER-12-2015-564 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-564,SUSE-SLE-SERVER-12-2015-564 SKIP SUSE-RU-2015:1591-1 as slessp4-mcelog-12098 is not security or has no CVEs. patches: sledsp4-mcelog-12098,slessp4-mcelog-12098 SKIP SUSE-RU-2015:1599-1 as SUSE-SLE-SERVER-12-2015-567 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-567,SUSE-SLE-SDK-12-2015-567,SUSE-SLE-SERVER-12-2015-567 SKIP SUSE-RU-2015:1600-1 as SUSE-SLE-SERVER-12-2015-568 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-568,SUSE-SLE-SERVER-12-2015-568 SKIP SUSE-RU-2015:1601-1 as SUSE-SLE-SERVER-12-2015-569 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-569,SUSE-SLE-Module-Web-Scripting-12-2015-569,SUSE-SLE-SDK-12-2015-569,SUSE-SLE-SERVER-12-2015-569 SKIP SUSE-RU-2015:1603-1 as SUSE-SLE-SERVER-12-2015-572 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-572,SUSE-SLE-SERVER-12-2015-572 SKIP SUSE-RU-2015:1604-1 as SUSE-SLE-SERVER-12-2015-573 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-573,SUSE-SLE-SDK-12-2015-573,SUSE-SLE-SERVER-12-2015-573 SKIP SUSE-RU-2015:1605-1 as SUSE-SLE-SERVER-12-2015-571 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-571,SUSE-SLE-SERVER-12-2015-571 SKIP SUSE-RU-2015:1606-1 as SUSE-SLE-SERVER-12-2015-575 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-575,SUSE-SLE-SERVER-12-2015-575 SKIP SUSE-RU-2015:1607-1 as SUSE-SLE12-CLOUD-5-2015-577 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-577 SKIP SUSE-RU-2015:1608-1 as SUSE-SLE-SERVER-12-2015-576 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-576,SUSE-SLE-SERVER-12-2015-576 SKIP SUSE-RU-2015:1609-1 as SUSE-SLE-SERVER-12-2015-578 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-578,SUSE-SLE-SERVER-12-2015-578 SKIP SUSE-RU-2015:1610-1 as SUSE-SLE-SERVER-12-2015-579 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-579,SUSE-SLE-SERVER-12-2015-579 SKIP SUSE-RU-2015:1613-1 as SUSE-SLE-SERVER-12-2015-584 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-584,SUSE-SLE-SDK-12-2015-584,SUSE-SLE-SERVER-12-2015-584 SKIP SUSE-RU-2015:1615-1 as SUSE-SLE-SERVER-12-2015-586 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-586,SUSE-SLE-SDK-12-2015-586,SUSE-SLE-SERVER-12-2015-586 SKIP SUSE-RU-2015:1617-1 as SUSE-SLE-WE-12-2015-583 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-583,SUSE-SLE-WE-12-2015-583 SKIP SUSE-RU-2015:1619-1 as SUSE-SLE-SERVER-12-2015-585 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-585,SUSE-SLE-SERVER-12-2015-585 SKIP SUSE-RU-2015:1620-1 as SUSE-SLE-SERVER-12-2015-587 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-587,SUSE-SLE-Module-Legacy-12-2015-587,SUSE-SLE-SAP-12-2015-587,SUSE-SLE-SDK-12-2015-587,SUSE-SLE-SERVER-12-2015-587 SKIP SUSE-RU-2015:1621-1 as SUSE-SLE-SERVER-12-2015-589 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-589,SUSE-SLE-SERVER-12-2015-589 SKIP SUSE-RU-2015:1627-1 as SUSE-SLE-WE-12-2015-591 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-591,SUSE-SLE-SDK-12-2015-591,SUSE-SLE-WE-12-2015-591 SKIP SUSE-RU-2015:1630-1 as slessp4-tftp-12103 is not security or has no CVEs. patches: sledsp3-tftp-12103,sledsp4-tftp-12103,slessp3-tftp-12103,slessp4-tftp-12103 SKIP SUSE-RU-2015:1631-1 as SUSE-SLE-SERVER-12-2015-595 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-595,SUSE-SLE-SERVER-12-2015-595 SKIP SUSE-RU-2015:1634-1 as slessp4-s390-tools-12106 is not security or has no CVEs. patches: slessp4-s390-tools-12106 SKIP SUSE-RU-2015:1635-1 as SUSE-SLE-SERVER-12-2015-600 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-600,SUSE-SLE-SERVER-12-2015-600 SKIP SUSE-RU-2015:1636-1 as sleclo50sp3-crowbar-barclamp-crowbar-12105 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-crowbar-12105 SKIP SUSE-RU-2015:1638-1 as SUSE-SLE-SERVER-12-2015-605 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-605,SUSE-SLE-SERVER-12-2015-605 SKIP SUSE-RU-2015:1640-1 as SUSE-SLE-SERVER-12-2015-606 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-606,SUSE-SLE-SERVER-12-2015-606 SKIP SUSE-RU-2015:1641-1 as SUSE-SLE-WE-12-2015-608 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-608,SUSE-SLE-WE-12-2015-608 SKIP SUSE-RU-2015:1642-1 as sledsp4-pidgin-sipe-12108 is not security or has no CVEs. patches: sledsp3-pidgin-sipe-12108,sledsp4-pidgin-sipe-12108 ERROR: notice SUSE-RU-2015:1642-2 has no valid patches out of: SKIP SUSE-RU-2015:1645-1 as SUSE-SLE-SERVER-12-2015-616 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-616,SUSE-SLE-SERVER-12-2015-616 SKIP SUSE-RU-2015:1646-1 as slessp4-libvirt-12109 is not security or has no CVEs. patches: sdksp4-libvirt-12109,sledsp4-libvirt-12109,slessp4-libvirt-12109 SKIP SUSE-RU-2015:1649-1 as slessp4-open-vm-tools-12110 is not security or has no CVEs. patches: sledsp4-open-vm-tools-12110,slessp4-open-vm-tools-12110 SKIP SUSE-RU-2015:1652-1 as SUSE-SLE-SERVER-12-2015-621 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-621,SUSE-SLE-SERVER-12-2015-621 SKIP SUSE-RU-2015:1653-1 as SUSE-SLE-SERVER-12-2015-622 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-622,SUSE-SLE-SDK-12-2015-622,SUSE-SLE-SERVER-12-2015-622 SKIP SUSE-RU-2015:1654-1 as SUSE-SLE-WE-12-2015-620 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-620,SUSE-SLE-SERVER-12-2015-620,SUSE-SLE-WE-12-2015-620 SKIP SUSE-RU-2015:1657-1 as SUSE-SLE-SERVER-12-2015-624 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-624,SUSE-SLE-SDK-12-2015-624,SUSE-SLE-SERVER-12-2015-624 SKIP SUSE-RU-2015:1660-1 as SUSE-SLE-Module-Containers-12-2015-627 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-627 SKIP SUSE-RU-2015:1661-1 as SUSE-SLE-Module-Containers-12-2015-628 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-628 SKIP SUSE-RU-2015:1670-1 as SUSE-SLE-SERVER-12-2015-633 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-633,SUSE-SLE-SERVER-12-2015-633 SKIP SUSE-RU-2015:1671-1 as SUSE-SLE-WE-12-2015-634 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-634,SUSE-SLE-SDK-12-2015-634,SUSE-SLE-SERVER-12-2015-634,SUSE-SLE-WE-12-2015-634 SKIP SUSE-RU-2015:1673-1 as SUSE-SLE12-CLOUD-5-2015-635 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2015-635 SKIP SUSE-RU-2015:1690-1 as SUSE-SLE-SERVER-12-2015-643 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-643,SUSE-SLE-SDK-12-2015-643,SUSE-SLE-SERVER-12-2015-643 SKIP SUSE-RU-2015:1691-1 as SUSE-SLE-SERVER-12-2015-646 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-646 SKIP SUSE-RU-2015:1692-1 as SUSE-SLE-SERVER-12-2015-647 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-647 SKIP SUSE-RU-2015:1693-1 as SUSE-SLE-SERVER-12-2015-648 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-648,SUSE-SLE-SDK-12-2015-648,SUSE-SLE-SERVER-12-2015-648 SKIP SUSE-RU-2015:1694-1 as SUSE-SLE-SERVER-12-2015-651 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-651 SKIP SUSE-RU-2015:1694-2 as SUSE-SLE-DESKTOP-12-2015-651 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-651 SKIP SUSE-RU-2015:1696-1 as slesmtsp3-smt-12118 is not security or has no CVEs. patches: slesmtsp3-smt-12118 SKIP SUSE-RU-2015:1697-1 as SUSE-SLE-SERVER-12-2015-652 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-652 SKIP SUSE-RU-2015:1697-2 as SUSE-SLE-DESKTOP-12-2015-652 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-652 SKIP SUSE-RU-2015:1698-1 as slehasp4-sbd-12120 is not security or has no CVEs. patches: slehasp4-sbd-12120 SKIP SUSE-RU-2015:1700-1 as SUSE-SLE-SERVER-12-2015-654 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-654,SUSE-SLE-SERVER-12-2015-654 SKIP SUSE-RU-2015:1702-1 as SUSE-SLE-HA-12-2015-656 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-656 SKIP SUSE-RU-2015:1714-1 as SUSE-SLE-SERVER-12-2015-662 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-662,SUSE-SLE-SDK-12-2015-662,SUSE-SLE-SERVER-12-2015-662 SKIP SUSE-RU-2015:1715-1 as SUSE-SLE-SERVER-12-2015-664 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-664,SUSE-SLE-SERVER-12-2015-664 SKIP SUSE-RU-2015:1722-1 as SUSE-SLE-SERVER-12-2015-665 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-665,SUSE-SLE-SERVER-12-2015-665 SKIP SUSE-RU-2015:1725-1 as SUSE-SLE-SERVER-12-2015-667 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-667,SUSE-SLE-SERVER-12-2015-667 SKIP SUSE-RU-2015:1726-1 as SUSE-SLE-SERVER-12-2015-666 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-666,SUSE-SLE-SDK-12-2015-666,SUSE-SLE-SERVER-12-2015-666 SKIP SUSE-RU-2015:1729-1 as sleclo50sp3-release-notes-suse-cloud-201507-12125 is not security or has no CVEs. patches: sleclo50sp3-release-notes-suse-cloud-201507-12125 SKIP SUSE-RU-2015:1731-1 as SUSE-SLE-SERVER-12-2015-672 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-672,SUSE-SLE-SERVER-12-2015-672 SKIP SUSE-RU-2015:1732-1 as SUSE-SLE-SERVER-12-2015-673 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-673 SKIP SUSE-RU-2015:1736-1 as SUSE-SLE-SERVER-12-2015-677 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-677,SUSE-SLE-SDK-12-2015-677,SUSE-SLE-SERVER-12-2015-677 SKIP SUSE-RU-2015:1739-1 as SUSE-SLE-SERVER-12-2015-684 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-684,SUSE-SLE-SERVER-12-2015-684 SKIP SUSE-RU-2015:1741-1 as SUSE-SLE-SERVER-12-2015-682 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-682,SUSE-SLE-SERVER-12-2015-682 SKIP SUSE-RU-2015:1743-1 as slessp4-timezone-2015g-12128 is not security or has no CVEs. patches: sdksp3-timezone-2015g-12128,sdksp4-timezone-2015g-12128,sledsp3-timezone-2015g-12128,sledsp4-timezone-2015g-12128,slessp2-timezone-2015g-12128,slessp3-timezone-2015g-12128,slessp4-timezone-2015g-12128 SKIP SUSE-RU-2015:1745-1 as slessp4-gconf2-12129 is not security or has no CVEs. patches: sdksp3-gconf2-12129,sdksp4-gconf2-12129,sledsp3-gconf2-12129,sledsp4-gconf2-12129,slessp3-gconf2-12129,slessp4-gconf2-12129 SKIP SUSE-RU-2015:1746-1 as SUSE-SLE-SERVER-12-2015-685 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-685,SUSE-SLE-SDK-12-2015-685,SUSE-SLE-SERVER-12-2015-685 SKIP SUSE-RU-2015:1747-1 as slessp4-glibc-12130 is not security or has no CVEs. patches: sdksp3-glibc-12130,sdksp4-glibc-12130,sledsp3-glibc-12130,sledsp4-glibc-12130,slessp3-glibc-12130,slessp4-glibc-12130 SKIP SUSE-RU-2015:1748-1 as SUSE-SLE-SERVER-12-2015-689 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-689,SUSE-SLE-SERVER-12-2015-689 SKIP SUSE-RU-2015:1749-1 as SUSE-SLE-WE-12-2015-687 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-687,SUSE-SLE-SDK-12-2015-687,SUSE-SLE-SERVER-12-2015-687,SUSE-SLE-WE-12-2015-687 SKIP SUSE-RU-2015:1753-1 as SUSE-SLE-Manager-Tools-12-2015-693 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-693 SKIP SUSE-RU-2015:1754-1 as slessp4-client-tools-21-201509-12132 is not security or has no CVEs. patches: sledsp3-client-tools-21-201509-12132,sledsp4-client-tools-21-201509-12132,slessp3-client-tools-21-201509-12132,slessp4-client-tools-21-201509-12132 SKIP SUSE-RU-2015:1755-1 as SUSE-SLE-SERVER-12-2015-696 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-696,SUSE-SLE-SERVER-12-2015-696 SKIP SUSE-RU-2015:1756-1 as slemap21-suse-manager-proxy-21-201509-12132 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201509-12132 SKIP SUSE-RU-2015:1758-1 as sleman21-suse-manager-21-201509-12132 is not security or has no CVEs. patches: sleman21-suse-manager-21-201509-12132 SKIP SUSE-RU-2015:1759-1 as slessp4-xorg-x11-server-12134 is not security or has no CVEs. patches: sdksp3-xorg-x11-server-12134,sdksp4-xorg-x11-server-12134,sledsp3-xorg-x11-server-12134,sledsp4-xorg-x11-server-12134,slessp3-xorg-x11-server-12134,slessp4-xorg-x11-server-12134 SKIP SUSE-RU-2015:1760-1 as slesctsp4-client-tools-21-201509-12132 is not security or has no CVEs. patches: slesctsp3-client-tools-21-201509-12132,slesctsp4-client-tools-21-201509-12132 SKIP SUSE-RU-2015:1761-1 as SUSE-Storage-2-2015-698 is not security or has no CVEs. patches: SUSE-Storage-2-2015-698 SKIP SUSE-RU-2015:1762-1 as SUSE-SLE-SERVER-12-2015-699 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-699,SUSE-SLE-SERVER-12-2015-699 SKIP SUSE-RU-2015:1763-1 as SUSE-SLE-SERVER-12-2015-700 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-700 SKIP SUSE-RU-2015:1764-1 as sleclo50sp3-python-novaclient-12137 is not security or has no CVEs. patches: sleclo50sp3-python-novaclient-12137 SKIP SUSE-RU-2015:1766-1 as slessp4-xf86-video-qxl-12138 is not security or has no CVEs. patches: slessp4-xf86-video-qxl-12138 SKIP SUSE-RU-2015:1767-1 as SUSE-SLE-SERVER-12-2015-708 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-708,SUSE-SLE-SERVER-12-2015-708 SKIP SUSE-RU-2015:1769-1 as SUSE-SLE-SERVER-12-2015-709 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-709,SUSE-SLE-SDK-12-2015-709,SUSE-SLE-SERVER-12-2015-709 SKIP SUSE-RU-2015:1774-1 as SUSE-SLE-SERVER-12-2015-711 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-711,SUSE-SLE-SERVER-12-2015-711 SKIP SUSE-RU-2015:1780-1 as slessp4-apache2-mod_nss-12143 is not security or has no CVEs. patches: slessp3-apache2-mod_nss-12143,slessp4-apache2-mod_nss-12143 SKIP SUSE-RU-2015:1783-1 as slessp4-ksh-12144 is not security or has no CVEs. patches: sdksp3-ksh-12144,sdksp4-ksh-12144,sledsp3-ksh-12144,sledsp4-ksh-12144,slessp2-ksh-12144,slessp3-ksh-12144,slessp4-ksh-12144 SKIP SUSE-RU-2015:1784-1 as SUSE-SLE-WE-12-2015-716 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-716,SUSE-SLE-WE-12-2015-716 SKIP SUSE-RU-2015:1786-1 as sleclo50sp3-crowbar-barclamp-keystone-12148 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-keystone-12148 SKIP SUSE-RU-2015:1789-1 as slessp4-postfix-12150 is not security or has no CVEs. patches: sdksp3-postfix-12150,sdksp4-postfix-12150,secsp3-postfix-12150,sledsp3-postfix-12150,sledsp4-postfix-12150,slessp3-postfix-12150,slessp4-postfix-12150 SKIP SUSE-RU-2015:1793-1 as SUSE-SLE-SERVER-12-2015-729 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-729 SKIP SUSE-RU-2015:1795-1 as slessp4-release-notes-sles-12154 is not security or has no CVEs. patches: slessp4-release-notes-sles-12154 SKIP SUSE-RU-2015:1796-1 as SUSE-SLE-Module-Public-Cloud-12-2015-727 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-727 SKIP SUSE-RU-2015:1798-1 as SUSE-SLE-WE-12-2015-730 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-730,SUSE-SLE-WE-12-2015-730 SKIP SUSE-RU-2015:1799-1 as slessp4-sapconf-12155 is not security or has no CVEs. patches: slessp3-sapconf-12155,slessp4-sapconf-12155 SKIP SUSE-RU-2015:1800-1 as slessp3-s390-tools-12156 is not security or has no CVEs. patches: slessp3-s390-tools-12156 SKIP SUSE-RU-2015:1801-1 as sleman21-release-notes-susemanager-12157 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-12157 SKIP SUSE-RU-2015:1804-1 as sdksp4-release-notes-sdk-12159 is not security or has no CVEs. patches: sdksp4-release-notes-sdk-12159 SKIP SUSE-RU-2015:1805-1 as pubclsp3-cloud-init-12160 is not security or has no CVEs. patches: pubclsp3-cloud-init-12160 SKIP SUSE-RU-2015:1806-1 as SUSE-SLE-SERVER-12-2015-737 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-737 SKIP SUSE-RU-2015:1809-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-740 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-740 SKIP SUSE-RU-2015:1814-1 as SUSE-SLE-Module-Public-Cloud-12-2015-742 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-742 SKIP SUSE-RU-2015:1819-1 as SUSE-SLE-Live-Patching-12-2015-745 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2015-745 SKIP SUSE-RU-2015:1820-1 as SUSE-SLE-SERVER-12-2015-747 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-747,SUSE-SLE-SERVER-12-2015-747 SKIP SUSE-RU-2015:1822-1 as SUSE-SLE-SERVER-12-2015-749 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-749,SUSE-SLE-SDK-12-2015-749,SUSE-SLE-SERVER-12-2015-749 SKIP SUSE-RU-2015:1823-1 as slessp3-sax2-12164 is not security or has no CVEs. patches: sdksp3-sax2-12164,sledsp3-sax2-12164,slessp3-sax2-12164 SKIP SUSE-RU-2015:1824-1 as slessp3-yast2-http-server-12165 is not security or has no CVEs. patches: sdksp3-yast2-http-server-12165,slessp3-yast2-http-server-12165 SKIP SUSE-RU-2015:1826-1 as SUSE-SLE-SERVER-12-2015-751 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-751,SUSE-SLE-SERVER-12-2015-751 SKIP SUSE-RU-2015:1827-1 as SUSE-SLE-Module-Public-Cloud-12-2015-752 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-752 SKIP SUSE-RU-2015:1828-1 as SUSE-SLE-Module-Public-Cloud-12-2015-753 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-753 SKIP SUSE-RU-2015:1832-1 as slessp3-release-notes-sles-12167 is not security or has no CVEs. patches: slessp3-release-notes-sles-12167 SKIP SUSE-RU-2015:1834-1 as SUSE-SLE-SDK-12-2015-757 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2015-757,SUSE-SLE-SDK-12-2015-757 SKIP SUSE-RU-2015:1837-1 as SUSE-SLE-SERVER-12-2015-760 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-760,SUSE-SLE-SERVER-12-2015-760 SKIP SUSE-RU-2015:1839-1 as SUSE-SLE-SERVER-12-2015-761 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-761 SKIP SUSE-RU-2015:1841-1 as sdksp4-apache2-mod_auth_ntlm_winbind-12169 is not security or has no CVEs. patches: sdksp3-apache2-mod_auth_ntlm_winbind-12169,sdksp4-apache2-mod_auth_ntlm_winbind-12169 SKIP SUSE-RU-2015:1845-1 as slessp4-tgt-12170 is not security or has no CVEs. patches: slessp3-tgt-12170,slessp4-tgt-12170 SKIP SUSE-RU-2015:1848-1 as SUSE-SLE-SERVER-12-2015-768 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-768,SUSE-SLE-SERVER-12-2015-768 SKIP SUSE-RU-2015:1850-1 as slessp4-mkinitrd-12172 is not security or has no CVEs. patches: sledsp4-mkinitrd-12172,slessp4-mkinitrd-12172 SKIP SUSE-RU-2015:1852-1 as slessp4-apparmor-profiles-12173 is not security or has no CVEs. patches: sledsp3-apparmor-profiles-12173,sledsp4-apparmor-profiles-12173,slessp3-apparmor-profiles-12173,slessp4-apparmor-profiles-12173 SKIP SUSE-RU-2015:1854-1 as slessp4-vacation-12175 is not security or has no CVEs. patches: sledsp3-vacation-12175,sledsp4-vacation-12175,slessp3-vacation-12175,slessp4-vacation-12175 SKIP SUSE-RU-2015:1856-1 as slessp3-mkinitrd-12176 is not security or has no CVEs. patches: sledsp3-mkinitrd-12176,slessp3-mkinitrd-12176 SKIP SUSE-RU-2015:1857-1 as slessp4-xorg-x11-driver-video-12178 is not security or has no CVEs. patches: sledsp4-xorg-x11-driver-video-12178,slessp4-xorg-x11-driver-video-12178 SKIP SUSE-RU-2015:1858-1 as SUSE-SLE-SERVER-12-2015-777 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-777,SUSE-SLE-SERVER-12-2015-777 SKIP SUSE-RU-2015:1859-1 as SUSE-SLE-SERVER-12-2015-776 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-776,SUSE-SLE-SDK-12-2015-776,SUSE-SLE-SERVER-12-2015-776 SKIP SUSE-RU-2015:1860-1 as slestso13-susestudio-20150812-12177 is not security or has no CVEs. patches: slestso13-susestudio-20150812-12177 SKIP SUSE-RU-2015:1893-1 as SUSE-SLE-WE-12-2015-787 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-787,SUSE-SLE-SDK-12-2015-787,SUSE-SLE-SERVER-12-2015-787,SUSE-SLE-WE-12-2015-787 SKIP SUSE-RU-2015:1895-1 as SUSE-SLE-Module-Containers-12-2015-790 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-790 SKIP SUSE-RU-2015:1896-1 as SUSE-SLE-SERVER-12-2015-791 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-791,SUSE-SLE-SDK-12-2015-791,SUSE-SLE-SERVER-12-2015-791 SKIP SUSE-RU-2015:1899-1 as slessp3-yast2-fcoe-client-12186 is not security or has no CVEs. patches: slessp3-yast2-fcoe-client-12186 SKIP SUSE-RU-2015:1914-1 as slessp4-kde4-kupdateapplet-12187 is not security or has no CVEs. patches: sledsp4-kde4-kupdateapplet-12187,slessp4-kde4-kupdateapplet-12187 SKIP SUSE-RU-2015:1916-1 as SUSE-SLE-SERVER-12-2015-798 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-798,SUSE-SLE-SDK-12-2015-798,SUSE-SLE-SERVER-12-2015-798 SKIP SUSE-RU-2015:1918-1 as SUSE-SLE-SERVER-12-2015-799 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-799,SUSE-SLE-SDK-12-2015-799,SUSE-SLE-SERVER-12-2015-799 SKIP SUSE-RU-2015:1921-1 as SUSE-SLE-SERVER-12-2015-800 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-800,SUSE-SLE-SDK-12-2015-800,SUSE-SLE-SERVER-12-2015-800 SKIP SUSE-RU-2015:1922-1 as slehasp4-resource-agents-12188 is not security or has no CVEs. patches: slehasp4-resource-agents-12188 SKIP SUSE-RU-2015:1923-1 as slessp3-xorg-x11-12189 is not security or has no CVEs. patches: sledsp3-xorg-x11-12189,slessp3-xorg-x11-12189 SKIP SUSE-RU-2015:1924-1 as SUSE-SLE-SERVER-12-2015-804 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-804 SKIP SUSE-RU-2015:1924-2 as SUSE-SLE-DESKTOP-12-2015-804 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-804 SKIP SUSE-RU-2015:1931-1 as slestso13-openssl-12193 is not security or has no CVEs. patches: sdksp3-openssl-12193,sdksp4-openssl-12193,sledsp3-openssl-12193,sledsp4-openssl-12193,slessp2-openssl-12193,slessp3-openssl-12193,slessp4-openssl-12193,slestso13-openssl-12193 SKIP SUSE-RU-2015:1932-1 as sleclo50sp3-crowbar-barclamp-rabbitmq-12194 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-rabbitmq-12194 SKIP SUSE-RU-2015:1933-1 as SUSE-SLE-SERVER-12-2015-812 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-812,SUSE-SLE-SDK-12-2015-812,SUSE-SLE-SERVER-12-2015-812 SKIP SUSE-RU-2015:1934-1 as SUSE-SLE-SERVER-12-2015-813 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-813,SUSE-SLE-SERVER-12-2015-813 SKIP SUSE-RU-2015:1935-1 as sleclo50sp3-crowbar-barclamps-201510-12195 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamps-201510-12195 SKIP SUSE-RU-2015:1941-1 as SUSE-SLE-SERVER-12-2015-815 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-815,SUSE-SLE-SDK-12-2015-815,SUSE-SLE-SERVER-12-2015-815 SKIP SUSE-RU-2015:1947-1 as slessp4-SuSEfirewall2-12196 is not security or has no CVEs. patches: sledsp3-SuSEfirewall2-12196,sledsp4-SuSEfirewall2-12196,slessp3-SuSEfirewall2-12196,slessp4-SuSEfirewall2-12196 SKIP SUSE-RU-2015:1950-1 as slessp4-rsh-12197 is not security or has no CVEs. patches: slessp3-rsh-12197,slessp4-rsh-12197 SKIP SUSE-RU-2015:1950-2 as sledsp4-rsh-12197 is not security or has no CVEs. patches: sledsp3-rsh-12197,sledsp4-rsh-12197 SKIP SUSE-RU-2015:1951-1 as slessp3-makedumpfile-12198 is not security or has no CVEs. patches: sdksp3-makedumpfile-12198,sledsp3-makedumpfile-12198,slessp3-makedumpfile-12198 SKIP SUSE-RU-2015:1953-1 as SUSE-SLE-SAP-12-2015-821 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2015-821 SKIP SUSE-RU-2015:1954-1 as SUSE-SLE-SERVER-12-2015-822 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-822,SUSE-SLE-SDK-12-2015-822,SUSE-SLE-SERVER-12-2015-822 SKIP SUSE-RU-2015:1962-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2015-826 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2015-826 SKIP SUSE-RU-2015:1963-1 as SUSE-SLE-SERVER-12-2015-827 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-827,SUSE-SLE-SDK-12-2015-827,SUSE-SLE-SERVER-12-2015-827 SKIP SUSE-RU-2015:1970-1 as slesmtsp3-smt-12201 is not security or has no CVEs. patches: slesmtsp3-smt-12201 SKIP SUSE-RU-2015:1974-1 as SUSE-SLE-WE-12-2015-828 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-828,SUSE-SLE-SDK-12-2015-828,SUSE-SLE-SERVER-12-2015-828,SUSE-SLE-WE-12-2015-828 SKIP SUSE-RU-2015:1974-2 as SUSE-SLE-WE-12-SP1-2015-828 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-828,SUSE-SLE-SDK-12-SP1-2015-828,SUSE-SLE-SERVER-12-SP1-2015-828,SUSE-SLE-WE-12-SP1-2015-828 SKIP SUSE-RU-2015:1975-1 as SUSE-SLE-SERVER-12-2015-830 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-830,SUSE-SLE-SERVER-12-2015-830 SKIP SUSE-RU-2015:1975-2 as SUSE-SLE-SERVER-12-SP1-2015-830 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-830,SUSE-SLE-SERVER-12-SP1-2015-830 SKIP SUSE-RU-2015:1976-1 as SUSE-SLE-SERVER-12-2015-835 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-835,SUSE-SLE-SERVER-12-2015-835 SKIP SUSE-RU-2015:1977-1 as SUSE-Storage-2-2015-834 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2015-834,SUSE-Storage-1.0-2015-834,SUSE-Storage-2-2015-834 SKIP SUSE-RU-2015:1980-1 as SUSE-SLE-Module-Legacy-12-2015-836 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-836,SUSE-SLE-Module-Legacy-12-2015-836 SKIP SUSE-RU-2015:1982-1 as SUSE-SLE-SERVER-12-2015-838 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-838 SKIP SUSE-RU-2015:1985-1 as SUSE-SLE-SERVER-12-2015-841 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-841,SUSE-SLE-SERVER-12-2015-841 ERROR: notice SUSE-RU-2015:1986-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-2015-842,SUSE-SLE-SDK-12-2015-842,SUSE-SLE-SERVER-12-2015-842 SKIP SUSE-RU-2015:1986-2 as SUSE-SLE-SERVER-12-SP1-2016-157 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-157,SUSE-SLE-SERVER-12-SP1-2016-157 SKIP SUSE-RU-2015:1987-1 as slessp4-krb5-12207 is not security or has no CVEs. patches: sdksp3-krb5-12207,sdksp4-krb5-12207,sledsp3-krb5-12207,sledsp4-krb5-12207,slessp3-krb5-12207,slessp4-krb5-12207 SKIP SUSE-RU-2015:1988-1 as SUSE-SLE-SERVER-12-2015-844 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-844 SKIP SUSE-RU-2015:1989-1 as slehasp3-resource-agents-12208 is not security or has no CVEs. patches: slehasp3-resource-agents-12208 SKIP SUSE-RU-2015:2002-1 as slessp4-ConsoleKit-12209 is not security or has no CVEs. patches: sdksp3-ConsoleKit-12209,sdksp4-ConsoleKit-12209,sledsp3-ConsoleKit-12209,sledsp4-ConsoleKit-12209,slessp3-ConsoleKit-12209,slessp4-ConsoleKit-12209 SKIP SUSE-RU-2015:2005-1 as sleposp3-drm-12212 is not security or has no CVEs. patches: sleposp3-drm-12212 SKIP SUSE-RU-2015:2006-1 as slessp3-sg3_utils-12213 is not security or has no CVEs. patches: sdksp3-sg3_utils-12213,sledsp3-sg3_utils-12213,slessp3-sg3_utils-12213 SKIP SUSE-RU-2015:2026-1 as slessp4-gcc5-12215 is not security or has no CVEs. patches: sdksp4-gcc5-12215,sledsp4-gcc5-12215,slessp4-gcc5-12215 SKIP SUSE-RU-2015:2027-1 as slessp4-openCryptoki-12216 is not security or has no CVEs. patches: sdksp4-openCryptoki-12216,slessp4-openCryptoki-12216 SKIP SUSE-RU-2015:2028-1 as SUSE-SLE-SERVER-12-2015-859 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-859,SUSE-SLE-SDK-12-2015-859,SUSE-SLE-SERVER-12-2015-859 SKIP SUSE-RU-2015:2029-1 as SUSE-SLE-SERVER-12-2015-860 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-860,SUSE-SLE-SERVER-12-2015-860 SKIP SUSE-RU-2015:2046-1 as SUSE-SLE-HA-12-2015-861 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2015-861 SKIP SUSE-RU-2015:2047-1 as SUSE-SLE-SERVER-12-2015-863 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-863,SUSE-SLE-SERVER-12-2015-863 SKIP SUSE-RU-2015:2047-2 as SUSE-SLE-SERVER-12-SP1-2015-863 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-863,SUSE-SLE-SERVER-12-SP1-2015-863 SKIP SUSE-RU-2015:2048-1 as SUSE-SLE-SERVER-12-2015-862 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-862,SUSE-SLE-SDK-12-2015-862,SUSE-SLE-SERVER-12-2015-862 SKIP SUSE-RU-2015:2048-2 as SUSE-SLE-SERVER-12-SP1-2015-862 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-862,SUSE-SLE-SDK-12-SP1-2015-862,SUSE-SLE-SERVER-12-SP1-2015-862 SKIP SUSE-RU-2015:2049-1 as SUSE-SLE-SERVER-12-2015-865 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-865,SUSE-SLE-SERVER-12-2015-865 SKIP SUSE-RU-2015:2050-1 as SUSE-SLE-SERVER-12-2015-866 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-866,SUSE-SLE-SDK-12-2015-866,SUSE-SLE-SERVER-12-2015-866 SKIP SUSE-RU-2015:2051-1 as SUSE-SLE-Module-Containers-12-2015-864 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-864 SKIP SUSE-RU-2015:2052-1 as SUSE-SLE-SERVER-12-2015-867 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-867,SUSE-SLE-SDK-12-2015-867,SUSE-SLE-SERVER-12-2015-867 SKIP SUSE-RU-2015:2052-2 as SUSE-SLE-SERVER-12-SP1-2015-867 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-867,SUSE-SLE-SDK-12-SP1-2015-867,SUSE-SLE-SERVER-12-SP1-2015-867 SKIP SUSE-RU-2015:2061-1 as slessp4-yast2-update-12219 is not security or has no CVEs. patches: sledsp4-yast2-update-12219,slessp4-yast2-update-12219 SKIP SUSE-RU-2015:2062-1 as SUSE-SLE-Module-Public-Cloud-12-2015-873 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-873 SKIP SUSE-RU-2015:2063-1 as SUSE-SLE-SERVER-12-2015-874 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-874,SUSE-SLE-SDK-12-2015-874,SUSE-SLE-SERVER-12-2015-874 SKIP SUSE-RU-2015:2067-1 as pubclsp3-cloud-regionsrv-client-12221 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-12221 SKIP SUSE-RU-2015:2080-1 as slessp4-supportutils-12222 is not security or has no CVEs. patches: sledsp3-supportutils-12222,sledsp4-supportutils-12222,slessp3-supportutils-12222,slessp4-supportutils-12222 SKIP SUSE-RU-2015:2082-1 as slessp3-ntp-12223 is not security or has no CVEs. patches: sledsp3-ntp-12223,slessp3-ntp-12223 SKIP SUSE-RU-2015:2092-1 as slessp4-sysstat-12224 is not security or has no CVEs. patches: sledsp4-sysstat-12224,slessp4-sysstat-12224 SKIP SUSE-RU-2015:2093-1 as SUSE-SLE-SERVER-12-2015-892 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-892,SUSE-SLE-SERVER-12-2015-892 SKIP SUSE-RU-2015:2094-1 as slessp4-syslog-ng-12225 is not security or has no CVEs. patches: sledsp3-syslog-ng-12225,sledsp4-syslog-ng-12225,slessp3-syslog-ng-12225,slessp4-syslog-ng-12225 SKIP SUSE-RU-2015:2095-1 as SUSE-SLE-SERVER-12-2015-894 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-894,SUSE-SLE-SDK-12-2015-894,SUSE-SLE-SERVER-12-2015-894 SKIP SUSE-RU-2015:2096-1 as SUSE-SLE-SERVER-12-2015-895 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-895,SUSE-SLE-SERVER-12-2015-895 SKIP SUSE-RU-2015:2109-1 as slessp4-yast2-slp-server-12228 is not security or has no CVEs. patches: sdksp3-yast2-slp-server-12228,sdksp4-yast2-slp-server-12228,slessp3-yast2-slp-server-12228,slessp4-yast2-slp-server-12228 SKIP SUSE-RU-2015:2111-1 as SUSE-SLE-SERVER-12-2015-899 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-899,SUSE-SLE-SDK-12-2015-899,SUSE-SLE-SERVER-12-2015-899 SKIP SUSE-RU-2015:2112-1 as SUSE-SLE-SERVER-12-2015-900 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-900,SUSE-SLE-SDK-12-2015-900,SUSE-SLE-SERVER-12-2015-900 SKIP SUSE-RU-2015:2113-1 as slessp3-crash-12229 is not security or has no CVEs. patches: sdksp3-crash-12229,slessp3-crash-12229 SKIP SUSE-RU-2015:2114-1 as sleclo50sp3-crowbar-barclamp-cinder-12231 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-cinder-12231 SKIP SUSE-RU-2015:2115-1 as sleclo50sp3-crowbar-barclamp-ceph-12230 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-ceph-12230 SKIP SUSE-RU-2015:2117-1 as slessp4-pciutils-ids-12232 is not security or has no CVEs. patches: sledsp4-pciutils-ids-12232,slessp4-pciutils-ids-12232 SKIP SUSE-RU-2015:2134-1 as SUSE-SLE-SERVER-12-2015-907 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-907 SKIP SUSE-RU-2015:2138-1 as SUSE-SLE-Module-Public-Cloud-12-2015-908 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-908 SKIP SUSE-RU-2015:2139-1 as SUSE-SLE-SERVER-12-2015-909 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-909,SUSE-SLE-SERVER-12-2015-909 SKIP SUSE-RU-2015:2140-1 as SUSE-SLE-SERVER-12-2015-910 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-910,SUSE-SLE-SDK-12-2015-910,SUSE-SLE-SERVER-12-2015-910 SKIP SUSE-RU-2015:2141-1 as slessp3-sysstat-12234 is not security or has no CVEs. patches: sledsp3-sysstat-12234,slessp3-sysstat-12234 SKIP SUSE-RU-2015:2143-1 as SUSE-SLE-WE-12-2015-913 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-913,SUSE-SLE-SDK-12-2015-913,SUSE-SLE-SERVER-12-2015-913,SUSE-SLE-WE-12-2015-913 SKIP SUSE-RU-2015:2143-2 as SUSE-SLE-WE-12-SP1-2015-913 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-913,SUSE-SLE-SDK-12-SP1-2015-913,SUSE-SLE-SERVER-12-SP1-2015-913,SUSE-SLE-WE-12-SP1-2015-913 SKIP SUSE-RU-2015:2144-1 as SUSE-SLE-SERVER-12-2015-912 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-912,SUSE-SLE-HA-12-2015-912,SUSE-SLE-SDK-12-2015-912,SUSE-SLE-SERVER-12-2015-912 SKIP SUSE-RU-2015:2157-1 as slessp4-crash-12236 is not security or has no CVEs. patches: sdksp4-crash-12236,slessp4-crash-12236 SKIP SUSE-RU-2015:2158-1 as slessp4-libsoup-12237 is not security or has no CVEs. patches: sdksp3-libsoup-12237,sdksp4-libsoup-12237,sledsp3-libsoup-12237,sledsp4-libsoup-12237,slessp3-libsoup-12237,slessp4-libsoup-12237 SKIP SUSE-RU-2015:2169-1 as SUSE-SLE-SERVER-12-2015-921 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-921 SKIP SUSE-RU-2015:2175-1 as slessp4-yast2-users-12242 is not security or has no CVEs. patches: sledsp4-yast2-users-12242,slessp4-yast2-users-12242 SKIP SUSE-RU-2015:2176-1 as slessp4-microcode_ctl-12243 is not security or has no CVEs. patches: sledsp3-microcode_ctl-12243,sledsp4-microcode_ctl-12243,slessp3-microcode_ctl-12243,slessp4-microcode_ctl-12243 SKIP SUSE-RU-2015:2180-1 as slessp4-lvm2-12244 is not security or has no CVEs. patches: sledsp3-lvm2-12244,sledsp4-lvm2-12244,slehasp3-lvm2-12244,slehasp4-lvm2-12244,slessp3-lvm2-12244,slessp4-lvm2-12244 SKIP SUSE-RU-2015:2187-1 as SUSE-SLE-Module-Containers-12-2015-940 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-940 SKIP SUSE-RU-2015:2188-1 as SUSE-SLE-Module-Containers-12-2015-941 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-941 SKIP SUSE-RU-2015:2189-1 as SUSE-SLE-Module-Containers-12-2015-939 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2015-939 SKIP SUSE-RU-2015:2191-1 as SUSE-SLE-SDK-12-SP1-2015-942 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2015-942,SUSE-SLE-SDK-12-SP1-2015-942 SKIP SUSE-RU-2015:2193-1 as slessp4-yast2-kdump-12248 is not security or has no CVEs. patches: sdksp4-yast2-kdump-12248,sledsp4-yast2-kdump-12248,slessp4-yast2-kdump-12248 SKIP SUSE-RU-2015:2233-1 as SUSE-SLE-Manager-Tools-12-2015-956 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-956 SKIP SUSE-RU-2015:2252-1 as SUSE-SLE-Live-Patching-12-2015-961 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2015-961 SKIP SUSE-RU-2015:2265-1 as sleman21-suse-manager-21-201510-12257 is not security or has no CVEs. patches: sleman21-suse-manager-21-201510-12257 SKIP SUSE-RU-2015:2266-1 as SUSE-SLE-Manager-Tools-12-2015-964 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2015-964 SKIP SUSE-RU-2015:2267-1 as slessp4-susemanager-sles-21-201510-12257 is not security or has no CVEs. patches: sledsp3-susemanager-sles-21-201510-12257,sledsp4-susemanager-sles-21-201510-12257,slemap21-suse-manager-proxy-21-201510-12257,slesctsp3-client-tools-201510-12257,slesctsp4-client-tools-201510-12257,slessp3-susemanager-sles-21-201510-12257,slessp4-susemanager-sles-21-201510-12257 SKIP SUSE-RU-2015:2269-1 as SUSE-SLE-SERVER-12-2015-967 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-967,SUSE-SLE-SERVER-12-2015-967 SKIP SUSE-RU-2015:2270-1 as SUSE-SLE-SERVER-12-2015-966 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-966,SUSE-SLE-SDK-12-2015-966,SUSE-SLE-SERVER-12-2015-966 SKIP SUSE-RU-2015:2271-1 as slessp4-ethtool-12259 is not security or has no CVEs. patches: sledsp4-ethtool-12259,slessp4-ethtool-12259 SKIP SUSE-RU-2015:2273-1 as SUSE-SLE-Module-Public-Cloud-12-2015-971 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-971 SKIP SUSE-RU-2015:2276-1 as slessp3-yast2-ntp-client-12266 is not security or has no CVEs. patches: sledsp3-yast2-ntp-client-12266,slessp3-yast2-ntp-client-12266 SKIP SUSE-RU-2015:2277-1 as slessp4-clamav-12265 is not security or has no CVEs. patches: sledsp3-clamav-12265,sledsp4-clamav-12265,slessp3-clamav-12265,slessp4-clamav-12265 SKIP SUSE-RU-2015:2278-1 as SUSE-SLE-SERVER-12-SP1-2015-977 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-977,SUSE-SLE-DESKTOP-12-SP1-2015-977,SUSE-SLE-SERVER-12-2015-977,SUSE-SLE-SERVER-12-SP1-2015-977 SKIP SUSE-RU-2015:2279-1 as slessp4-yast2-ntp-client-12267 is not security or has no CVEs. patches: sledsp4-yast2-ntp-client-12267,slessp4-yast2-ntp-client-12267 SKIP SUSE-RU-2015:2280-1 as SUSE-SLE-SERVER-12-SP1-2015-979 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2015-979,SUSE-SLE-SERVER-12-SP1-2015-979 SKIP SUSE-RU-2015:2281-1 as SUSE-SLE-SERVER-12-2015-982 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-982,SUSE-SLE-SDK-12-2015-982,SUSE-SLE-SERVER-12-2015-982 SKIP SUSE-RU-2015:2284-1 as SUSE-SLE-SERVER-12-SP1-2015-983 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-983,SUSE-SLE-SERVER-12-SP1-2015-983 SKIP SUSE-RU-2015:2293-1 as SUSE-SLE-SERVER-12-2015-986 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-986,SUSE-SLE-SERVER-12-2015-986 SKIP SUSE-RU-2015:2295-1 as sleclo50sp3-crowbar-barclamp-neutron-12269 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-neutron-12269 SKIP SUSE-RU-2015:2296-1 as SUSE-SLE-SERVER-12-2015-988 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-988,SUSE-SLE-SERVER-12-2015-988 SKIP SUSE-RU-2015:2297-1 as SUSE-SLE-SERVER-12-SP1-2015-991 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-991,SUSE-SLE-DESKTOP-12-SP1-2015-991,SUSE-SLE-SDK-12-2015-991,SUSE-SLE-SDK-12-SP1-2015-991,SUSE-SLE-SERVER-12-2015-991,SUSE-SLE-SERVER-12-SP1-2015-991 SKIP SUSE-RU-2015:2298-1 as slessp3-yast2-network-12270 is not security or has no CVEs. patches: sdksp3-yast2-network-12270,sledsp3-yast2-network-12270,slessp3-yast2-network-12270 SKIP SUSE-RU-2015:2299-1 as slessp4-yast2-network-12271 is not security or has no CVEs. patches: sdksp4-yast2-network-12271,sledsp4-yast2-network-12271,slessp4-yast2-network-12271 SKIP SUSE-RU-2015:2344-1 as slessp4-tgt-12281 is not security or has no CVEs. patches: slessp3-tgt-12281,slessp4-tgt-12281 SKIP SUSE-RU-2015:2351-1 as slessp4-parted-12283 is not security or has no CVEs. patches: sdksp4-parted-12283,sledsp4-parted-12283,slessp4-parted-12283 SKIP SUSE-RU-2015:2352-1 as slessp3-parted-12282 is not security or has no CVEs. patches: sdksp3-parted-12282,sledsp3-parted-12282,slessp3-parted-12282 SKIP SUSE-RU-2015:2360-1 as SUSE-SLE-SDK-12-SP1-2015-1018 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2015-1018,SUSE-SLE-SDK-12-2015-1018,SUSE-SLE-SDK-12-SP1-2015-1018 SKIP SUSE-RU-2015:2361-1 as slessp4-ksh-12285 is not security or has no CVEs. patches: sdksp3-ksh-12285,sdksp4-ksh-12285,sledsp3-ksh-12285,sledsp4-ksh-12285,slessp2-ksh-12285,slessp3-ksh-12285,slessp4-ksh-12285 SKIP SUSE-RU-2015:2381-1 as SUSE-SLE-SERVER-12-2015-1020 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2015-1020 SKIP SUSE-RU-2015:2382-1 as SUSE-SLE-Module-Public-Cloud-12-2015-1021 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-1021 SKIP SUSE-RU-2015:2390-1 as SUSE-SLE-SERVER-12-SP1-2015-1028 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2015-1028,SUSE-SLE-DESKTOP-12-SP1-2015-1028,SUSE-SLE-SDK-12-2015-1028,SUSE-SLE-SDK-12-SP1-2015-1028,SUSE-SLE-SERVER-12-2015-1028,SUSE-SLE-SERVER-12-SP1-2015-1028 SKIP SUSE-RU-2015:2394-1 as pubclsp3-google-tools-12289 is not security or has no CVEs. patches: pubclsp3-google-tools-12289 SKIP SUSE-RU-2015:2404-1 as SUSE-SLE-Module-Public-Cloud-12-2015-1035 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2015-1035 SKIP SUSE-RU-2016:0012-1 as SUSE-SLE-Module-Public-Cloud-12-2016-5 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-5 SKIP SUSE-RU-2016:0013-1 as SUSE-SLE-Module-Public-Cloud-12-2016-4 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-4 SKIP SUSE-RU-2016:0014-1 as SUSE-SLE-SERVER-12-2016-6 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-6,SUSE-SLE-SERVER-12-2016-6 SKIP SUSE-RU-2016:0015-1 as SUSE-SLE-Module-Containers-12-2016-7 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-7 SKIP SUSE-RU-2016:0017-1 as SUSE-SLE-SERVER-12-SP1-2016-9 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-9,SUSE-SLE-DESKTOP-12-SP1-2016-9,SUSE-SLE-SDK-12-2016-9,SUSE-SLE-SDK-12-SP1-2016-9,SUSE-SLE-SERVER-12-2016-9,SUSE-SLE-SERVER-12-SP1-2016-9 SKIP SUSE-RU-2016:0022-1 as SUSE-SLE-SERVER-12-SP1-2016-10 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-10,SUSE-SLE-DESKTOP-12-SP1-2016-10,SUSE-SLE-SERVER-12-2016-10,SUSE-SLE-SERVER-12-SP1-2016-10 SKIP SUSE-RU-2016:0024-1 as slessp4-yast2-bootloader-12295 is not security or has no CVEs. patches: sledsp4-yast2-bootloader-12295,slessp4-yast2-bootloader-12295 SKIP SUSE-RU-2016:0025-1 as slessp3-yast2-bootloader-12296 is not security or has no CVEs. patches: sledsp3-yast2-bootloader-12296,slessp3-yast2-bootloader-12296 SKIP SUSE-RU-2016:0026-1 as SUSE-SLE-WE-12-SP1-2016-19 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-19,SUSE-SLE-WE-12-SP1-2016-19 SKIP SUSE-RU-2016:0028-1 as SUSE-SLE-SERVER-12-SP1-2016-18 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-18 SKIP SUSE-RU-2016:0029-1 as SUSE-SLE-SERVER-12-SP1-2016-17 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-17,SUSE-SLE-SDK-12-SP1-2016-17,SUSE-SLE-SERVER-12-2016-17,SUSE-SLE-SERVER-12-SP1-2016-17 SKIP SUSE-RU-2016:0033-1 as slessp4-yast2-ldap-client-12299 is not security or has no CVEs. patches: sledsp3-yast2-ldap-client-12299,sledsp4-yast2-ldap-client-12299,slessp3-yast2-ldap-client-12299,slessp4-yast2-ldap-client-12299 SKIP SUSE-RU-2016:0034-1 as sleslms13-slms-12301 is not security or has no CVEs. patches: sleslms13-slms-12301 SKIP SUSE-RU-2016:0035-1 as slestso13-susestudio-12300 is not security or has no CVEs. patches: slestso13-susestudio-12300 SKIP SUSE-RU-2016:0037-1 as SUSE-SLE-Module-Public-Cloud-12-2016-26 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-26 SKIP SUSE-RU-2016:0038-1 as SUSE-SLE-Module-Public-Cloud-12-2016-27 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-27 ERROR: notice SUSE-RU-2016:0039-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-2016-30,SUSE-SLE-DESKTOP-12-SP1-2016-30,SUSE-SLE-SERVER-12-SP1-2016-30 SKIP SUSE-RU-2016:0039-2 as SUSE-SLE-SERVER-12-SP1-2016-31 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-31,SUSE-SLE-SERVER-12-SP1-2016-31 SKIP SUSE-RU-2016:0046-1 as SUSE-Storage-2-2016-36 is not security or has no CVEs. patches: SUSE-Storage-2-2016-36 SKIP SUSE-RU-2016:0048-1 as SUSE-SLE-SERVER-12-2016-40 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-40,SUSE-SLE-SDK-12-2016-40,SUSE-SLE-SERVER-12-2016-40 SKIP SUSE-RU-2016:0051-1 as slessp4-pesign-obs-integration-12305 is not security or has no CVEs. patches: sledsp3-pesign-obs-integration-12305,sledsp4-pesign-obs-integration-12305,slessp3-pesign-obs-integration-12305,slessp4-pesign-obs-integration-12305 SKIP SUSE-RU-2016:0053-1 as SUSE-SLE-SERVER-12-2016-42 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-42,SUSE-SLE-SERVER-12-2016-42 SKIP SUSE-RU-2016:0055-1 as SUSE-SLE12-CLOUD-5-2016-43 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-43,SUSE-SLE12-CLOUD-5-2016-43 SKIP SUSE-RU-2016:0056-1 as SUSE-SLE-SERVER-12-SP1-2016-44 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-44,SUSE-SLE-SDK-12-SP1-2016-44,SUSE-SLE-SERVER-12-SP1-2016-44 SKIP SUSE-RU-2016:0057-1 as SUSE-SLE-WE-12-SP1-2016-46 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-46,SUSE-SLE-DESKTOP-12-SP1-2016-46,SUSE-SLE-SDK-12-2016-46,SUSE-SLE-SDK-12-SP1-2016-46,SUSE-SLE-SERVER-12-2016-46,SUSE-SLE-SERVER-12-SP1-2016-46,SUSE-SLE-WE-12-2016-46,SUSE-SLE-WE-12-SP1-2016-46 SKIP SUSE-RU-2016:0058-1 as slessp4-sg3_utils-12306 is not security or has no CVEs. patches: sdksp4-sg3_utils-12306,sledsp4-sg3_utils-12306,slessp4-sg3_utils-12306 SKIP SUSE-RU-2016:0059-1 as slessp4-open-iscsi-12307 is not security or has no CVEs. patches: sledsp4-open-iscsi-12307,slessp4-open-iscsi-12307 SKIP SUSE-RU-2016:0060-1 as slessp3-open-iscsi-12308 is not security or has no CVEs. patches: sledsp3-open-iscsi-12308,slessp3-open-iscsi-12308 ERROR: notice SUSE-RU-2016:0062-1 has no valid patches out of: SUSE-SUSE-Manager-Server-3.0-2016-51 SKIP SUSE-RU-2016:0063-1 as slessp4-yast2-printer-12310 is not security or has no CVEs. patches: sdksp3-yast2-printer-12310,sdksp4-yast2-printer-12310,sledsp3-yast2-printer-12310,sledsp4-yast2-printer-12310,slessp3-yast2-printer-12310,slessp4-yast2-printer-12310 ERROR: notice SUSE-RU-2016:0064-1 has no valid patches out of: SUSE-SUSE-Manager-Proxy-3.0-2016-51 SKIP SUSE-RU-2016:0076-1 as slessp4-pesign-obs-integration-12311 is not security or has no CVEs. patches: sledsp3-pesign-obs-integration-12311,sledsp4-pesign-obs-integration-12311,slessp3-pesign-obs-integration-12311,slessp4-pesign-obs-integration-12311 SKIP SUSE-RU-2016:0078-1 as sleclo50sp3-crowbar-barclamp-heat-glance-201510-12313 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-heat-glance-201510-12313 SKIP SUSE-RU-2016:0080-1 as slessp4-yast2-audit-laf-12315 is not security or has no CVEs. patches: sledsp3-yast2-audit-laf-12315,sledsp4-yast2-audit-laf-12315,slessp3-yast2-audit-laf-12315,slessp4-yast2-audit-laf-12315 SKIP SUSE-RU-2016:0081-1 as slessp4-openCryptoki-12316 is not security or has no CVEs. patches: sdksp4-openCryptoki-12316,slessp4-openCryptoki-12316 SKIP SUSE-RU-2016:0085-1 as SUSE-SLE-SDK-12-SP1-2016-60 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-60 SKIP SUSE-RU-2016:0086-1 as SUSE-SLE-SERVER-12-SP1-2016-61 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-61,SUSE-SLE-DESKTOP-12-SP1-2016-61,SUSE-SLE-SDK-12-2016-61,SUSE-SLE-SDK-12-SP1-2016-61,SUSE-SLE-SERVER-12-2016-61,SUSE-SLE-SERVER-12-SP1-2016-61 SKIP SUSE-RU-2016:0087-1 as SUSE-SLE-WE-12-SP1-2016-62 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-62,SUSE-SLE-DESKTOP-12-SP1-2016-62,SUSE-SLE-SDK-12-2016-62,SUSE-SLE-SDK-12-SP1-2016-62,SUSE-SLE-SERVER-12-2016-62,SUSE-SLE-SERVER-12-SP1-2016-62,SUSE-SLE-WE-12-2016-62,SUSE-SLE-WE-12-SP1-2016-62 SKIP SUSE-RU-2016:0088-1 as slessp4-deltarpm-12318 is not security or has no CVEs. patches: sdksp3-deltarpm-12318,sdksp4-deltarpm-12318,sledsp3-deltarpm-12318,sledsp4-deltarpm-12318,slessp3-deltarpm-12318,slessp4-deltarpm-12318 SKIP SUSE-RU-2016:0091-1 as slessp3-yast2-users-12319 is not security or has no CVEs. patches: sledsp3-yast2-users-12319,slessp3-yast2-users-12319 SKIP SUSE-RU-2016:0093-1 as SUSE-SLE-SERVER-12-SP1-2016-67 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-67,SUSE-SLE-DESKTOP-12-SP1-2016-67,SUSE-SLE-SERVER-12-2016-67,SUSE-SLE-SERVER-12-SP1-2016-67 SKIP SUSE-RU-2016:0094-1 as SUSE-SLE-SERVER-12-SP1-2016-68 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-68 SKIP SUSE-RU-2016:0095-1 as SUSE-SLE-SERVER-12-SP1-2016-70 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-70,SUSE-SLE-SERVER-12-SP1-2016-70 SKIP SUSE-RU-2016:0096-1 as SUSE-SLE-SERVER-12-SP1-2016-71 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-71,SUSE-SLE-DESKTOP-12-SP1-2016-71,SUSE-SLE-SERVER-12-2016-71,SUSE-SLE-SERVER-12-SP1-2016-71 SKIP SUSE-RU-2016:0097-1 as SUSE-SLE-WE-12-2016-69 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-69,SUSE-SLE-SDK-12-2016-69,SUSE-SLE-SERVER-12-2016-69,SUSE-SLE-WE-12-2016-69 SKIP SUSE-RU-2016:0099-1 as SUSE-SLE-WE-12-2016-72 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-72,SUSE-SLE-WE-12-2016-72 SKIP SUSE-RU-2016:0100-1 as slessp4-release-notes-sles-12320 is not security or has no CVEs. patches: slessp4-release-notes-sles-12320 SKIP SUSE-RU-2016:0111-1 as slessp3-yast2-kdump-12323 is not security or has no CVEs. patches: sdksp3-yast2-kdump-12323,sledsp3-yast2-kdump-12323,slessp3-yast2-kdump-12323 SKIP SUSE-RU-2016:0115-1 as SUSE-SLE-SERVER-12-SP1-2016-82 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-82,SUSE-SLE-SERVER-12-SP1-2016-82 SKIP SUSE-RU-2016:0116-1 as SUSE-SLE-SDK-12-SP1-2016-81 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-81,SUSE-SLE-SDK-12-SP1-2016-81 SKIP SUSE-RU-2016:0122-1 as slessp4-sssd-12328 is not security or has no CVEs. patches: sdksp3-sssd-12328,sdksp4-sssd-12328,sledsp3-sssd-12328,sledsp4-sssd-12328,slessp3-sssd-12328,slessp4-sssd-12328 SKIP SUSE-RU-2016:0135-1 as SUSE-SLE-Manager-Tools-12-2016-95 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-95 SKIP SUSE-RU-2016:0136-1 as slesctsp4-client-tools-201512-12331 is not security or has no CVEs. patches: slesctsp3-client-tools-201512-12331,slesctsp4-client-tools-201512-12331 SKIP SUSE-RU-2016:0137-1 as slessp4-client-tools-21-201512-12331 is not security or has no CVEs. patches: sledsp3-client-tools-21-201512-12331,sledsp4-client-tools-21-201512-12331,slessp3-client-tools-21-201512-12331,slessp4-client-tools-21-201512-12331 SKIP SUSE-RU-2016:0139-1 as sleman21-suse-manager-21-201512-12331 is not security or has no CVEs. patches: sleman21-suse-manager-21-201512-12331 SKIP SUSE-RU-2016:0140-1 as slemap21-suse-manager-proxy-21-201512-12331 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201512-12331 SKIP SUSE-RU-2016:0141-1 as SUSE-SLE-SERVER-12-SP1-2016-96 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-96,SUSE-SLE-SDK-12-SP1-2016-96,SUSE-SLE-SERVER-12-SP1-2016-96 SKIP SUSE-RU-2016:0150-1 as sleclo50sp3-crowbar-barclamp-keystone-12335 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-keystone-12335 SKIP SUSE-RU-2016:0155-1 as SUSE-SLE-HA-12-SP1-2016-102 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-102 SKIP SUSE-RU-2016:0159-1 as slessp4-sblim-cmpi-devel-12337 is not security or has no CVEs. patches: sdksp3-sblim-cmpi-devel-12337,sdksp4-sblim-cmpi-devel-12337,slessp3-sblim-cmpi-devel-12337,slessp4-sblim-cmpi-devel-12337 SKIP SUSE-RU-2016:0165-1 as sleclo50sp3-python-glanceclient-12340 is not security or has no CVEs. patches: sleclo50sp3-python-glanceclient-12340 SKIP SUSE-RU-2016:0166-1 as SUSE-SLE-SERVER-12-2016-108 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-108 SKIP SUSE-RU-2016:0167-1 as sleclo50sp3-openstack-tempest-12341 is not security or has no CVEs. patches: sleclo50sp3-openstack-tempest-12341 SKIP SUSE-RU-2016:0169-1 as sleman21-supportutils-plugin-susemanager-12342 is not security or has no CVEs. patches: sleman21-supportutils-plugin-susemanager-12342 SKIP SUSE-RU-2016:0175-1 as slessp4-yast2-schema-12343 is not security or has no CVEs. patches: sledsp4-yast2-schema-12343,slessp4-yast2-schema-12343 SKIP SUSE-RU-2016:0181-1 as sleman21-susemanager-sync-data-12345 is not security or has no CVEs. patches: sleman21-susemanager-sync-data-12345 SKIP SUSE-RU-2016:0182-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2016-120 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-120 SKIP SUSE-RU-2016:0183-1 as SUSE-SLE-SERVER-12-SP1-2016-121 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-121,SUSE-SLE-DESKTOP-12-SP1-2016-121,SUSE-SLE-SDK-12-2016-121,SUSE-SLE-SDK-12-SP1-2016-121,SUSE-SLE-SERVER-12-2016-121,SUSE-SLE-SERVER-12-SP1-2016-121 SKIP SUSE-RU-2016:0184-1 as SUSE-SLE-SERVER-12-SP1-2016-122 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-122 SKIP SUSE-RU-2016:0185-1 as slessp4-release-notes-sles-12346 is not security or has no CVEs. patches: slessp4-release-notes-sles-12346 SKIP SUSE-RU-2016:0190-1 as sleclo50sp3-suse-cloud-upgrade-12350 is not security or has no CVEs. patches: sleclo50sp3-suse-cloud-upgrade-12350 SKIP SUSE-RU-2016:0191-1 as sleman21-release-notes-susemanager-12351 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-12351 SKIP SUSE-RU-2016:0193-1 as slessp3-yast2-schema-12352 is not security or has no CVEs. patches: sledsp3-yast2-schema-12352,slessp3-yast2-schema-12352 SKIP SUSE-RU-2016:0194-1 as SUSE-SLE-SERVER-12-SP1-2016-130 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-130 SKIP SUSE-RU-2016:0195-1 as SUSE-SLE-SERVER-12-SP1-2016-133 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-133,SUSE-SLE-DESKTOP-12-SP1-2016-133,SUSE-SLE-SDK-12-2016-133,SUSE-SLE-SDK-12-SP1-2016-133,SUSE-SLE-SERVER-12-2016-133,SUSE-SLE-SERVER-12-SP1-2016-133 SKIP SUSE-RU-2016:0198-1 as SUSE-SLE-SERVER-12-SP1-2016-134 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-134,SUSE-SLE-DESKTOP-12-SP1-2016-134,SUSE-SLE-SDK-12-2016-134,SUSE-SLE-SDK-12-SP1-2016-134,SUSE-SLE-SERVER-12-2016-134,SUSE-SLE-SERVER-12-SP1-2016-134 SKIP SUSE-RU-2016:0208-1 as slessp3-suseRegister-12355 is not security or has no CVEs. patches: sledsp3-suseRegister-12355,slessp3-suseRegister-12355 SKIP SUSE-RU-2016:0229-1 as slehasp4-corosync-12356 is not security or has no CVEs. patches: slehasp3-corosync-12356,slehasp4-corosync-12356 SKIP SUSE-RU-2016:0230-1 as SUSE-SLE-Module-Containers-12-2016-143 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-143 SKIP SUSE-RU-2016:0231-1 as sleclo50sp3-openstack-heat-12359 is not security or has no CVEs. patches: sleclo50sp3-openstack-heat-12359 SKIP SUSE-RU-2016:0232-1 as sleclo50sp3-openstack-dashboard-12358 is not security or has no CVEs. patches: sleclo50sp3-openstack-dashboard-12358 SKIP SUSE-RU-2016:0233-1 as sleclo50sp3-openstack-neutron-12360 is not security or has no CVEs. patches: sleclo50sp3-openstack-neutron-12360 SKIP SUSE-RU-2016:0234-1 as sleclo50sp3-openstack-trove-12364 is not security or has no CVEs. patches: sleclo50sp3-openstack-trove-12364 SKIP SUSE-RU-2016:0235-1 as sleclo50sp3-openstack-ceilometer-12362 is not security or has no CVEs. patches: sleclo50sp3-openstack-ceilometer-12362 SKIP SUSE-RU-2016:0236-1 as sleclo50sp3-openstack-keystone-12361 is not security or has no CVEs. patches: sleclo50sp3-openstack-keystone-12361 SKIP SUSE-RU-2016:0237-1 as sleclo50sp3-openstack-nova-12363 is not security or has no CVEs. patches: sleclo50sp3-openstack-nova-12363 SKIP SUSE-RU-2016:0238-1 as sleclo50sp3-openstack-cinder-12357 is not security or has no CVEs. patches: sleclo50sp3-openstack-cinder-12357 SKIP SUSE-RU-2016:0240-1 as SUSE-SLE-WE-12-SP1-2016-155 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-155,SUSE-SLE-DESKTOP-12-SP1-2016-155,SUSE-SLE-SDK-12-2016-155,SUSE-SLE-SDK-12-SP1-2016-155,SUSE-SLE-SERVER-12-2016-155,SUSE-SLE-SERVER-12-SP1-2016-155,SUSE-SLE-WE-12-2016-155,SUSE-SLE-WE-12-SP1-2016-155 SKIP SUSE-RU-2016:0248-1 as SUSE-SLE-Module-Containers-12-2016-156 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-156 SKIP SUSE-RU-2016:0253-1 as slessp4-mdadm-12367 is not security or has no CVEs. patches: sledsp4-mdadm-12367,slessp4-mdadm-12367 SKIP SUSE-RU-2016:0254-1 as sleclo50sp3-openstack-sahara-12366 is not security or has no CVEs. patches: sleclo50sp3-openstack-sahara-12366 SKIP SUSE-RU-2016:0259-1 as slessp3-udev-12370 is not security or has no CVEs. patches: sdksp3-udev-12370,sledsp3-udev-12370,slessp3-udev-12370 SKIP SUSE-RU-2016:0260-1 as slessp4-udev-12371 is not security or has no CVEs. patches: sdksp4-udev-12371,sledsp4-udev-12371,slessp4-udev-12371 SKIP SUSE-RU-2016:0275-1 as SUSE-SLE12-CLOUD-5-2016-171 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-171,SUSE-SLE-SERVER-12-SP1-2016-171,SUSE-SLE12-CLOUD-5-2016-171 SKIP SUSE-RU-2016:0278-1 as sleclo50sp3-python-ceilometerclient-12375 is not security or has no CVEs. patches: sleclo50sp3-python-ceilometerclient-12375 SKIP SUSE-RU-2016:0283-1 as SUSE-SLE-Module-Public-Cloud-12-2016-176 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-176 SKIP SUSE-RU-2016:0285-1 as SUSE-SLE-SDK-12-SP1-2016-177 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-177 SKIP SUSE-RU-2016:0286-1 as slessp4-xorg-x11-server-12378 is not security or has no CVEs. patches: sdksp3-xorg-x11-server-12378,sdksp4-xorg-x11-server-12378,sledsp3-xorg-x11-server-12378,sledsp4-xorg-x11-server-12378,slessp3-xorg-x11-server-12378,slessp4-xorg-x11-server-12378 SKIP SUSE-RU-2016:0287-1 as SUSE-SLE-SDK-12-SP1-2016-179 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-179,SUSE-SLE-SDK-12-2016-179,SUSE-SLE-SDK-12-SP1-2016-179 SKIP SUSE-RU-2016:0288-1 as slessp4-zypper-12377 is not security or has no CVEs. patches: sledsp3-zypper-12377,sledsp4-zypper-12377,slessp3-zypper-12377,slessp4-zypper-12377 SKIP SUSE-RU-2016:0297-1 as SUSE-SLE12-CLOUD-5-2016-182 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2016-182 SKIP SUSE-RU-2016:0298-1 as SUSE-SLE-SERVER-12-2016-185 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-185,SUSE-SLE-SERVER-12-2016-185 SKIP SUSE-RU-2016:0299-1 as SUSE-SLE-SERVER-12-SP1-2016-186 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-186 SKIP SUSE-RU-2016:0300-1 as SUSE-SLE-SERVER-12-SP1-2016-184 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-184,SUSE-SLE-DESKTOP-12-SP1-2016-184,SUSE-SLE-SDK-12-2016-184,SUSE-SLE-SDK-12-SP1-2016-184,SUSE-SLE-SERVER-12-2016-184,SUSE-SLE-SERVER-12-SP1-2016-184 SKIP SUSE-RU-2016:0314-1 as sleclo50sp3-python-pytz-12381 is not security or has no CVEs. patches: sleclo50sp3-python-pytz-12381 SKIP SUSE-RU-2016:0319-1 as SUSE-SLE-SERVER-12-SP1-2016-192 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-192,SUSE-SLE-DESKTOP-12-SP1-2016-192,SUSE-SLE-SERVER-12-2016-192,SUSE-SLE-SERVER-12-SP1-2016-192 SKIP SUSE-RU-2016:0321-1 as SUSE-SLE-Live-Patching-12-2016-195 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2016-195 SKIP SUSE-RU-2016:0322-1 as SUSE-SLE-WE-12-SP1-2016-194 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-194,SUSE-SLE-SDK-12-SP1-2016-194,SUSE-SLE-SERVER-12-SP1-2016-194,SUSE-SLE-WE-12-SP1-2016-194 SKIP SUSE-RU-2016:0323-1 as SUSE-SLE-SERVER-12-SP1-2016-193 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-193,SUSE-SLE-SERVER-12-SP1-2016-193 SKIP SUSE-RU-2016:0325-1 as SUSE-SLE-WE-12-SP1-2016-196 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-196,SUSE-SLE-WE-12-SP1-2016-196 SKIP SUSE-RU-2016:0329-1 as SUSE-SLE-SERVER-12-SP1-2016-197 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-197,SUSE-SLE-DESKTOP-12-SP1-2016-197,SUSE-SLE-SERVER-12-2016-197,SUSE-SLE-SERVER-12-SP1-2016-197 SKIP SUSE-RU-2016:0333-1 as SUSE-SLE-WE-12-SP1-2016-198 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-198,SUSE-SLE-DESKTOP-12-SP1-2016-198,SUSE-SLE-WE-12-2016-198,SUSE-SLE-WE-12-SP1-2016-198 SKIP SUSE-RU-2016:0346-1 as SUSE-SLE-SERVER-12-SP1-2016-210 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-210 SKIP SUSE-RU-2016:0349-1 as sleclo50sp3-crowbar-barclamp-nova-12387 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-nova-12387 SKIP SUSE-RU-2016:0350-1 as SUSE-SLE-SERVER-12-2016-215 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-215,SUSE-SLE-SDK-12-2016-215,SUSE-SLE-SERVER-12-2016-215 SKIP SUSE-RU-2016:0351-1 as SUSE-SLE-SERVER-12-SP1-2016-213 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-213,SUSE-SLE-SDK-12-SP1-2016-213,SUSE-SLE-SERVER-12-SP1-2016-213 SKIP SUSE-RU-2016:0352-1 as slessp4-perl-Bootloader-12388 is not security or has no CVEs. patches: sledsp4-perl-Bootloader-12388,slessp4-perl-Bootloader-12388 SKIP SUSE-RU-2016:0388-1 as SUSE-SLE-SERVER-12-SP1-2016-225 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-225,SUSE-SLE-DESKTOP-12-SP1-2016-225,SUSE-SLE-SDK-12-2016-225,SUSE-SLE-SDK-12-SP1-2016-225,SUSE-SLE-SERVER-12-2016-225,SUSE-SLE-SERVER-12-SP1-2016-225 SKIP SUSE-RU-2016:0393-1 as SUSE-SLE-SDK-12-SP1-2016-230 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-230,SUSE-SLE-SDK-12-SP1-2016-230 SKIP SUSE-RU-2016:0394-1 as SUSE-SLE-Module-Containers-12-2016-232 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-232 SKIP SUSE-RU-2016:0395-1 as SUSE-SLE-Module-Public-Cloud-12-2016-233 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-233 SKIP SUSE-RU-2016:0396-1 as sleman21-susemanager-sync-data-12392 is not security or has no CVEs. patches: sleman21-susemanager-sync-data-12392 SKIP SUSE-RU-2016:0410-1 as pubclsp3-google-tools-12395 is not security or has no CVEs. patches: pubclsp3-google-tools-12395 SKIP SUSE-RU-2016:0411-1 as sleclo50sp3-rabbitmq-201602-12396 is not security or has no CVEs. patches: sleclo50sp3-rabbitmq-201602-12396 SKIP SUSE-RU-2016:0419-1 as SUSE-SLE-WE-12-SP1-2016-241 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-241,SUSE-SLE-DESKTOP-12-SP1-2016-241,SUSE-SLE-SDK-12-2016-241,SUSE-SLE-SDK-12-SP1-2016-241,SUSE-SLE-SERVER-12-2016-241,SUSE-SLE-SERVER-12-SP1-2016-241,SUSE-SLE-WE-12-2016-241,SUSE-SLE-WE-12-SP1-2016-241 SKIP SUSE-RU-2016:0436-1 as sleclo50sp3-rubygem-chef-12400 is not security or has no CVEs. patches: sleclo50sp3-rubygem-chef-12400 SKIP SUSE-RU-2016:0443-1 as SUSE-SLE-SERVER-12-2016-251 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-251 SKIP SUSE-RU-2016:0444-1 as SUSE-SLE-SERVER-12-SP1-2016-252 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-252,SUSE-SLE-DESKTOP-12-SP1-2016-252,SUSE-SLE-SERVER-12-2016-252,SUSE-SLE-SERVER-12-SP1-2016-252 SKIP SUSE-RU-2016:0445-1 as slessp4-timezone-12401 is not security or has no CVEs. patches: sdksp4-timezone-12401,sledsp4-timezone-12401,slessp2-timezone-12401,slessp3-timezone-12401,slessp4-timezone-12401 SKIP SUSE-RU-2016:0446-1 as SUSE-SLE-SERVER-12-SP1-2016-253 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-253,SUSE-SLE-DESKTOP-12-SP1-2016-253,SUSE-SLE-SERVER-12-2016-253,SUSE-SLE-SERVER-12-SP1-2016-253 SKIP SUSE-RU-2016:0447-1 as SUSE-SLE-Module-Public-Cloud-12-2016-256 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-256 SKIP SUSE-RU-2016:0448-1 as pubclsp3-cloud-regionsrv-client-12402 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-12402 SKIP SUSE-RU-2016:0449-1 as SUSE-SLE-SERVER-12-SP1-2016-255 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-255,SUSE-SLE-SDK-12-SP1-2016-255,SUSE-SLE-SERVER-12-SP1-2016-255 SKIP SUSE-RU-2016:0460-1 as SUSE-SLE-SERVER-12-SP1-2016-267 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-267,SUSE-SLE-DESKTOP-12-SP1-2016-267,SUSE-SLE-SERVER-12-2016-267,SUSE-SLE-SERVER-12-SP1-2016-267 SKIP SUSE-RU-2016:0461-1 as SUSE-SLE-SERVER-12-2016-264 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-264 SKIP SUSE-RU-2016:0462-1 as slessp3-kdump-12403 is not security or has no CVEs. patches: sledsp3-kdump-12403,slessp3-kdump-12403 SKIP SUSE-RU-2016:0463-1 as SUSE-SLE-SERVER-12-SP1-2016-266 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-266,SUSE-SLE-DESKTOP-12-SP1-2016-266,SUSE-SLE-SERVER-12-2016-266,SUSE-SLE-SERVER-12-SP1-2016-266 SKIP SUSE-RU-2016:0467-1 as slessp4-sg3_utils-12404 is not security or has no CVEs. patches: sdksp4-sg3_utils-12404,sledsp4-sg3_utils-12404,slessp4-sg3_utils-12404 SKIP SUSE-RU-2016:0468-1 as SUSE-SLE-SERVER-12-SP1-2016-269 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-269,SUSE-SLE-SDK-12-SP1-2016-269,SUSE-SLE-SERVER-12-SP1-2016-269 SKIP SUSE-RU-2016:0469-1 as SUSE-SLE-WE-12-SP1-2016-270 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-270,SUSE-SLE-DESKTOP-12-SP1-2016-270,SUSE-SLE-SERVER-12-2016-270,SUSE-SLE-SERVER-12-SP1-2016-270,SUSE-SLE-WE-12-2016-270,SUSE-SLE-WE-12-SP1-2016-270 SKIP SUSE-RU-2016:0474-1 as slessp4-yast2-kdump-12407 is not security or has no CVEs. patches: sdksp4-yast2-kdump-12407,sledsp4-yast2-kdump-12407,slessp4-yast2-kdump-12407 SKIP SUSE-RU-2016:0493-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2016-279 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-279,SUSE-SLE-DESKTOP-12-SP1-2016-279,SUSE-SLE-Module-Adv-Systems-Management-12-2016-279 SKIP SUSE-RU-2016:0494-1 as SUSE-SLE-WE-12-SP1-2016-280 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-280,SUSE-SLE-DESKTOP-12-SP1-2016-280,SUSE-SLE-SDK-12-2016-280,SUSE-SLE-SDK-12-SP1-2016-280,SUSE-SLE-SERVER-12-2016-280,SUSE-SLE-SERVER-12-SP1-2016-280,SUSE-SLE-WE-12-2016-280,SUSE-SLE-WE-12-SP1-2016-280 SKIP SUSE-RU-2016:0495-1 as SUSE-SLE-SERVER-12-SP1-2016-281 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-281 SKIP SUSE-RU-2016:0504-1 as slessp4-kdump-12411 is not security or has no CVEs. patches: sledsp4-kdump-12411,slessp4-kdump-12411 SKIP SUSE-RU-2016:0505-1 as SUSE-SLE-HA-12-SP1-2016-284 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-284 SKIP SUSE-RU-2016:0506-1 as SUSE-SLE12-CLOUD-5-2016-285 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2016-285 SKIP SUSE-RU-2016:0507-1 as SUSE-SLE-WE-12-SP1-2016-287 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-287,SUSE-SLE-DESKTOP-12-SP1-2016-287,SUSE-SLE-WE-12-2016-287,SUSE-SLE-WE-12-SP1-2016-287 SKIP SUSE-RU-2016:0508-1 as SUSE-SLE-SERVER-12-SP1-2016-286 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-286,SUSE-SLE-DESKTOP-12-SP1-2016-286,SUSE-SLE-SERVER-12-2016-286,SUSE-SLE-SERVER-12-SP1-2016-286 SKIP SUSE-RU-2016:0509-1 as SUSE-SLE12-CLOUD-5-2016-288 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-288,SUSE-SLE-Module-Public-Cloud-12-2016-288,SUSE-SLE12-CLOUD-5-2016-288 SKIP SUSE-RU-2016:0516-1 as SUSE-SLE-SERVER-12-2016-290 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-290,SUSE-SLE-SERVER-12-2016-290 SKIP SUSE-RU-2016:0517-1 as SUSE-SLE-SERVER-12-SP1-2016-291 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-291,SUSE-SLE-DESKTOP-12-SP1-2016-291,SUSE-SLE-SDK-12-2016-291,SUSE-SLE-SDK-12-SP1-2016-291,SUSE-SLE-SERVER-12-2016-291,SUSE-SLE-SERVER-12-SP1-2016-291 SKIP SUSE-RU-2016:0542-1 as SUSE-SLE-HA-GEO-12-SP1-2016-296 is not security or has no CVEs. patches: SUSE-SLE-HA-GEO-12-SP1-2016-296 SKIP SUSE-RU-2016:0543-1 as slessp4-clamav-12412 is not security or has no CVEs. patches: sledsp4-clamav-12412,slessp4-clamav-12412 SKIP SUSE-RU-2016:0545-1 as SUSE-SLE-SERVER-12-SP1-2016-297 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-297,SUSE-SLE-DESKTOP-12-SP1-2016-297,SUSE-SLE-SERVER-12-2016-297,SUSE-SLE-SERVER-12-SP1-2016-297 SKIP SUSE-RU-2016:0546-1 as SUSE-SLE-SERVER-12-SP1-2016-299 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-299,SUSE-SLE-SERVER-12-SP1-2016-299 SKIP SUSE-RU-2016:0547-1 as SUSE-SLE-SERVER-12-SP1-2016-300 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-300,SUSE-SLE-DESKTOP-12-SP1-2016-300,SUSE-SLE-SDK-12-2016-300,SUSE-SLE-SDK-12-SP1-2016-300,SUSE-SLE-SERVER-12-2016-300,SUSE-SLE-SERVER-12-SP1-2016-300 SKIP SUSE-RU-2016:0548-1 as SUSE-SLE12-CLOUD-5-2016-302 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-302,SUSE-SLE-Module-Public-Cloud-12-2016-302,SUSE-SLE-SERVER-12-SP1-2016-302,SUSE-SLE12-CLOUD-5-2016-302 SKIP SUSE-RU-2016:0550-1 as slessp4-xorg-x11-driver-input-12413 is not security or has no CVEs. patches: sledsp4-xorg-x11-driver-input-12413,slessp4-xorg-x11-driver-input-12413 SKIP SUSE-RU-2016:0551-1 as SUSE-SLE-SERVER-12-SP1-2016-304 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-304,SUSE-SLE-DESKTOP-12-SP1-2016-304,SUSE-SLE-SDK-12-2016-304,SUSE-SLE-SDK-12-SP1-2016-304,SUSE-SLE-SERVER-12-2016-304,SUSE-SLE-SERVER-12-SP1-2016-304 SKIP SUSE-RU-2016:0552-1 as SUSE-SLE-SERVER-12-SP1-2016-305 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-305,SUSE-SLE-DESKTOP-12-SP1-2016-305,SUSE-SLE-SDK-12-2016-305,SUSE-SLE-SDK-12-SP1-2016-305,SUSE-SLE-SERVER-12-2016-305,SUSE-SLE-SERVER-12-SP1-2016-305 SKIP SUSE-RU-2016:0556-1 as SUSE-SLE-SERVER-12-2016-308 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-308 SKIP SUSE-RU-2016:0557-1 as SUSE-SLE12-CLOUD-5-2016-309 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2016-309 SKIP SUSE-RU-2016:0558-1 as SUSE-SLE-Module-Public-Cloud-12-2016-314 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-314 SKIP SUSE-RU-2016:0559-1 as pubclsp3-google-tools-12415 is not security or has no CVEs. patches: pubclsp3-google-tools-12415 SKIP SUSE-RU-2016:0560-1 as sleclo50sp3-crowbar-barclamp-201602-12414 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-201602-12414 SKIP SUSE-RU-2016:0561-1 as SUSE-SLE-Module-Public-Cloud-12-2016-315 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-315 SKIP SUSE-RU-2016:0562-1 as SUSE-SLE-SERVER-12-SP1-2016-311 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-311,SUSE-SLE-SERVER-12-SP1-2016-311 SKIP SUSE-RU-2016:0563-1 as SUSE-SLE-HA-12-SP1-2016-312 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-312 SKIP SUSE-RU-2016:0571-1 as SUSE-SLE-SERVER-12-SP1-2016-318 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-318,SUSE-SLE-SDK-12-SP1-2016-318,SUSE-SLE-SERVER-12-SP1-2016-318 SKIP SUSE-RU-2016:0572-1 as slehasp4-crmsh-12417 is not security or has no CVEs. patches: slehasp4-crmsh-12417 SKIP SUSE-RU-2016:0582-1 as SUSE-SLE-SERVER-12-SP1-2016-326 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-326 SKIP SUSE-RU-2016:0583-1 as slessp4-openwsman-12420 is not security or has no CVEs. patches: sdksp3-openwsman-12420,sdksp4-openwsman-12420,sledsp3-openwsman-12420,sledsp4-openwsman-12420,slessp3-openwsman-12420,slessp4-openwsman-12420 SKIP SUSE-RU-2016:0586-1 as SUSE-SLE-SERVER-12-SP1-2016-330 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-330,SUSE-SLE-SDK-12-SP1-2016-330,SUSE-SLE-SERVER-12-SP1-2016-330 SKIP SUSE-RU-2016:0587-1 as SUSE-SLE-SERVER-12-2016-331 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-331,SUSE-SLE-SDK-12-2016-331,SUSE-SLE-SERVER-12-2016-331 SKIP SUSE-RU-2016:0594-1 as SUSE-SLE-Module-Public-Cloud-12-2016-332 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-332 SKIP SUSE-RU-2016:0595-1 as SUSE-SLE-WE-12-SP1-2016-333 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-333,SUSE-SLE-DESKTOP-12-SP1-2016-333,SUSE-SLE-SDK-12-2016-333,SUSE-SLE-SDK-12-SP1-2016-333,SUSE-SLE-SERVER-12-2016-333,SUSE-SLE-SERVER-12-SP1-2016-333,SUSE-SLE-WE-12-2016-333,SUSE-SLE-WE-12-SP1-2016-333 SKIP SUSE-RU-2016:0596-1 as SUSE-SLE-SERVER-12-SP1-2016-334 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-334,SUSE-SLE-SERVER-12-SP1-2016-334 SKIP SUSE-RU-2016:0606-1 as slessp4-sax2-12428 is not security or has no CVEs. patches: sdksp4-sax2-12428,sledsp4-sax2-12428,slessp4-sax2-12428 SKIP SUSE-RU-2016:0607-1 as SUSE-SLE-SDK-12-SP1-2016-346 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-346,SUSE-SLE-SDK-12-SP1-2016-346 SKIP SUSE-RU-2016:0608-1 as SUSE-SLE-SERVER-12-SP1-2016-345 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-345,SUSE-SLE-SERVER-12-SP1-2016-345 SKIP SUSE-RU-2016:0614-1 as SUSE-SLE-SERVER-12-SP1-2016-349 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-349,SUSE-SLE-SDK-12-SP1-2016-349,SUSE-SLE-SERVER-12-SP1-2016-349 SKIP SUSE-RU-2016:0615-1 as SUSE-SLE-SERVER-12-2016-348 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-348,SUSE-SLE-SDK-12-2016-348,SUSE-SLE-SERVER-12-2016-348 SKIP SUSE-RU-2016:0616-1 as SUSE-SLE-SDK-12-SP1-2016-350 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-350 SKIP SUSE-RU-2016:0626-1 as SUSE-SLE-HA-12-SP1-2016-360 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-360 SKIP SUSE-RU-2016:0630-1 as slessp4-lilo-12435 is not security or has no CVEs. patches: sledsp4-lilo-12435,slessp4-lilo-12435 SKIP SUSE-RU-2016:0632-1 as SUSE-SLE-SERVER-12-SP1-2016-364 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-364,SUSE-SLE-SDK-12-SP1-2016-364,SUSE-SLE-SERVER-12-SP1-2016-364 SKIP SUSE-RU-2016:0633-1 as SUSE-Storage-2.1-2016-363 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-363,SUSE-SLE12-CLOUD-5-2016-363,SUSE-Storage-1.0-2016-363,SUSE-Storage-2-2016-363,SUSE-Storage-2.1-2016-363 SKIP SUSE-RU-2016:0634-1 as SUSE-SLE-HA-12-SP1-2016-365 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-365 SKIP SUSE-RU-2016:0642-1 as slessp4-grub2-12438 is not security or has no CVEs. patches: sledsp4-grub2-12438,slessp4-grub2-12438 SKIP SUSE-RU-2016:0643-1 as SUSE-SLE-SERVER-12-2016-369 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-369,SUSE-SLE-SERVER-12-2016-369 SKIP SUSE-RU-2016:0644-1 as SUSE-SLE-SERVER-12-SP1-2016-370 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-370,SUSE-SLE-SERVER-12-SP1-2016-370 SKIP SUSE-RU-2016:0645-1 as SUSE-SLE-SERVER-12-SP1-2016-371 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-371,SUSE-SLE-DESKTOP-12-SP1-2016-371,SUSE-SLE-SERVER-12-2016-371,SUSE-SLE-SERVER-12-SP1-2016-371 SKIP SUSE-RU-2016:0646-1 as SUSE-SLE-SERVER-12-SP1-2016-372 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-372 SKIP SUSE-RU-2016:0652-1 as SUSE-SLE-SERVER-12-SP1-2016-374 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-374,SUSE-SLE-SDK-12-SP1-2016-374,SUSE-SLE-SERVER-12-SP1-2016-374 SKIP SUSE-RU-2016:0653-1 as SUSE-SLE-WE-12-SP1-2016-373 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-373,SUSE-SLE-DESKTOP-12-SP1-2016-373,SUSE-SLE-SDK-12-2016-373,SUSE-SLE-SDK-12-SP1-2016-373,SUSE-SLE-SERVER-12-2016-373,SUSE-SLE-SERVER-12-SP1-2016-373,SUSE-SLE-WE-12-2016-373,SUSE-SLE-WE-12-SP1-2016-373 SKIP SUSE-RU-2016:0654-1 as SUSE-SLE-SERVER-12-2016-376 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-376,SUSE-SLE-SERVER-12-2016-376 SKIP SUSE-RU-2016:0655-1 as SUSE-SLE-SERVER-12-SP1-2016-375 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-375,SUSE-SLE-SERVER-12-SP1-2016-375 SKIP SUSE-RU-2016:0656-1 as sleclo50sp3-barclamp-pacemaker-neutron-12439 is not security or has no CVEs. patches: sleclo50sp3-barclamp-pacemaker-neutron-12439 SKIP SUSE-RU-2016:0657-1 as SUSE-SLE-SERVER-12-SP1-2016-379 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-379,SUSE-SLE-SERVER-12-SP1-2016-379 SKIP SUSE-RU-2016:0659-1 as SUSE-SLE-SERVER-12-2016-378 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-378,SUSE-SLE-SERVER-12-2016-378 SKIP SUSE-RU-2016:0676-1 as SUSE-SLE-SERVER-12-SP1-2016-382 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-382,SUSE-SLE-DESKTOP-12-SP1-2016-382,SUSE-SLE-SDK-12-2016-382,SUSE-SLE-SDK-12-SP1-2016-382,SUSE-SLE-SERVER-12-2016-382,SUSE-SLE-SERVER-12-SP1-2016-382 SKIP SUSE-RU-2016:0679-1 as SUSE-SLE-WE-12-SP1-2016-385 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-385,SUSE-SLE-WE-12-SP1-2016-385 SKIP SUSE-RU-2016:0680-1 as SUSE-SLE-SERVER-12-SP1-2016-384 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-384,SUSE-SLE-SERVER-12-SP1-2016-384 SKIP SUSE-RU-2016:0682-1 as SUSE-SLE-HA-12-2016-387 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-387 SKIP SUSE-RU-2016:0683-1 as SUSE-SLE-SERVER-12-SP1-2016-386 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-386,SUSE-SLE-SERVER-12-SP1-2016-386 SKIP SUSE-RU-2016:0686-1 as SUSE-SLE-SERVER-12-2016-388 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-388,SUSE-SLE-SERVER-12-2016-388 SKIP SUSE-RU-2016:0687-1 as SUSE-SLE-SERVER-12-SP1-2016-389 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-389,SUSE-SLE-SERVER-12-SP1-2016-389 SKIP SUSE-RU-2016:0688-1 as SUSE-SLE-HA-12-SP1-2016-392 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-392 SKIP SUSE-RU-2016:0689-1 as SUSE-SLE-SERVER-12-SP1-2016-391 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-391,SUSE-SLE-SERVER-12-SP1-2016-391 SKIP SUSE-RU-2016:0693-1 as SUSE-SLE-SERVER-12-2016-395 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-395,SUSE-SLE-SERVER-12-2016-395 SKIP SUSE-RU-2016:0695-1 as SUSE-SLE-SERVER-12-SP1-2016-394 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-394,SUSE-SLE-SERVER-12-SP1-2016-394 SKIP SUSE-RU-2016:0696-1 as SUSE-SLE-WE-12-SP1-2016-397 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-397,SUSE-SLE-WE-12-SP1-2016-397 SKIP SUSE-RU-2016:0697-1 as SUSE-SLE-SERVER-12-SP1-2016-396 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-396,SUSE-SLE-SERVER-12-SP1-2016-396 SKIP SUSE-RU-2016:0698-1 as SUSE-SLE-SERVER-12-SP1-2016-398 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-398 SKIP SUSE-RU-2016:0703-1 as SUSE-SLE-SERVER-12-SP1-2016-401 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-401,SUSE-SLE-SERVER-12-SP1-2016-401 SKIP SUSE-RU-2016:0704-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2016-402 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-402 SKIP SUSE-RU-2016:0705-1 as SUSE-SLE-SERVER-12-2016-403 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-403,SUSE-SLE-SERVER-12-2016-403 SKIP SUSE-RU-2016:0711-1 as SUSE-SLE12-CLOUD-5-2016-407 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-407,SUSE-SLE12-CLOUD-5-2016-407 SKIP SUSE-RU-2016:0712-1 as SUSE-Storage-2.1-2016-406 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-406,SUSE-SLE12-CLOUD-5-2016-406,SUSE-Storage-2.1-2016-406 SKIP SUSE-RU-2016:0714-1 as SUSE-SLE-HA-12-2016-409 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-409 SKIP SUSE-RU-2016:0717-1 as SUSE-SLE-SERVER-12-SP1-2016-414 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-414,SUSE-SLE-DESKTOP-12-SP1-2016-414,SUSE-SLE-SERVER-12-2016-414,SUSE-SLE-SERVER-12-SP1-2016-414 SKIP SUSE-RU-2016:0725-1 as SUSE-SLE-SERVER-12-SP1-2016-417 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-417,SUSE-SLE-DESKTOP-12-SP1-2016-417,SUSE-SLE-SDK-12-2016-417,SUSE-SLE-SDK-12-SP1-2016-417,SUSE-SLE-SERVER-12-2016-417,SUSE-SLE-SERVER-12-SP1-2016-417 SKIP SUSE-RU-2016:0726-1 as slessp4-ceph-12446 is not security or has no CVEs. patches: sdksp4-ceph-12446,sledsp4-ceph-12446,slessp4-ceph-12446 SKIP SUSE-RU-2016:0728-1 as SUSE-SLE-SERVER-12-SP1-2016-420 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-420,SUSE-SLE-SERVER-12-SP1-2016-420 SKIP SUSE-RU-2016:0738-1 as SUSE-SLE-HA-12-SP1-2016-423 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-423 SKIP SUSE-RU-2016:0740-1 as sleclo50sp3-couchdb-12447 is not security or has no CVEs. patches: sleclo50sp3-couchdb-12447 SKIP SUSE-RU-2016:0741-1 as sleclo50sp3-openstack-nova-12448 is not security or has no CVEs. patches: sleclo50sp3-openstack-nova-12448 SKIP SUSE-RU-2016:0742-1 as sleclo50sp3-crowbar-barclamp-201603-12449 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-201603-12449 SKIP SUSE-RU-2016:0743-1 as slessp4-zypper-12451 is not security or has no CVEs. patches: sdksp4-zypper-12451,sledsp4-zypper-12451,slessp4-zypper-12451 SKIP SUSE-RU-2016:0744-1 as SUSE-OpenStack-Cloud-6-2016-429 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-429 SKIP SUSE-RU-2016:0758-1 as SUSE-SLE-SERVER-12-SP1-2016-443 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-443,SUSE-SLE-SDK-12-SP1-2016-443,SUSE-SLE-SERVER-12-SP1-2016-443 SKIP SUSE-RU-2016:0760-1 as slehasp4-crmsh-12452 is not security or has no CVEs. patches: slehasp4-crmsh-12452 SKIP SUSE-RU-2016:0763-1 as SUSE-SLE-WE-12-SP1-2016-446 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-446,SUSE-SLE-DESKTOP-12-SP1-2016-446,SUSE-SLE-WE-12-2016-446,SUSE-SLE-WE-12-SP1-2016-446 SKIP SUSE-RU-2016:0765-1 as SUSE-SLE-HA-12-2016-447 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-447 SKIP SUSE-RU-2016:0771-1 as slemap21-suse-manager-proxy-21-201602-12454 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201602-12454 SKIP SUSE-RU-2016:0772-1 as sleman21-suse-manager-21-201602-12454 is not security or has no CVEs. patches: sleman21-suse-manager-21-201602-12454 SKIP SUSE-RU-2016:0773-1 as slessp4-client-tools-21-201602-12454 is not security or has no CVEs. patches: sledsp4-client-tools-21-201602-12454,slessp4-client-tools-21-201602-12454 SKIP SUSE-RU-2016:0774-1 as SUSE-SLE-Manager-Tools-12-2016-454 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-454 SKIP SUSE-RU-2016:0775-1 as slesctsp4-client-tools-201602-12454 is not security or has no CVEs. patches: slesctsp3-client-tools-201602-12454,slesctsp4-client-tools-201602-12454 SKIP SUSE-RU-2016:0792-1 as SUSE-SLE-SERVER-12-SP1-2016-466 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-466,SUSE-SLE-SDK-12-SP1-2016-466,SUSE-SLE-SERVER-12-SP1-2016-466 SKIP SUSE-RU-2016:0793-1 as SUSE-SLE-SERVER-12-SP1-2016-464 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-464,SUSE-SLE-SERVER-12-SP1-2016-464 SKIP SUSE-RU-2016:0794-1 as SUSE-SLE-SERVER-12-SP1-2016-463 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-463,SUSE-SLE-SDK-12-SP1-2016-463,SUSE-SLE-SERVER-12-SP1-2016-463 SKIP SUSE-RU-2016:0795-1 as SUSE-SLE-SERVER-12-SP1-2016-465 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-465,SUSE-SLE-SDK-12-SP1-2016-465,SUSE-SLE-SERVER-12-SP1-2016-465 SKIP SUSE-RU-2016:0797-1 as SUSE-SLE-SERVER-12-SP1-2016-462 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-462,SUSE-SLE-DESKTOP-12-SP1-2016-462,SUSE-SLE-SDK-12-2016-462,SUSE-SLE-SDK-12-SP1-2016-462,SUSE-SLE-SERVER-12-2016-462,SUSE-SLE-SERVER-12-SP1-2016-462 SKIP SUSE-RU-2016:0799-1 as slessp4-autofs-12461 is not security or has no CVEs. patches: sledsp4-autofs-12461,slessp4-autofs-12461 SKIP SUSE-RU-2016:0804-1 as SUSE-SLE-SERVER-12-SP1-2016-470 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-470,SUSE-SLE-SDK-12-SP1-2016-470,SUSE-SLE-SERVER-12-SP1-2016-470 SKIP SUSE-RU-2016:0808-1 as SUSE-SLE-SDK-12-2016-474 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-474 SKIP SUSE-RU-2016:0810-1 as SUSE-SLE-SERVER-12-2016-475 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-475,SUSE-SLE-SDK-12-2016-475,SUSE-SLE-SERVER-12-2016-475 SKIP SUSE-RU-2016:0821-1 as SUSE-SLE-SERVER-12-SP1-2016-479 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-479,SUSE-SLE-DESKTOP-12-SP1-2016-479,SUSE-SLE-SERVER-12-2016-479,SUSE-SLE-SERVER-12-SP1-2016-479 SKIP SUSE-RU-2016:0823-1 as SUSE-OpenStack-Cloud-6-2016-481 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-481 SKIP SUSE-RU-2016:0824-1 as sleclo50sp3-documentation-201603-12463 is not security or has no CVEs. patches: sleclo50sp3-documentation-201603-12463 SKIP SUSE-RU-2016:0846-1 as SUSE-SLE-SERVER-12-2016-488 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-488,SUSE-SLE-SERVER-12-2016-488 SKIP SUSE-RU-2016:0847-1 as SUSE-SLE-SERVER-12-SP1-2016-490 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-490,SUSE-SLE-DESKTOP-12-SP1-2016-490,SUSE-SLE-SERVER-12-2016-490,SUSE-SLE-SERVER-12-SP1-2016-490 SKIP SUSE-RU-2016:0848-1 as SUSE-SLE-HA-12-2016-489 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-489 SKIP SUSE-RU-2016:0849-1 as SUSE-SLE-SERVER-12-SP1-2016-487 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-487,SUSE-SLE-SERVER-12-SP1-2016-487 SKIP SUSE-RU-2016:0855-1 as SUSE-Storage-2-2016-493 is not security or has no CVEs. patches: SUSE-Storage-2-2016-493 SKIP SUSE-RU-2016:0856-1 as SUSE-Storage-2.1-2016-494 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-494 SKIP SUSE-RU-2016:0860-1 as SUSE-SLE-SERVER-12-SP1-2016-497 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-497,SUSE-SLE-SDK-12-SP1-2016-497,SUSE-SLE-SERVER-12-SP1-2016-497 SKIP SUSE-RU-2016:0861-1 as SUSE-SLE-SERVER-12-SP1-2016-498 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-498,SUSE-SLE-DESKTOP-12-SP1-2016-498,SUSE-SLE-SERVER-12-2016-498,SUSE-SLE-SERVER-12-SP1-2016-498 SKIP SUSE-RU-2016:0862-1 as slessp4-timezone-12470 is not security or has no CVEs. patches: sdksp4-timezone-12470,sledsp4-timezone-12470,slessp2-timezone-12470,slessp3-timezone-12470,slessp4-timezone-12470 SKIP SUSE-RU-2016:0866-1 as SUSE-Storage-2.1-2016-500 is not security or has no CVEs. patches: SUSE-Storage-1.0-2016-500,SUSE-Storage-2-2016-500,SUSE-Storage-2.1-2016-500 SKIP SUSE-RU-2016:0868-1 as SUSE-SLE-SERVER-12-SP1-2016-503 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-503,SUSE-SLE-DESKTOP-12-SP1-2016-503,SUSE-SLE-SERVER-12-2016-503,SUSE-SLE-SERVER-12-SP1-2016-503 SKIP SUSE-RU-2016:0869-1 as slessp4-ipmitool-12471 is not security or has no CVEs. patches: sledsp4-ipmitool-12471,slessp4-ipmitool-12471 SKIP SUSE-RU-2016:0871-1 as slessp4-libqt4-12473 is not security or has no CVEs. patches: sdksp4-libqt4-12473,sledsp4-libqt4-12473,slessp4-libqt4-12473 SKIP SUSE-RU-2016:0889-1 as SUSE-SLE-SERVER-12-SP1-2016-510 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-510,SUSE-SLE-DESKTOP-12-SP1-2016-510,SUSE-SLE-SERVER-12-2016-510,SUSE-SLE-SERVER-12-SP1-2016-510 SKIP SUSE-RU-2016:0890-1 as slessp4-timezone-12475 is not security or has no CVEs. patches: sdksp4-timezone-12475,sledsp4-timezone-12475,slessp2-timezone-12475,slessp3-timezone-12475,slessp4-timezone-12475 SKIP SUSE-RU-2016:0907-1 as slessp4-openldap2-12482 is not security or has no CVEs. patches: sdksp4-openldap2-12482,secsp3-openldap2-12482,sledsp4-openldap2-12482,slessp4-openldap2-12482 SKIP SUSE-RU-2016:0913-1 as SUSE-SLE-Module-Public-Cloud-12-2016-525 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-525 SKIP SUSE-RU-2016:0916-1 as SUSE-SLE-SAP-12-SP1-2016-529 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-529 SKIP SUSE-RU-2016:0918-1 as SUSE-SLE-SERVER-12-SP1-2016-527 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-527 SKIP SUSE-RU-2016:0919-1 as SUSE-SLE-SERVER-12-SP1-2016-526 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-526,SUSE-SLE-DESKTOP-12-SP1-2016-526,SUSE-SLE-SERVER-12-2016-526,SUSE-SLE-SERVER-12-SP1-2016-526 SKIP SUSE-RU-2016:0925-1 as SUSE-SLE-SERVER-12-2016-533 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-533,SUSE-SLE-SDK-12-2016-533,SUSE-SLE-SERVER-12-2016-533 SKIP SUSE-RU-2016:0926-1 as SUSE-SLE-SERVER-12-SP1-2016-532 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-532,SUSE-SLE-SDK-12-SP1-2016-532,SUSE-SLE-SERVER-12-SP1-2016-532 SKIP SUSE-RU-2016:0932-1 as SUSE-SLE-SDK-12-SP1-2016-538 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-538 SKIP SUSE-RU-2016:0933-1 as SUSE-SLE-SERVER-12-2016-537 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-537,SUSE-SLE-SERVER-12-2016-537 SKIP SUSE-RU-2016:0934-1 as SUSE-SLE-SERVER-12-SP1-2016-536 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-536,SUSE-SLE-SDK-12-SP1-2016-536,SUSE-SLE-SERVER-12-SP1-2016-536 SKIP SUSE-RU-2016:0937-1 as slessp4-elilo-12488 is not security or has no CVEs. patches: sledsp4-elilo-12488,slessp4-elilo-12488 SKIP SUSE-RU-2016:0938-1 as SUSE-SLE-SERVER-12-2016-542 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-542 SKIP SUSE-RU-2016:0939-1 as SUSE-SLE-WE-12-2016-544 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-544,SUSE-SLE-WE-12-2016-544 SKIP SUSE-RU-2016:0940-1 as SUSE-SLE-SERVER-12-SP1-2016-543 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-543,SUSE-SLE-DESKTOP-12-SP1-2016-543,SUSE-SLE-SDK-12-2016-543,SUSE-SLE-SDK-12-SP1-2016-543,SUSE-SLE-SERVER-12-2016-543,SUSE-SLE-SERVER-12-SP1-2016-543 SKIP SUSE-RU-2016:0949-1 as slessp4-release-notes-sles-12490 is not security or has no CVEs. patches: slessp4-release-notes-sles-12490 SKIP SUSE-RU-2016:0952-1 as SUSE-SLE-SERVER-12-SP1-2016-552 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-552,SUSE-SLE-DESKTOP-12-SP1-2016-552,SUSE-SLE-SERVER-12-2016-552,SUSE-SLE-SERVER-12-SP1-2016-552 SKIP SUSE-RU-2016:0960-1 as slessp3-release-notes-sles-12494 is not security or has no CVEs. patches: slessp3-release-notes-sles-12494 SKIP SUSE-RU-2016:0961-1 as slemap21-release-notes-susemanager-12495 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-12495,slemap21-release-notes-susemanager-12495 SKIP SUSE-RU-2016:0962-1 as SUSE-SLE-SDK-12-SP1-2016-558 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-558 SKIP SUSE-RU-2016:0964-1 as SUSE-SLE-SERVER-12-2016-566 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-566,SUSE-SLE-SERVER-12-2016-566 SKIP SUSE-RU-2016:0965-1 as SUSE-SLE-SERVER-12-SP1-2016-567 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-567,SUSE-SLE-SERVER-12-SP1-2016-567 SKIP SUSE-RU-2016:0973-1 as SUSE-SLE-SERVER-12-SP1-2016-575 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-575,SUSE-SLE-DESKTOP-12-SP1-2016-575,SUSE-SLE-SERVER-12-2016-575,SUSE-SLE-SERVER-12-SP1-2016-575 SKIP SUSE-RU-2016:0974-1 as SUSE-SLE-SERVER-12-SP1-2016-576 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-576,SUSE-SLE-SERVER-12-SP1-2016-576 SKIP SUSE-RU-2016:0975-1 as SUSE-SLE-SERVER-12-2016-577 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-577,SUSE-SLE-SERVER-12-2016-577 SKIP SUSE-RU-2016:0976-1 as SUSE-SLE-SERVER-12-SP1-2016-578 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-578,SUSE-SLE-DESKTOP-12-SP1-2016-578,SUSE-SLE-SDK-12-2016-578,SUSE-SLE-SDK-12-SP1-2016-578,SUSE-SLE-SERVER-12-2016-578,SUSE-SLE-SERVER-12-SP1-2016-578 SKIP SUSE-RU-2016:0977-1 as slessp4-at-12500 is not security or has no CVEs. patches: sledsp4-at-12500,slessp4-at-12500 SKIP SUSE-RU-2016:0978-1 as SUSE-SLE-HA-12-2016-579 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-579 SKIP SUSE-RU-2016:0979-1 as slesmtsp3-smt-12501 is not security or has no CVEs. patches: slesmtsp3-smt-12501 SKIP SUSE-RU-2016:0980-1 as SUSE-SLE-SERVER-12-2016-580 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-580,SUSE-SLE-SERVER-12-2016-580 SKIP SUSE-RU-2016:0981-1 as 4893 is not security or has no CVEs. patches: 4893 SKIP SUSE-RU-2016:0991-1 as SUSE-SLE-SERVER-12-SP1-2016-583 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-583,SUSE-SLE-SDK-12-SP1-2016-583,SUSE-SLE-SERVER-12-SP1-2016-583 SKIP SUSE-RU-2016:0992-1 as slessp4-apparmor-12502 is not security or has no CVEs. patches: sdksp4-apparmor-12502,sledsp4-apparmor-12502,slessp4-apparmor-12502 SKIP SUSE-RU-2016:0993-1 as slessp4-multipath-tools-12503 is not security or has no CVEs. patches: sledsp4-multipath-tools-12503,slessp4-multipath-tools-12503 SKIP SUSE-RU-2016:0996-1 as SUSE-SLE-SERVER-12-SP1-2016-587 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-587,SUSE-SLE-DESKTOP-12-SP1-2016-587,SUSE-SLE-SERVER-12-2016-587,SUSE-SLE-SERVER-12-SP1-2016-587 SKIP SUSE-RU-2016:1001-1 as SUSE-SLE-SERVER-12-SP1-2016-592 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-592,SUSE-SLE-DESKTOP-12-SP1-2016-592,SUSE-SLE-SERVER-12-2016-592,SUSE-SLE-SERVER-12-SP1-2016-592 SKIP SUSE-RU-2016:1002-1 as SUSE-SLE-SERVER-12-2016-593 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-593,SUSE-SLE-SERVER-12-2016-593 SKIP SUSE-RU-2016:1003-1 as sledsp4-pidgin-sipe-12504 is not security or has no CVEs. patches: sledsp4-pidgin-sipe-12504 SKIP SUSE-RU-2016:1006-1 as SUSE-SLE-SDK-12-SP1-2016-595 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-595,SUSE-SLE-SDK-12-SP1-2016-595 SKIP SUSE-RU-2016:1017-1 as SUSE-SLE-SERVER-12-SP1-2016-599 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-599 SKIP SUSE-RU-2016:1020-1 as SUSE-SLE-SERVER-12-SP1-2016-602 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-602,SUSE-SLE-DESKTOP-12-SP1-2016-602,SUSE-SLE-SERVER-12-2016-602,SUSE-SLE-SERVER-12-SP1-2016-602 SKIP SUSE-RU-2016:1021-1 as slessp4-clamav-12506 is not security or has no CVEs. patches: sledsp4-clamav-12506,slessp4-clamav-12506 SKIP SUSE-RU-2016:1036-1 as slessp4-openssl-certs-12509 is not security or has no CVEs. patches: slessp2-openssl-certs-12509,slessp3-openssl-certs-12509,slessp4-openssl-certs-12509 SKIP SUSE-RU-2016:1043-1 as SUSE-SLE-SERVER-12-2016-621 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-621,SUSE-SLE-SDK-12-2016-621,SUSE-SLE-SERVER-12-2016-621 SKIP SUSE-RU-2016:1044-1 as SUSE-SLE-SERVER-12-2016-620 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-620,SUSE-SLE-SERVER-12-2016-620 SKIP SUSE-RU-2016:1047-1 as SUSE-SLE-SERVER-12-SP1-2016-624 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-624,SUSE-SLE-SERVER-12-SP1-2016-624 SKIP SUSE-RU-2016:1048-1 as SUSE-Storage-2-2016-631 is not security or has no CVEs. patches: SUSE-Storage-2-2016-631 SKIP SUSE-RU-2016:1049-1 as SUSE-Storage-2-2016-628 is not security or has no CVEs. patches: SUSE-Storage-2-2016-628 SKIP SUSE-RU-2016:1050-1 as SUSE-Storage-2.1-2016-630 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-630 SKIP SUSE-RU-2016:1051-1 as SUSE-Storage-2.1-2016-629 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-629 SKIP SUSE-RU-2016:1052-1 as SUSE-Storage-2-2016-625 is not security or has no CVEs. patches: SUSE-Storage-2-2016-625 SKIP SUSE-RU-2016:1053-1 as SUSE-Storage-2.1-2016-627 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-627 SKIP SUSE-RU-2016:1054-1 as SUSE-SLE-HA-12-SP1-2016-626 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-626 SKIP SUSE-RU-2016:1055-1 as slessp4-grub2-12510 is not security or has no CVEs. patches: slessp4-grub2-12510 SKIP SUSE-RU-2016:1056-1 as SUSE-SLE-SERVER-12-SP1-2016-634 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-634,SUSE-SLE-SDK-12-SP1-2016-634,SUSE-SLE-SERVER-12-SP1-2016-634 SKIP SUSE-RU-2016:1092-1 as SUSE-SLE-SERVER-12-SP1-2016-643 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-643,SUSE-SLE-DESKTOP-12-SP1-2016-643,SUSE-SLE-SDK-12-2016-643,SUSE-SLE-SDK-12-SP1-2016-643,SUSE-SLE-SERVER-12-2016-643,SUSE-SLE-SERVER-12-SP1-2016-643 SKIP SUSE-RU-2016:1094-1 as SUSE-SLE-SERVER-12-SP1-2016-644 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-644,SUSE-SLE-SERVER-12-SP1-2016-644 SKIP SUSE-RU-2016:1096-1 as slessp4-bzip2-12515 is not security or has no CVEs. patches: sdksp4-bzip2-12515,slessp4-bzip2-12515 SKIP SUSE-RU-2016:1104-1 as SUSE-SLE-SERVER-12-SP1-2016-648 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-648 SKIP SUSE-RU-2016:1109-1 as SUSE-SLE-Manager-Tools-12-2016-652 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-652 SKIP SUSE-RU-2016:1110-1 as slesctsp4-client-tools-201604-12520 is not security or has no CVEs. patches: slesctsp3-client-tools-201604-12520,slesctsp4-client-tools-201604-12520 SKIP SUSE-RU-2016:1113-1 as SUSE-SLE-SERVER-12-2016-654 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-654,SUSE-SLE-SERVER-12-2016-654 SKIP SUSE-RU-2016:1114-1 as slertesp4-ocfs2-12521 is not security or has no CVEs. patches: slehasp4-ocfs2-12521,slertesp4-ocfs2-12521 SKIP SUSE-RU-2016:1119-1 as slessp4-aaa_base-12522 is not security or has no CVEs. patches: slessp4-aaa_base-12522 SKIP SUSE-RU-2016:1122-1 as slehasp4-libqb-12523 is not security or has no CVEs. patches: sdksp4-libqb-12523,slehasp4-libqb-12523 SKIP SUSE-RU-2016:1123-1 as slehasp4-pacemaker-mgmt-12524 is not security or has no CVEs. patches: slehasp4-pacemaker-mgmt-12524 SKIP SUSE-RU-2016:1124-1 as SUSE-SLE-SERVER-12-SP1-2016-659 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-659,SUSE-SLE-DESKTOP-12-SP1-2016-659,SUSE-SLE-SDK-12-2016-659,SUSE-SLE-SDK-12-SP1-2016-659,SUSE-SLE-SERVER-12-2016-659,SUSE-SLE-SERVER-12-SP1-2016-659 SKIP SUSE-RU-2016:1125-1 as SUSE-SLE-Module-Containers-12-2016-660 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-660,SUSE-SLE-Module-Containers-12-2016-660 SKIP SUSE-RU-2016:1127-1 as SUSE-SLE-SERVER-12-SP1-2016-661 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-661,SUSE-SLE-DESKTOP-12-SP1-2016-661,SUSE-SLE-SERVER-12-2016-661,SUSE-SLE-SERVER-12-SP1-2016-661 SKIP SUSE-RU-2016:1129-1 as SUSE-SLE-SERVER-12-SP1-2016-663 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-663,SUSE-SLE-DESKTOP-12-SP1-2016-663,SUSE-SLE-SERVER-12-2016-663,SUSE-SLE-SERVER-12-SP1-2016-663 SKIP SUSE-RU-2016:1130-1 as slessp4-timezone-12525 is not security or has no CVEs. patches: sdksp4-timezone-12525,sleclo50sp3-timezone-12525,sleman21-timezone-12525,slemap21-timezone-12525,slessp2-timezone-12525,slessp3-timezone-12525,slessp4-timezone-12525 SKIP SUSE-RU-2016:1131-1 as SUSE-SLE-SERVER-12-2016-664 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-664 SKIP SUSE-RU-2016:1147-1 as SUSE-SLE-Module-Containers-12-2016-673 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-673 SKIP SUSE-RU-2016:1148-1 as slessp4-postfix-12529 is not security or has no CVEs. patches: sdksp4-postfix-12529,secsp3-postfix-12529,slessp4-postfix-12529 SKIP SUSE-RU-2016:1150-1 as SUSE-SLE-SERVER-12-SP1-2016-675 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-675,SUSE-SLE-DESKTOP-12-SP1-2016-675,SUSE-SLE-SDK-12-2016-675,SUSE-SLE-SDK-12-SP1-2016-675,SUSE-SLE-SERVER-12-2016-675,SUSE-SLE-SERVER-12-SP1-2016-675 SKIP SUSE-RU-2016:1153-1 as SUSE-Storage-2-2016-677 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-677,SUSE-SLE12-CLOUD-5-2016-677,SUSE-Storage-1.0-2016-677,SUSE-Storage-2-2016-677 SKIP SUSE-RU-2016:1155-1 as SUSE-SLE-SERVER-12-2016-680 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-680,SUSE-SLE-SERVER-12-2016-680 SKIP SUSE-RU-2016:1156-1 as SUSE-SLE-Module-Public-Cloud-12-2016-679 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-679 SKIP SUSE-RU-2016:1158-1 as SUSE-SLE-HA-12-SP1-2016-681 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-681 SKIP SUSE-RU-2016:1160-1 as SUSE-SLE-SERVER-12-SP1-2016-683 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-683,SUSE-SLE-SERVER-12-SP1-2016-683 SKIP SUSE-RU-2016:1161-1 as SUSE-SLE-SERVER-12-SP1-2016-684 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-684,SUSE-SLE-DESKTOP-12-SP1-2016-684,SUSE-SLE-SERVER-12-2016-684,SUSE-SLE-SERVER-12-SP1-2016-684 SKIP SUSE-RU-2016:1164-1 as SUSE-SLE-Module-Public-Cloud-12-2016-687 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-687 SKIP SUSE-RU-2016:1165-1 as SUSE-SLE-SERVER-12-SP1-2016-686 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-686,SUSE-SLE-DESKTOP-12-SP1-2016-686,SUSE-SLE-SDK-12-2016-686,SUSE-SLE-SDK-12-SP1-2016-686,SUSE-SLE-SERVER-12-2016-686,SUSE-SLE-SERVER-12-SP1-2016-686 SKIP SUSE-RU-2016:1168-1 as SUSE-SLE-SERVER-12-SP1-2016-689 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-689,SUSE-SLE-DESKTOP-12-SP1-2016-689,SUSE-SLE-SDK-12-2016-689,SUSE-SLE-SDK-12-SP1-2016-689,SUSE-SLE-SERVER-12-2016-689,SUSE-SLE-SERVER-12-SP1-2016-689 SKIP SUSE-RU-2016:1169-1 as SUSE-SLE-SERVER-12-SP1-2016-691 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-691,SUSE-SLE-SERVER-12-SP1-2016-691 SKIP SUSE-RU-2016:1170-1 as SUSE-SLE-SERVER-12-2016-690 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-690,SUSE-SLE-SERVER-12-2016-690 SKIP SUSE-RU-2016:1171-1 as slessp4-supportutils-12532 is not security or has no CVEs. patches: slessp4-supportutils-12532 SKIP SUSE-RU-2016:1172-1 as SUSE-SLE-SERVER-12-SP1-2016-693 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-693 SKIP SUSE-RU-2016:1174-1 as SUSE-SLE-SERVER-12-SP1-2016-697 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-697,SUSE-SLE-DESKTOP-12-SP1-2016-697,SUSE-SLE-SDK-12-2016-697,SUSE-SLE-SDK-12-SP1-2016-697,SUSE-SLE-SERVER-12-2016-697,SUSE-SLE-SERVER-12-SP1-2016-697 SKIP SUSE-RU-2016:1176-1 as slessp4-libssh2_org-12535 is not security or has no CVEs. patches: sdksp4-libssh2_org-12535,sleclo50sp3-libssh2_org-12535,sleman21-libssh2_org-12535,slemap21-libssh2_org-12535,slessp3-libssh2_org-12535,slessp4-libssh2_org-12535 SKIP SUSE-RU-2016:1178-1 as SUSE-SLE-SERVER-12-SP1-2016-699 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-699,SUSE-SLE-SDK-12-SP1-2016-699,SUSE-SLE-SERVER-12-SP1-2016-699 SKIP SUSE-RU-2016:1179-1 as slessp4-hwinfo-12536 is not security or has no CVEs. patches: sdksp4-hwinfo-12536,slessp4-hwinfo-12536 SKIP SUSE-RU-2016:1192-1 as SUSE-SLE-SERVER-12-SP1-2016-701 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-701 SKIP SUSE-RU-2016:1210-1 as SUSE-SLE-WE-12-SP1-2016-713 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-713,SUSE-SLE-DESKTOP-12-SP1-2016-713,SUSE-SLE-SDK-12-2016-713,SUSE-SLE-SDK-12-SP1-2016-713,SUSE-SLE-SERVER-12-2016-713,SUSE-SLE-SERVER-12-SP1-2016-713,SUSE-SLE-WE-12-2016-713,SUSE-SLE-WE-12-SP1-2016-713 SKIP SUSE-RU-2016:1234-1 as SUSE-SLE-HA-12-SP1-2016-719 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-719 SKIP SUSE-RU-2016:1236-1 as SUSE-SLE-SERVER-12-2016-720 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-720,SUSE-SLE-SERVER-12-2016-720 SKIP SUSE-RU-2016:1244-1 as SUSE-SLE-SERVER-12-2016-723 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-723,SUSE-SLE-SERVER-12-2016-723 SKIP SUSE-RU-2016:1245-1 as SUSE-SLE-Module-Toolchain-12-2016-721 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2016-721 SKIP SUSE-RU-2016:1246-1 as SUSE-SLE-SERVER-12-SP1-2016-722 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-722,SUSE-SLE-SERVER-12-SP1-2016-722 SKIP SUSE-RU-2016:1253-1 as SUSE-SLE-SERVER-12-SP1-2016-731 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-731 SKIP SUSE-RU-2016:1254-1 as SUSE-SLE-SERVER-12-SP1-2016-728 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-728,SUSE-SLE-DESKTOP-12-SP1-2016-728,SUSE-SLE-SERVER-12-2016-728,SUSE-SLE-SERVER-12-SP1-2016-728 SKIP SUSE-RU-2016:1255-1 as SUSE-SLE-SERVER-12-SP1-2016-729 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-729,SUSE-SLE-DESKTOP-12-SP1-2016-729,SUSE-SLE-SERVER-12-2016-729,SUSE-SLE-SERVER-12-SP1-2016-729 SKIP SUSE-RU-2016:1257-1 as SUSE-SLE-SERVER-12-2016-730 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-730 SKIP SUSE-RU-2016:1268-1 as slehasp4-pacemaker-12543 is not security or has no CVEs. patches: slehasp4-pacemaker-12543 SKIP SUSE-RU-2016:1269-1 as slessp4-apache2-mod_nss-12544 is not security or has no CVEs. patches: slessp4-apache2-mod_nss-12544 SKIP SUSE-RU-2016:1270-1 as SUSE-SLE-SERVER-12-2016-737 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-737,SUSE-SLE-SERVER-12-2016-737 SKIP SUSE-RU-2016:1271-1 as SUSE-SLE-SERVER-12-SP1-2016-743 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-743,SUSE-SLE-SDK-12-SP1-2016-743,SUSE-SLE-SERVER-12-SP1-2016-743 SKIP SUSE-RU-2016:1272-1 as slehasp4-crmsh-12547 is not security or has no CVEs. patches: slehasp4-crmsh-12547 SKIP SUSE-RU-2016:1280-1 as slessp4-avahi-12552 is not security or has no CVEs. patches: sdksp4-avahi-12552,slessp4-avahi-12552 SKIP SUSE-RU-2016:1281-1 as slessp3-perl-Bootloader-12556 is not security or has no CVEs. patches: slessp3-perl-Bootloader-12556 SKIP SUSE-RU-2016:1283-1 as SUSE-SLE-SERVER-12-SP1-2016-756 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-756,SUSE-SLE-DESKTOP-12-SP1-2016-756,SUSE-SLE-SDK-12-2016-756,SUSE-SLE-SDK-12-SP1-2016-756,SUSE-SLE-SERVER-12-2016-756,SUSE-SLE-SERVER-12-SP1-2016-756 SKIP SUSE-RU-2016:1284-1 as SUSE-SLE-SERVER-12-SP1-2016-757 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-757,SUSE-SLE-DESKTOP-12-SP1-2016-757,SUSE-SLE-SERVER-12-2016-757,SUSE-SLE-SERVER-12-SP1-2016-757 SKIP SUSE-RU-2016:1285-1 as SUSE-SLE-HA-12-2016-759 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-759 SKIP SUSE-RU-2016:1286-1 as SUSE-SLE-HA-12-SP1-2016-758 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-758 SKIP SUSE-RU-2016:1287-1 as SUSE-SLE-SERVER-12-SP1-2016-761 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-761,SUSE-SLE-HA-12-SP1-2016-761,SUSE-SLE-SDK-12-SP1-2016-761,SUSE-SLE-SERVER-12-SP1-2016-761 SKIP SUSE-RU-2016:1288-1 as SUSE-SLE-SERVER-12-2016-760 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-760,SUSE-SLE-SDK-12-2016-760,SUSE-SLE-SERVER-12-2016-760 SKIP SUSE-RU-2016:1289-1 as SUSE-SLE-SERVER-12-SP1-2016-762 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-762,SUSE-SLE-SERVER-12-SP1-2016-762 SKIP SUSE-RU-2016:1293-1 as SUSE-SLE-SERVER-12-2016-765 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-765 SKIP SUSE-RU-2016:1315-1 as slessp3-yast2-ntp-client-12562 is not security or has no CVEs. patches: sleclo50sp3-yast2-ntp-client-12562,sleman21-yast2-ntp-client-12562,slemap21-yast2-ntp-client-12562,slessp3-yast2-ntp-client-12562 SKIP SUSE-RU-2016:1317-1 as SUSE-SLE-Module-Containers-12-2016-778 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-778 SKIP SUSE-RU-2016:1337-1 as SUSE-Storage-2.1-2016-780 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-780 SKIP SUSE-RU-2016:1341-1 as SUSE-SLE-HA-12-2016-785 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-785 ERROR: notice SUSE-RU-2016:1347-1 has no valid patches out of: SUSE-Storage-2.1-2016-792 SKIP SUSE-RU-2016:1348-1 as SUSE-Storage-2.1-2016-794 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-794 ERROR: notice SUSE-RU-2016:1349-1 has no valid patches out of: SUSE-Storage-2-2016-793 SKIP SUSE-RU-2016:1350-1 as SUSE-Storage-2-2016-795 is not security or has no CVEs. patches: SUSE-Storage-2-2016-795 SKIP SUSE-RU-2016:1358-1 as SUSE-SLE-Module-Public-Cloud-12-2016-797 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-797,SUSE-SLE-Module-Public-Cloud-12-2016-797 SKIP SUSE-RU-2016:1359-1 as SUSE-SLE-HA-12-SP1-2016-799 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-799 SKIP SUSE-RU-2016:1361-1 as slessp4-vm-install-12566 is not security or has no CVEs. patches: slessp4-vm-install-12566 SKIP SUSE-RU-2016:1362-1 as slesctsp4-client-tools-201605-12567 is not security or has no CVEs. patches: slesctsp3-client-tools-201605-12567,slesctsp4-client-tools-201605-12567 SKIP SUSE-RU-2016:1363-1 as SUSE-SLE-SERVER-12-SP1-2016-803 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-803,SUSE-SLE-SERVER-12-SP1-2016-803 SKIP SUSE-RU-2016:1364-1 as SUSE-SLE-SERVER-12-SP1-2016-801 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-801,SUSE-SLE-DESKTOP-12-SP1-2016-801,SUSE-SLE-SDK-12-2016-801,SUSE-SLE-SDK-12-SP1-2016-801,SUSE-SLE-SERVER-12-2016-801,SUSE-SLE-SERVER-12-SP1-2016-801 SKIP SUSE-RU-2016:1365-1 as slessp4-nfs-utils-12568 is not security or has no CVEs. patches: slessp4-nfs-utils-12568 SKIP SUSE-RU-2016:1368-1 as SUSE-SLE-SERVER-12-2016-802 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-802,SUSE-SLE-SERVER-12-2016-802 SKIP SUSE-RU-2016:1369-1 as slemap21-suse-manager-proxy-21-201605-12567 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201605-12567 SKIP SUSE-RU-2016:1375-1 as pubclsp3-cloud-regionsrv-client-12570 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-12570 SKIP SUSE-RU-2016:1377-1 as SUSE-SLE-Module-Public-Cloud-12-2016-806 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-806 SKIP SUSE-RU-2016:1380-1 as SUSE-Storage-2.1-2016-810 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-810,SUSE-Storage-2.1-2016-810 SKIP SUSE-RU-2016:1384-1 as SUSE-SLE-SERVER-12-SP1-2016-812 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-812,SUSE-SLE-DESKTOP-12-SP1-2016-812,SUSE-SLE-SERVER-12-2016-812,SUSE-SLE-SERVER-12-SP1-2016-812 SKIP SUSE-RU-2016:1385-1 as sleclo50sp3-rubygem-chef-12574 is not security or has no CVEs. patches: sleclo50sp3-rubygem-chef-12574 SKIP SUSE-RU-2016:1389-1 as SUSE-SUSE-Manager-Server-3.0-2016-822 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-822,SUSE-SUSE-Manager-Server-3.0-2016-822 SKIP SUSE-RU-2016:1390-1 as SUSE-OpenStack-Cloud-6-2016-830 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-830 SKIP SUSE-RU-2016:1391-1 as SUSE-SLE12-CLOUD-5-2016-829 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-829,SUSE-SLE12-CLOUD-5-2016-829 SKIP SUSE-RU-2016:1392-1 as SUSE-SLE-SERVER-12-SP1-2016-831 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-831,SUSE-SLE-SAP-12-SP1-2016-831,SUSE-SLE-SERVER-12-SP1-2016-831 SKIP SUSE-RU-2016:1402-1 as slessp4-gdb-12577 is not security or has no CVEs. patches: sdksp4-gdb-12577,slessp4-gdb-12577 SKIP SUSE-RU-2016:1403-1 as SUSE-SLE-SERVER-12-SP1-2016-834 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-834,SUSE-SLE-DESKTOP-12-SP1-2016-834,SUSE-SLE-SDK-12-2016-834,SUSE-SLE-SDK-12-SP1-2016-834,SUSE-SLE-SERVER-12-2016-834,SUSE-SLE-SERVER-12-SP1-2016-834 SKIP SUSE-RU-2016:1404-1 as SUSE-SLE-SERVER-12-SP1-2016-835 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-835,SUSE-SLE-DESKTOP-12-SP1-2016-835,SUSE-SLE-SDK-12-2016-835,SUSE-SLE-SDK-12-SP1-2016-835,SUSE-SLE-SERVER-12-2016-835,SUSE-SLE-SERVER-12-SP1-2016-835 SKIP SUSE-RU-2016:1405-1 as SUSE-SLE-WE-12-SP1-2016-836 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-836,SUSE-SLE-DESKTOP-12-SP1-2016-836,SUSE-SLE-WE-12-2016-836,SUSE-SLE-WE-12-SP1-2016-836 SKIP SUSE-RU-2016:1406-1 as SUSE-SLE-Module-Public-Cloud-12-2016-839 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-839 SKIP SUSE-RU-2016:1408-1 as SUSE-SLE-SERVER-12-2016-844 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-844,SUSE-SLE-SERVER-12-2016-844 SKIP SUSE-RU-2016:1413-1 as SUSE-SLE-SERVER-12-SP1-2016-845 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-845,SUSE-SLE-SERVER-12-SP1-2016-845 SKIP SUSE-RU-2016:1416-1 as SUSE-SLE-SERVER-12-SP1-2016-843 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-843,SUSE-SLE-SERVER-12-SP1-2016-843 SKIP SUSE-RU-2016:1419-1 as SUSE-SLE-WE-12-SP1-2016-841 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-841,SUSE-SLE-DESKTOP-12-SP1-2016-841,SUSE-SLE-SDK-12-2016-841,SUSE-SLE-SDK-12-SP1-2016-841,SUSE-SLE-SERVER-12-2016-841,SUSE-SLE-SERVER-12-SP1-2016-841,SUSE-SLE-WE-12-2016-841,SUSE-SLE-WE-12-SP1-2016-841 SKIP SUSE-RU-2016:1420-1 as slessp4-glib2-12581 is not security or has no CVEs. patches: sdksp4-glib2-12581,slessp4-glib2-12581 SKIP SUSE-RU-2016:1422-1 as slessp4-clamav-12580 is not security or has no CVEs. patches: slessp4-clamav-12580 SKIP SUSE-RU-2016:1424-1 as SUSE-SLE-Module-Public-Cloud-12-2016-848 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-848 SKIP SUSE-RU-2016:1425-1 as SUSE-OpenStack-Cloud-6-2016-847 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-847 SKIP SUSE-RU-2016:1426-1 as slehasp4-resource-agents-12582 is not security or has no CVEs. patches: slehasp4-resource-agents-12582 SKIP SUSE-RU-2016:1427-1 as SUSE-SLE-HA-12-2016-849 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-849 SKIP SUSE-RU-2016:1428-1 as slessp4-curl-12584 is not security or has no CVEs. patches: sdksp4-curl-12584,secsp3-curl-12584,sleclo50sp3-curl-12584,sleman21-curl-12584,slemap21-curl-12584,slessp3-curl-12584,slessp4-curl-12584 SKIP SUSE-RU-2016:1429-1 as slessp4-wget-12583 is not security or has no CVEs. patches: secsp3-wget-12583,sleclo50sp3-wget-12583,sleman21-wget-12583,slemap21-wget-12583,slessp3-wget-12583,slessp4-wget-12583 SKIP SUSE-RU-2016:1438-1 as SUSE-SLE-Module-Containers-12-2016-853 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-853 SKIP SUSE-RU-2016:1449-1 as SUSE-SLE-WE-12-2016-858 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-858,SUSE-SLE-SDK-12-2016-858,SUSE-SLE-SERVER-12-2016-858,SUSE-SLE-WE-12-2016-858 SKIP SUSE-RU-2016:1450-1 as SUSE-SLE-Module-Public-Cloud-12-2016-860 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-860 SKIP SUSE-RU-2016:1454-1 as SUSE-SLE-HA-12-SP1-2016-861 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-861 SKIP SUSE-RU-2016:1456-1 as SUSE-SLE-SERVER-12-SP1-2016-863 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-863,SUSE-SLE-DESKTOP-12-SP1-2016-863,SUSE-SLE-SERVER-12-2016-863,SUSE-SLE-SERVER-12-SP1-2016-863 SKIP SUSE-RU-2016:1468-1 as SUSE-SLE-SERVER-12-2016-870 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-870,SUSE-SLE-SDK-12-2016-870,SUSE-SLE-SERVER-12-2016-870 SKIP SUSE-RU-2016:1469-1 as slestso13-susestudio-12591 is not security or has no CVEs. patches: slestso13-susestudio-12591 SKIP SUSE-RU-2016:1470-1 as SUSE-SLE-SERVER-12-SP1-2016-869 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-869,SUSE-SLE-SDK-12-SP1-2016-869,SUSE-SLE-SERVER-12-SP1-2016-869 SKIP SUSE-RU-2016:1472-1 as slessp4-multipath-tools-12593 is not security or has no CVEs. patches: slessp4-multipath-tools-12593 SKIP SUSE-RU-2016:1473-1 as slessp3-java-1_6_0-ibm-12594 is not security or has no CVEs. patches: sleclo50sp3-java-1_6_0-ibm-12594,sleman21-java-1_6_0-ibm-12594,slemap21-java-1_6_0-ibm-12594,slessp2-java-1_6_0-ibm-12594,slessp3-java-1_6_0-ibm-12594 SKIP SUSE-RU-2016:1474-1 as SUSE-Storage-2-2016-875 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2016-875,SUSE-Storage-1.0-2016-875,SUSE-Storage-2-2016-875 SKIP SUSE-RU-2016:1477-1 as SUSE-SLE-SERVER-12-SP1-2016-877 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-877,SUSE-SLE-DESKTOP-12-SP1-2016-877,SUSE-SLE-SERVER-12-2016-877,SUSE-SLE-SERVER-12-SP1-2016-877 SKIP SUSE-RU-2016:1480-1 as SUSE-SLE-SERVER-12-SP1-2016-880 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-880,SUSE-SLE-DESKTOP-12-SP1-2016-880,SUSE-SLE-SERVER-12-2016-880,SUSE-SLE-SERVER-12-SP1-2016-880 SKIP SUSE-RU-2016:1484-1 as SUSE-SLE-SERVER-12-2016-884 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-884,SUSE-SLE-SERVER-12-2016-884 SKIP SUSE-RU-2016:1485-1 as SUSE-SLE-SERVER-12-SP1-2016-885 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-885,SUSE-SLE-SERVER-12-SP1-2016-885 SKIP SUSE-RU-2016:1486-1 as SUSE-SLE-HA-12-2016-886 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-886 SKIP SUSE-RU-2016:1487-1 as SUSE-SLE-Module-Containers-12-2016-888 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-888 SKIP SUSE-RU-2016:1488-1 as SUSE-SLE-HA-12-SP1-2016-887 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-887 SKIP SUSE-RU-2016:1498-1 as sleclo50sp3-crowbar-barclamp-provisioner-12597 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-provisioner-12597 SKIP SUSE-RU-2016:1501-1 as SUSE-SLE-SERVER-12-SP1-2016-890 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-890,SUSE-SLE-DESKTOP-12-SP1-2016-890,SUSE-SLE-SERVER-12-2016-890,SUSE-SLE-SERVER-12-SP1-2016-890 SKIP SUSE-RU-2016:1502-1 as SUSE-SLE-SERVER-12-SP1-2016-892 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-892,SUSE-SLE-SERVER-12-SP1-2016-892 SKIP SUSE-RU-2016:1505-1 as SUSE-SLE-SERVER-12-SP1-2016-896 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-896 SKIP SUSE-RU-2016:1513-1 as slessp4-vsftpd-12601 is not security or has no CVEs. patches: slessp4-vsftpd-12601 SKIP SUSE-RU-2016:1529-1 as slessp4-glib2-pango-12605 is not security or has no CVEs. patches: sdksp4-glib2-pango-12605,slessp4-glib2-pango-12605 SKIP SUSE-RU-2016:1530-1 as SUSE-SLE-WE-12-SP1-2016-907 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-907,SUSE-SLE-DESKTOP-12-SP1-2016-907,SUSE-SLE-SDK-12-2016-907,SUSE-SLE-SDK-12-SP1-2016-907,SUSE-SLE-SERVER-12-2016-907,SUSE-SLE-SERVER-12-SP1-2016-907,SUSE-SLE-WE-12-2016-907,SUSE-SLE-WE-12-SP1-2016-907 SKIP SUSE-RU-2016:1531-1 as slessp4-irqbalance-12604 is not security or has no CVEs. patches: slessp4-irqbalance-12604 SKIP SUSE-RU-2016:1532-1 as SUSE-SLE-SERVER-12-SP1-2016-909 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-909,SUSE-SLE-DESKTOP-12-SP1-2016-909,SUSE-SLE-SERVER-12-2016-909,SUSE-SLE-SERVER-12-SP1-2016-909 SKIP SUSE-RU-2016:1533-1 as SUSE-SLE-SERVER-12-SP1-2016-911 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-911,SUSE-SLE-DESKTOP-12-SP1-2016-911,SUSE-SLE-SERVER-12-2016-911,SUSE-SLE-SERVER-12-SP1-2016-911 SKIP SUSE-RU-2016:1535-1 as SUSE-SLE-SERVER-12-SP1-2016-912 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-912,SUSE-SLE-SERVER-12-SP1-2016-912 SKIP SUSE-RU-2016:1536-1 as slessp4-xorg-x11-driver-input-12606 is not security or has no CVEs. patches: sleposp3-xorg-x11-driver-input-12606,slessp4-xorg-x11-driver-input-12606 SKIP SUSE-RU-2016:1537-1 as SUSE-SLE-SERVER-12-SP1-2016-914 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-914,SUSE-SLE-DESKTOP-12-SP1-2016-914,SUSE-SLE-SERVER-12-2016-914,SUSE-SLE-SERVER-12-SP1-2016-914 SKIP SUSE-RU-2016:1539-1 as SUSE-SLE-WE-12-SP1-2016-916 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-916,SUSE-SLE-SDK-12-SP1-2016-916,SUSE-SLE-SERVER-12-SP1-2016-916,SUSE-SLE-WE-12-SP1-2016-916 SKIP SUSE-RU-2016:1540-1 as sleposp3-release-notes-slepos-12607 is not security or has no CVEs. patches: sleposp3-release-notes-slepos-12607 SKIP SUSE-RU-2016:1542-1 as SUSE-SLE-SERVER-12-SP1-2016-920 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-920,SUSE-SLE-DESKTOP-12-SP1-2016-920,SUSE-SLE-SERVER-12-2016-920,SUSE-SLE-SERVER-12-SP1-2016-920 SKIP SUSE-RU-2016:1562-1 as SUSE-SLE-SERVER-12-SP1-2016-929 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-929,SUSE-SLE-DESKTOP-12-SP1-2016-929,SUSE-SLE-SERVER-12-2016-929,SUSE-SLE-SERVER-12-SP1-2016-929 SKIP SUSE-RU-2016:1564-1 as SUSE-SLE-SDK-12-SP1-2016-931 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-2016-931,SUSE-SLE-SDK-12-SP1-2016-931 SKIP SUSE-RU-2016:1565-1 as SUSE-SLE-WE-12-SP1-2016-932 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-932,SUSE-SLE-DESKTOP-12-SP1-2016-932,SUSE-SLE-SDK-12-2016-932,SUSE-SLE-SDK-12-SP1-2016-932,SUSE-SLE-SERVER-12-2016-932,SUSE-SLE-SERVER-12-SP1-2016-932,SUSE-SLE-WE-12-2016-932,SUSE-SLE-WE-12-SP1-2016-932 SKIP SUSE-RU-2016:1577-1 as SUSE-SLE-SERVER-12-SP1-2016-937 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-937,SUSE-SLE-SERVER-12-SP1-2016-937 SKIP SUSE-RU-2016:1591-1 as SUSE-SLE-SERVER-12-SP1-2016-942 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-942,SUSE-SLE-DESKTOP-12-SP1-2016-942,SUSE-SLE-SERVER-12-2016-942,SUSE-SLE-SERVER-12-SP1-2016-942 SKIP SUSE-RU-2016:1592-1 as SUSE-SLE-WE-12-SP1-2016-941 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-941,SUSE-SLE-DESKTOP-12-SP1-2016-941,SUSE-SLE-SDK-12-2016-941,SUSE-SLE-SDK-12-SP1-2016-941,SUSE-SLE-SERVER-12-2016-941,SUSE-SLE-SERVER-12-SP1-2016-941,SUSE-SLE-WE-12-2016-941,SUSE-SLE-WE-12-SP1-2016-941 SKIP SUSE-RU-2016:1597-1 as SUSE-SLE-SERVER-12-SP1-2016-946 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-946,SUSE-SLE-SERVER-12-SP1-2016-946 SKIP SUSE-RU-2016:1598-1 as SUSE-SLE-SERVER-12-SP1-2016-945 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-945,SUSE-SLE-DESKTOP-12-SP1-2016-945,SUSE-SLE-SERVER-12-2016-945,SUSE-SLE-SERVER-12-SP1-2016-945 SKIP SUSE-RU-2016:1599-1 as slemap21-release-notes-susemanager-12613 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-12613,slemap21-release-notes-susemanager-12613 SKIP SUSE-RU-2016:1603-1 as SUSE-SLE-Module-Containers-12-2016-951 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-951,SUSE-SLE-Module-Containers-12-2016-951 SKIP SUSE-RU-2016:1606-1 as SUSE-SLE-SERVER-12-SP1-2016-956 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-956,SUSE-SLE-SERVER-12-SP1-2016-956 SKIP SUSE-RU-2016:1607-1 as SUSE-Storage-2.1-2016-954 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-954,SUSE-SLE-DESKTOP-12-2016-954,SUSE-SLE-DESKTOP-12-SP1-2016-954,SUSE-SLE-HA-12-2016-954,SUSE-SLE-HA-12-SP1-2016-954,SUSE-SLE-Module-Public-Cloud-12-2016-954,SUSE-SLE-SERVER-12-2016-954,SUSE-SLE-SERVER-12-SP1-2016-954,SUSE-SLE12-CLOUD-5-2016-954,SUSE-Storage-1.0-2016-954,SUSE-Storage-2-2016-954,SUSE-Storage-2.1-2016-954 SKIP SUSE-RU-2016:1608-1 as slessp4-powerpc-utils-12617 is not security or has no CVEs. patches: slessp4-powerpc-utils-12617 SKIP SUSE-RU-2016:1609-1 as SUSE-SLE-SERVER-12-SP1-2016-953 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-953,SUSE-SLE-SERVER-12-SP1-2016-953 SKIP SUSE-RU-2016:1615-1 as SUSE-SLE-WE-12-SP1-2016-958 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-958,SUSE-SLE-WE-12-SP1-2016-958 SKIP SUSE-RU-2016:1616-1 as SUSE-SLE-SERVER-12-SP1-2016-962 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-962,SUSE-SLE-DESKTOP-12-SP1-2016-962,SUSE-SLE-SERVER-12-2016-962,SUSE-SLE-SERVER-12-SP1-2016-962 SKIP SUSE-RU-2016:1617-1 as SUSE-SLE-SERVER-12-SP1-2016-961 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-961,SUSE-SLE-SAP-12-SP1-2016-961,SUSE-SLE-SERVER-12-SP1-2016-961 SKIP SUSE-RU-2016:1622-1 as SUSE-SLE-WE-12-SP1-2016-966 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-966,SUSE-SLE-DESKTOP-12-SP1-2016-966,SUSE-SLE-SDK-12-2016-966,SUSE-SLE-SDK-12-SP1-2016-966,SUSE-SLE-WE-12-2016-966,SUSE-SLE-WE-12-SP1-2016-966 SKIP SUSE-RU-2016:1632-1 as SUSE-SLE-SERVER-12-SP1-2016-967 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-967,SUSE-SLE-DESKTOP-12-SP1-2016-967,SUSE-SLE-SERVER-12-2016-967,SUSE-SLE-SERVER-12-SP1-2016-967 SKIP SUSE-RU-2016:1634-1 as SUSE-SLE-SERVER-12-SP1-2016-969 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-969 SKIP SUSE-RU-2016:1642-1 as sleclo50sp3-crowbar-barclamp-ceilometer-12623 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-ceilometer-12623 SKIP SUSE-RU-2016:1643-1 as SUSE-OpenStack-Cloud-6-2016-975 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-975 SKIP SUSE-RU-2016:1644-1 as SUSE-SLE-Module-Containers-12-2016-977 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-977 SKIP SUSE-RU-2016:1646-1 as SUSE-SLE-SERVER-12-SP1-2016-979 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-979,SUSE-SLE-SERVER-12-SP1-2016-979 SKIP SUSE-RU-2016:1647-1 as slessp4-postgresql-init-12625 is not security or has no CVEs. patches: slessp4-postgresql-init-12625 SKIP SUSE-RU-2016:1648-1 as SUSE-SLE-SERVER-12-SP1-2016-982 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-982,SUSE-SLE-SERVER-12-SP1-2016-982 SKIP SUSE-RU-2016:1649-1 as SUSE-SLE-SERVER-12-2016-981 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-981,SUSE-SLE-SERVER-12-2016-981 SKIP SUSE-RU-2016:1650-1 as SUSE-OpenStack-Cloud-6-2016-983 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-983 SKIP SUSE-RU-2016:1654-1 as SUSE-SUSE-Manager-Server-3.0-2016-986 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-986 SKIP SUSE-RU-2016:1656-1 as SUSE-SUSE-Manager-Server-3.0-2016-984 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-984,SUSE-SUSE-Manager-Proxy-3.0-2016-984,SUSE-SUSE-Manager-Server-3.0-2016-984 SKIP SUSE-RU-2016:1657-1 as SUSE-SUSE-Manager-Proxy-3.0-2016-986 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-986 SKIP SUSE-RU-2016:1658-1 as slesctsp4-client-tools-201605-12626 is not security or has no CVEs. patches: slesctsp3-client-tools-201605-12626,slesctsp4-client-tools-201605-12626 SKIP SUSE-RU-2016:1661-1 as SUSE-SLE-SERVER-12-SP1-2016-987 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-987,SUSE-SLE-DESKTOP-12-SP1-2016-987,SUSE-SLE-SDK-12-2016-987,SUSE-SLE-SDK-12-SP1-2016-987,SUSE-SLE-SERVER-12-2016-987,SUSE-SLE-SERVER-12-SP1-2016-987 SKIP SUSE-RU-2016:1665-1 as sleman21-susemanager-sync-data-12630 is not security or has no CVEs. patches: sleman21-susemanager-sync-data-12630 SKIP SUSE-RU-2016:1667-1 as SUSE-SLE-SERVER-12-SP1-2016-992 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-992 SKIP SUSE-RU-2016:1668-1 as SUSE-OpenStack-Cloud-6-2016-993 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-993 SKIP SUSE-RU-2016:1680-1 as SUSE-SLE-SERVER-12-SP1-2016-996 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-996,SUSE-SLE-SDK-12-SP1-2016-996,SUSE-SLE-SERVER-12-SP1-2016-996 SKIP SUSE-RU-2016:1681-1 as SUSE-SLE-SERVER-12-2016-997 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-997,SUSE-SLE-SDK-12-2016-997,SUSE-SLE-SERVER-12-2016-997 SKIP SUSE-RU-2016:1682-1 as slessp4-xfsprogs-12632 is not security or has no CVEs. patches: sdksp4-xfsprogs-12632,slessp4-xfsprogs-12632 SKIP SUSE-RU-2016:1697-1 as SUSE-SLE-SERVER-12-2016-1005 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-1005 SKIP SUSE-RU-2016:1706-1 as slessp4-cyrus-imapd-12635 is not security or has no CVEs. patches: sdksp4-cyrus-imapd-12635,slessp4-cyrus-imapd-12635 SKIP SUSE-RU-2016:1708-1 as SUSE-SLE-SDK-12-SP1-2016-1010 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-1010,SUSE-SLE-HA-12-SP1-2016-1010,SUSE-SLE-SDK-12-2016-1010,SUSE-SLE-SDK-12-SP1-2016-1010 SKIP SUSE-RU-2016:1720-1 as SUSE-SLE-SERVER-12-SP1-2016-1014 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1014,SUSE-SLE-SDK-12-SP1-2016-1014,SUSE-SLE-SERVER-12-SP1-2016-1014 SKIP SUSE-RU-2016:1729-1 as SUSE-SLE-SERVER-12-SP1-2016-1017 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-1017,SUSE-SLE-DESKTOP-12-SP1-2016-1017,SUSE-SLE-Module-Legacy-12-2016-1017,SUSE-SLE-SAP-12-2016-1017,SUSE-SLE-SAP-12-SP1-2016-1017,SUSE-SLE-SDK-12-2016-1017,SUSE-SLE-SDK-12-SP1-2016-1017,SUSE-SLE-SERVER-12-2016-1017,SUSE-SLE-SERVER-12-SP1-2016-1017 SKIP SUSE-RU-2016:1732-1 as SUSE-SLE-SERVER-12-SP1-2016-1018 is not security or has no CVEs. patches: SUSE-SLE-RT-12-SP1-2016-1018,SUSE-SLE-SDK-12-2016-1018,SUSE-SLE-SDK-12-SP1-2016-1018,SUSE-SLE-SERVER-12-2016-1018,SUSE-SLE-SERVER-12-SP1-2016-1018 SKIP SUSE-RU-2016:1734-1 as SUSE-SLE-SERVER-12-SP1-2016-1022 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-1022,SUSE-SLE-DESKTOP-12-SP1-2016-1022,SUSE-SLE-SDK-12-2016-1022,SUSE-SLE-SDK-12-SP1-2016-1022,SUSE-SLE-SERVER-12-2016-1022,SUSE-SLE-SERVER-12-SP1-2016-1022 SKIP SUSE-RU-2016:1753-1 as SUSE-SLE-SERVER-12-SP1-2016-1030 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-1030,SUSE-SLE-DESKTOP-12-SP1-2016-1030,SUSE-SLE-SERVER-12-2016-1030,SUSE-SLE-SERVER-12-SP1-2016-1030 SKIP SUSE-RU-2016:1754-1 as SUSE-SLE-SERVER-12-SP1-2016-1032 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1032,SUSE-SLE-SERVER-12-SP1-2016-1032 SKIP SUSE-RU-2016:1755-1 as SUSE-SLE-SERVER-12-SP1-2016-1031 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1031,SUSE-SLE-SERVER-12-SP1-2016-1031 SKIP SUSE-RU-2016:1756-1 as SUSE-SLE-SERVER-12-SP1-2016-1028 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1028,SUSE-SLE-SERVER-12-SP1-2016-1028 SKIP SUSE-RU-2016:1757-1 as SUSE-SLE-SERVER-12-SP1-2016-1029 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1029,SUSE-SLE-SERVER-12-SP1-2016-1029 ERROR: notice SUSE-RU-2016:1759-1 has no valid patches out of: sleman21-jabberd-12641,slemap21-jabberd-12641 SKIP SUSE-RU-2016:1760-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1033 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1033 SKIP SUSE-RU-2016:1763-1 as SUSE-SLE-SERVER-12-SP1-2016-1036 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-1036,SUSE-SLE-DESKTOP-12-SP1-2016-1036,SUSE-SLE-SERVER-12-2016-1036,SUSE-SLE-SERVER-12-SP1-2016-1036 SKIP SUSE-RU-2016:1788-1 as SUSE-SLE-SERVER-12-SP1-2016-1045 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1045,SUSE-SLE-SERVER-12-SP1-2016-1045 SKIP SUSE-RU-2016:1789-1 as slessp4-libcpuset-12646 is not security or has no CVEs. patches: sdksp4-libcpuset-12646,slessp4-libcpuset-12646 SKIP SUSE-RU-2016:1790-1 as SUSE-SLE-HA-12-SP1-2016-1049 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1049 SKIP SUSE-RU-2016:1792-1 as slessp4-timezone-12647 is not security or has no CVEs. patches: sdksp4-timezone-12647,sleclo50sp3-timezone-12647,sleman21-timezone-12647,slemap21-timezone-12647,slessp2-timezone-12647,slessp3-timezone-12647,slessp4-timezone-12647 SKIP SUSE-RU-2016:1793-1 as SUSE-SLE-SERVER-12-SP1-2016-1051 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1051,SUSE-SLE-SDK-12-SP1-2016-1051,SUSE-SLE-SERVER-12-SP1-2016-1051 SKIP SUSE-RU-2016:1800-1 as slessp4-pango-12648 is not security or has no CVEs. patches: sdksp4-pango-12648,sledsp4-pango-12648,slessp4-pango-12648 SKIP SUSE-RU-2016:1801-1 as SUSE-SLE-SDK-12-SP1-2016-1052 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-1052,SUSE-SLE-HA-12-SP1-2016-1052,SUSE-SLE-SDK-12-2016-1052,SUSE-SLE-SDK-12-SP1-2016-1052 SKIP SUSE-RU-2016:1803-1 as SUSE-SLE-SERVER-12-SP1-2016-1055 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1055,SUSE-SLE-SDK-12-SP1-2016-1055,SUSE-SLE-SERVER-12-SP1-2016-1055 SKIP SUSE-RU-2016:1804-1 as SUSE-SLE-SERVER-12-SP1-2016-1056 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1056,SUSE-SLE-SERVER-12-SP1-2016-1056 SKIP SUSE-RU-2016:1811-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1058 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1058 SKIP SUSE-RU-2016:1812-1 as slesappsp3-SAPHanaSR-12652 is not security or has no CVEs. patches: slesappsp3-SAPHanaSR-12652 SKIP SUSE-RU-2016:1813-1 as SUSE-SLE-SAP-12-2016-1059 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2016-1059 SKIP SUSE-RU-2016:1814-1 as SUSE-SLE-SAP-12-SP1-2016-1060 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1060 SKIP SUSE-RU-2016:1815-1 as slesappsp4-SAPHanaSR-12651 is not security or has no CVEs. patches: slesappsp4-SAPHanaSR-12651 SKIP SUSE-RU-2016:1817-1 as SUSE-SLE-SERVER-12-SP1-2016-1063 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1063,SUSE-SLE-SDK-12-SP1-2016-1063,SUSE-SLE-SERVER-12-SP1-2016-1063 SKIP SUSE-RU-2016:1822-1 as slessp4-e2fsprogs-12655 is not security or has no CVEs. patches: sdksp4-e2fsprogs-12655,slessp4-e2fsprogs-12655 SKIP SUSE-RU-2016:1825-1 as SUSE-SUSE-Manager-Server-3.0-2016-1071 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1071 SKIP SUSE-RU-2016:1828-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1074 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1074 SKIP SUSE-RU-2016:1829-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1075 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1075 SKIP SUSE-RU-2016:1832-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1076 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1076 SKIP SUSE-RU-2016:1836-1 as SUSE-SLE-SERVER-12-SP1-2016-1080 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1080,SUSE-SLE-SERVER-12-SP1-2016-1080 SKIP SUSE-RU-2016:1837-1 as slessp4-zypper-12658 is not security or has no CVEs. patches: sdksp4-zypper-12658,slessp4-zypper-12658 SKIP SUSE-RU-2016:1838-1 as slessp4-libtirpc-12659 is not security or has no CVEs. patches: sdksp4-libtirpc-12659,slessp4-libtirpc-12659 SKIP SUSE-RU-2016:1841-1 as slessp4-device-mapper-12660 is not security or has no CVEs. patches: sdksp4-device-mapper-12660,slessp4-device-mapper-12660 SKIP SUSE-RU-2016:1844-1 as SUSE-SLE-SERVER-12-SP1-2016-1083 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1083,SUSE-SLE-SDK-12-SP1-2016-1083,SUSE-SLE-SERVER-12-SP1-2016-1083 SKIP SUSE-RU-2016:1846-1 as SUSE-SLE-SERVER-12-SP1-2016-1084 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1084 SKIP SUSE-RU-2016:1847-1 as SUSE-SLE-SERVER-12-SP1-2016-1086 is not security or has no CVEs. patches: SUSE-SLE-RT-12-SP1-2016-1086,SUSE-SLE-SDK-12-SP1-2016-1086,SUSE-SLE-SERVER-12-SP1-2016-1086 SKIP SUSE-RU-2016:1848-1 as SUSE-SLE-SERVER-12-SP1-2016-1085 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1085,SUSE-SLE-SERVER-12-SP1-2016-1085 SKIP SUSE-RU-2016:1851-1 as SUSE-SLE-SERVER-12-SP1-2016-1087 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1087,SUSE-SLE-SERVER-12-SP1-2016-1087 SKIP SUSE-RU-2016:1852-1 as SUSE-SLE-SERVER-12-SP1-2016-1090 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1090,SUSE-SLE-SERVER-12-SP1-2016-1090 SKIP SUSE-RU-2016:1853-1 as sleclo50sp3-crowbar-12661 is not security or has no CVEs. patches: sleclo50sp3-crowbar-12661 SKIP SUSE-RU-2016:1854-1 as sleclo50sp3-crowbar-barclamp-deployer-12662 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-deployer-12662 SKIP SUSE-RU-2016:1855-1 as SUSE-SLE-SERVER-12-SP1-2016-1091 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1091,SUSE-SLE-SDK-12-SP1-2016-1091,SUSE-SLE-SERVER-12-SP1-2016-1091 SKIP SUSE-RU-2016:1870-1 as slessp4-net-snmp-12665 is not security or has no CVEs. patches: sdksp4-net-snmp-12665,slessp4-net-snmp-12665 SKIP SUSE-RU-2016:1871-1 as SUSE-SLE-SERVER-12-SP1-2016-1094 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1094 SKIP SUSE-RU-2016:1872-1 as SUSE-SLE-SERVER-12-SP1-2016-1095 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1095,SUSE-SLE-SERVER-12-SP1-2016-1095 SKIP SUSE-RU-2016:1873-1 as SUSE-Storage-2.1-2016-1097 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-1097 SKIP SUSE-RU-2016:1875-1 as SUSE-SLE-SERVER-12-SP1-2016-1100 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1100 SKIP SUSE-RU-2016:1877-1 as pubclsp3-cloud-init-12666 is not security or has no CVEs. patches: pubclsp3-cloud-init-12666 SKIP SUSE-RU-2016:1878-1 as SUSE-SLE-SERVER-12-SP1-2016-1103 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1103,SUSE-SLE-SDK-12-SP1-2016-1103,SUSE-SLE-SERVER-12-SP1-2016-1103 SKIP SUSE-RU-2016:1879-1 as SUSE-SLE-WE-12-SP1-2016-1106 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1106,SUSE-SLE-SDK-12-SP1-2016-1106,SUSE-SLE-SERVER-12-SP1-2016-1106,SUSE-SLE-WE-12-SP1-2016-1106 SKIP SUSE-RU-2016:1880-1 as SUSE-Storage-2.1-2016-1107 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1107,SUSE-Storage-2.1-2016-1107 SKIP SUSE-RU-2016:1881-1 as pubclsp3-python-azure-agent-12667 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-12667 SKIP SUSE-RU-2016:1882-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1104 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1104 SKIP SUSE-RU-2016:1883-1 as SUSE-Storage-2.1-2016-1108 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1108,SUSE-Storage-2.1-2016-1108 SKIP SUSE-RU-2016:1887-1 as SUSE-SLE-SERVER-12-SP1-2016-1109 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1109,SUSE-SLE-SDK-12-SP1-2016-1109,SUSE-SLE-SERVER-12-SP1-2016-1109 SKIP SUSE-RU-2016:1898-1 as SUSE-SLE-SERVER-12-SP1-2016-1111 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1111 SKIP SUSE-RU-2016:1899-1 as SUSE-SLE-SERVER-12-SP1-2016-1110 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1110,SUSE-SLE-SERVER-12-SP1-2016-1110 SKIP SUSE-RU-2016:1900-1 as SUSE-SLE-SERVER-12-SP1-2016-1115 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1115,SUSE-SLE-SERVER-12-SP1-2016-1115 SKIP SUSE-RU-2016:1901-1 as SUSE-SLE-SERVER-12-SP1-2016-1117 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1117,SUSE-SLE-SERVER-12-SP1-2016-1117 SKIP SUSE-RU-2016:1902-1 as slesmtsp3-smt-12668 is not security or has no CVEs. patches: slesmtsp3-smt-12668 SKIP SUSE-RU-2016:1903-1 as slessp4-s390-tools-12670 is not security or has no CVEs. patches: slessp4-s390-tools-12670 SKIP SUSE-RU-2016:1906-1 as SUSE-SLE-HA-12-SP1-2016-1121 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1121 SKIP SUSE-RU-2016:1907-1 as SUSE-SLE-SDK-12-SP1-2016-1120 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1120,SUSE-SLE-SDK-12-SP1-2016-1120 SKIP SUSE-RU-2016:1908-1 as slehasp4-pssh-12671 is not security or has no CVEs. patches: slehasp4-pssh-12671 SKIP SUSE-RU-2016:1911-1 as SUSE-SLE-SERVER-12-SP1-2016-1124 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1124,SUSE-SLE-SDK-12-SP1-2016-1124,SUSE-SLE-SERVER-12-SP1-2016-1124 SKIP SUSE-RU-2016:1914-1 as SUSE-SLE-SERVER-12-SP1-2016-1126 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1126,SUSE-SLE-SDK-12-SP1-2016-1126,SUSE-SLE-SERVER-12-SP1-2016-1126 SKIP SUSE-RU-2016:1935-1 as SUSE-Storage-2.1-2016-1130 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1130,SUSE-Storage-2.1-2016-1130 SKIP SUSE-RU-2016:1936-1 as SUSE-SLE-SERVER-12-SP1-2016-1132 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1132,SUSE-SLE-SERVER-12-SP1-2016-1132 SKIP SUSE-RU-2016:1938-1 as SUSE-OpenStack-Cloud-6-2016-1134 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1134 SKIP SUSE-RU-2016:1940-1 as slessp4-pmtools-12673 is not security or has no CVEs. patches: slessp4-pmtools-12673 SKIP SUSE-RU-2016:1942-1 as SUSE-SLE-SERVER-12-SP1-2016-1138 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1138,SUSE-SLE-SDK-12-SP1-2016-1138,SUSE-SLE-SERVER-12-SP1-2016-1138 SKIP SUSE-RU-2016:1943-1 as SUSE-Storage-3-2016-1139 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1139 SKIP SUSE-RU-2016:1943-2 as SUSE-Storage-3-2016-1139 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1139 SKIP SUSE-RU-2016:1948-1 as slessp4-libqt4-12676 is not security or has no CVEs. patches: sdksp4-libqt4-12676,slessp4-libqt4-12676 SKIP SUSE-RU-2016:1949-1 as SUSE-SLE-SERVER-12-SP1-2016-1145 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1145,SUSE-SLE-SERVER-12-SP1-2016-1145 SKIP SUSE-RU-2016:1950-1 as slehasp4-fence-agents-12677 is not security or has no CVEs. patches: slehasp4-fence-agents-12677 SKIP SUSE-RU-2016:1952-1 as SUSE-SLE-WE-12-SP1-2016-1149 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1149,SUSE-SLE-SDK-12-SP1-2016-1149,SUSE-SLE-SERVER-12-SP1-2016-1149,SUSE-SLE-WE-12-SP1-2016-1149 SKIP SUSE-RU-2016:1953-1 as slessp4-libica-2_1_0-12678 is not security or has no CVEs. patches: slessp4-libica-2_1_0-12678 SKIP SUSE-RU-2016:1954-1 as SUSE-SLE-SERVER-12-SP1-2016-1147 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1147,SUSE-SLE-SERVER-12-SP1-2016-1147 SKIP SUSE-RU-2016:1955-1 as sleclo50sp3-python-pbr-12679 is not security or has no CVEs. patches: sleclo50sp3-python-pbr-12679 SKIP SUSE-RU-2016:1956-1 as SUSE-SLE-SERVER-12-SP1-2016-1152 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1152,SUSE-SLE-SDK-12-SP1-2016-1152,SUSE-SLE-SERVER-12-SP1-2016-1152 SKIP SUSE-RU-2016:1957-1 as SUSE-SLE-SERVER-12-SP1-2016-1150 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1150 SKIP SUSE-RU-2016:1958-1 as SUSE-SLE-HA-GEO-12-SP1-2016-1155 is not security or has no CVEs. patches: SUSE-SLE-HA-GEO-12-SP1-2016-1155 SKIP SUSE-RU-2016:1959-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1153 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1153 SKIP SUSE-RU-2016:1960-1 as pubclsp3-supportutils-plugin-suse-public-cloud-12680 is not security or has no CVEs. patches: pubclsp3-supportutils-plugin-suse-public-cloud-12680 SKIP SUSE-RU-2016:1963-1 as SUSE-SLE-SERVER-12-SP1-2016-1158 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1158,SUSE-SLE-HA-12-SP1-2016-1158,SUSE-SLE-SERVER-12-SP1-2016-1158 SKIP SUSE-RU-2016:1965-1 as SUSE-SLE-SERVER-12-SP1-2016-1159 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1159,SUSE-SLE-SDK-12-SP1-2016-1159,SUSE-SLE-SERVER-12-SP1-2016-1159 SKIP SUSE-RU-2016:1972-1 as SUSE-SLE-SDK-12-SP1-2016-1161 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-1161,SUSE-SLE-SDK-12-SP1-2016-1161 SKIP SUSE-RU-2016:1973-1 as SUSE-SLE-SERVER-12-SP1-2016-1162 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1162,SUSE-SLE-SERVER-12-SP1-2016-1162 SKIP SUSE-RU-2016:1984-1 as SUSE-SLE-SERVER-12-SP1-2016-1166 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1166,SUSE-SLE-SDK-12-SP1-2016-1166,SUSE-SLE-SERVER-12-SP1-2016-1166 SKIP SUSE-RU-2016:1992-1 as SUSE-SLE-SERVER-12-SP1-2016-1168 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1168,SUSE-SLE-SDK-12-SP1-2016-1168,SUSE-SLE-SERVER-12-SP1-2016-1168 SKIP SUSE-RU-2016:1993-1 as SUSE-SLE-SERVER-12-SP1-2016-1169 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1169,SUSE-SLE-SDK-12-SP1-2016-1169,SUSE-SLE-SERVER-12-SP1-2016-1169 SKIP SUSE-RU-2016:2004-1 as SUSE-Storage-3-2016-1189 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1189,SUSE-Storage-2.1-2016-1189,SUSE-Storage-3-2016-1189 SKIP SUSE-RU-2016:2004-2 as SUSE-Storage-3-2016-1189 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1189 SKIP SUSE-RU-2016:2015-1 as sleclo50sp3-crowbar-barclamp-dns-12684 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-dns-12684 SKIP SUSE-RU-2016:2016-1 as SUSE-SLE-SERVER-12-SP1-2016-1192 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1192,SUSE-SLE-SERVER-12-SP1-2016-1192 SKIP SUSE-RU-2016:2017-1 as SUSE-SLE-WE-12-SP1-2016-1193 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1193,SUSE-SLE-SDK-12-SP1-2016-1193,SUSE-SLE-SERVER-12-SP1-2016-1193,SUSE-SLE-WE-12-SP1-2016-1193 SKIP SUSE-RU-2016:2023-1 as SUSE-SLE-SDK-12-SP1-2016-1197 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1197 SKIP SUSE-RU-2016:2032-1 as pubclsp3-python-azure-agent-12689 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-12689 SKIP SUSE-RU-2016:2037-1 as SUSE-SLE-SERVER-12-SP1-2016-1202 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1202,SUSE-SLE-SERVER-12-SP1-2016-1202 SKIP SUSE-RU-2016:2038-1 as SUSE-SLE-HA-12-SP1-2016-1204 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1204 SKIP SUSE-RU-2016:2039-1 as SUSE-SLE-SERVER-12-SP1-2016-1203 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1203,SUSE-SLE-SDK-12-SP1-2016-1203,SUSE-SLE-SERVER-12-SP1-2016-1203 SKIP SUSE-RU-2016:2042-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1201 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1201 SKIP SUSE-RU-2016:2046-1 as SUSE-SLE-SERVER-12-SP1-2016-1205 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1205,SUSE-SLE-SDK-12-SP1-2016-1205,SUSE-SLE-SERVER-12-SP1-2016-1205 SKIP SUSE-RU-2016:2047-1 as SUSE-SLE-SAP-12-2016-1207 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2016-1207 SKIP SUSE-RU-2016:2048-1 as SUSE-SLE-SAP-12-SP1-2016-1206 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1206 SKIP SUSE-RU-2016:2059-1 as SUSE-SLE-SERVER-12-SP1-2016-1209 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1209,SUSE-SLE-SERVER-12-SP1-2016-1209 SKIP SUSE-RU-2016:2060-1 as SUSE-SLE-SERVER-12-SP1-2016-1210 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1210 SKIP SUSE-RU-2016:2062-1 as SUSE-SLE-SERVER-12-SP1-2016-1212 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1212,SUSE-SLE-SDK-12-SP1-2016-1212,SUSE-SLE-SERVER-12-SP1-2016-1212 SKIP SUSE-RU-2016:2063-1 as SUSE-SLE-SERVER-12-SP1-2016-1211 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1211,SUSE-SLE-SERVER-12-SP1-2016-1211 SKIP SUSE-RU-2016:2064-1 as SUSE-SUSE-Manager-Proxy-3.0-2016-1217 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1217 SKIP SUSE-RU-2016:2065-1 as slessp3-sax2-12692 is not security or has no CVEs. patches: sleposp3-sax2-12692,slessp3-sax2-12692 SKIP SUSE-RU-2016:2066-1 as SUSE-SLE-Manager-Tools-12-2016-1216 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1216 SKIP SUSE-RU-2016:2067-1 as SUSE-SUSE-Manager-Server-3.0-2016-1216 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1216 SKIP SUSE-RU-2016:2068-1 as slesctsp4-client-tools-201607-12691 is not security or has no CVEs. patches: slesctsp3-client-tools-201607-12691,slesctsp4-client-tools-201607-12691 SKIP SUSE-RU-2016:2069-1 as SUSE-SUSE-Manager-Server-3.0-2016-1217 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1217 SKIP SUSE-RU-2016:2070-1 as SUSE-Storage-3-2016-1214 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1214,SUSE-SUSE-Manager-Server-3.0-2016-1214,SUSE-Storage-3-2016-1214 SKIP SUSE-RU-2016:2070-2 as SUSE-Storage-3-2016-1214 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1214 SKIP SUSE-RU-2016:2077-1 as SUSE-Storage-3-2016-1225 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1225 SKIP SUSE-RU-2016:2077-2 as SUSE-Storage-3-2016-1225 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1225 SKIP SUSE-RU-2016:2078-1 as SUSE-SLE12-CLOUD-5-2016-1226 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1226,SUSE-SLE12-CLOUD-5-2016-1226 SKIP SUSE-RU-2016:2086-1 as slehasp4-crmsh-12700 is not security or has no CVEs. patches: slehasp4-crmsh-12700 SKIP SUSE-RU-2016:2087-1 as SUSE-Storage-3-2016-1232 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1232 SKIP SUSE-RU-2016:2087-2 as SUSE-Storage-3-2016-1232 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1232 SKIP SUSE-RU-2016:2092-1 as SUSE-Storage-3-2016-1237 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1237,SUSE-Storage-2.1-2016-1237,SUSE-Storage-3-2016-1237 SKIP SUSE-RU-2016:2092-2 as SUSE-Storage-3-2016-1237 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1237 SKIP SUSE-RU-2016:2099-1 as SUSE-SLE-SERVER-12-SP1-2016-1240 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1240,SUSE-SLE-SDK-12-SP1-2016-1240,SUSE-SLE-SERVER-12-SP1-2016-1240 SKIP SUSE-RU-2016:2101-1 as SUSE-SLE-SDK-12-SP1-2016-1243 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1243,SUSE-SLE-SDK-12-SP1-2016-1243 SKIP SUSE-RU-2016:2102-1 as slestso13-createrepo-12703 is not security or has no CVEs. patches: sdksp4-createrepo-12703,sleslms13-createrepo-12703,slessp4-createrepo-12703,slestso13-createrepo-12703 SKIP SUSE-RU-2016:2110-1 as SUSE-SLE-SERVER-12-SP1-2016-1248 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1248 SKIP SUSE-RU-2016:2122-1 as slesmtsp3-smt-12704 is not security or has no CVEs. patches: slesmtsp3-smt-12704 SKIP SUSE-RU-2016:2128-1 as SUSE-SLE-SERVER-12-SP1-2016-1252 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1252,SUSE-SLE-SAP-12-2016-1252,SUSE-SLE-SERVER-12-2016-1252,SUSE-SLE-SERVER-12-SP1-2016-1252 SKIP SUSE-RU-2016:2130-1 as SUSE-SLE-SERVER-12-SP1-2016-1253 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1253,SUSE-SLE-SERVER-12-SP1-2016-1253 SKIP SUSE-RU-2016:2132-1 as SUSE-Storage-3-2016-1256 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1256,SUSE-Storage-2.1-2016-1256,SUSE-Storage-3-2016-1256 SKIP SUSE-RU-2016:2132-2 as SUSE-Storage-3-2016-1256 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1256 SKIP SUSE-RU-2016:2133-1 as SUSE-Storage-2.1-2016-1255 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1255,SUSE-Storage-2.1-2016-1255 SKIP SUSE-RU-2016:2137-1 as SUSE-SLE-SERVER-12-SP1-2016-1258 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1258,SUSE-SLE-SERVER-12-SP1-2016-1258 SKIP SUSE-RU-2016:2138-1 as slesctsp4-zypp-plugin-spacewalk-12705 is not security or has no CVEs. patches: slesctsp3-zypp-plugin-spacewalk-12705,slesctsp4-zypp-plugin-spacewalk-12705 SKIP SUSE-RU-2016:2139-1 as sleman21-suse-manager-21-201608-12705 is not security or has no CVEs. patches: sleman21-suse-manager-21-201608-12705 SKIP SUSE-RU-2016:2140-1 as slessp4-spacewalk-201608-12705 is not security or has no CVEs. patches: slessp4-spacewalk-201608-12705 SKIP SUSE-RU-2016:2141-1 as slemap21-suse-manager-proxy-21-201608-12705 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201608-12705 SKIP SUSE-RU-2016:2142-1 as SUSE-SLE-WE-12-SP1-2016-1259 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1259,SUSE-SLE-SDK-12-SP1-2016-1259,SUSE-SLE-SERVER-12-SP1-2016-1259,SUSE-SLE-WE-12-SP1-2016-1259 SKIP SUSE-RU-2016:2149-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1265 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1265 SKIP SUSE-RU-2016:2150-1 as pubclsp3-python-ec2metadata-12708 is not security or has no CVEs. patches: pubclsp3-python-ec2metadata-12708 SKIP SUSE-RU-2016:2152-1 as slessp4-timezone-12709 is not security or has no CVEs. patches: sdksp4-timezone-12709,sleclo50sp3-timezone-12709,sleman21-timezone-12709,slemap21-timezone-12709,sleposp3-timezone-12709,slessp2-timezone-12709,slessp3-timezone-12709,slessp4-timezone-12709 SKIP SUSE-RU-2016:2157-1 as slessp4-krb5-12715 is not security or has no CVEs. patches: sdksp4-krb5-12715,slessp4-krb5-12715 SKIP SUSE-RU-2016:2158-1 as SUSE-SLE-Module-Containers-12-2016-1276 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1276,SUSE-SLE-Module-Containers-12-2016-1276 SKIP SUSE-RU-2016:2159-1 as SUSE-SLE-SERVER-12-SP1-2016-1277 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1277,SUSE-SLE-SDK-12-SP1-2016-1277,SUSE-SLE-SERVER-12-SP1-2016-1277 SKIP SUSE-RU-2016:2162-1 as slessp4-autofs-12716 is not security or has no CVEs. patches: slessp4-autofs-12716 SKIP SUSE-RU-2016:2163-1 as slessp2-release-notes-sles-12717 is not security or has no CVEs. patches: slessp2-release-notes-sles-12717 SKIP SUSE-RU-2016:2164-1 as sleclo50sp3-crowbar-barclamp-nova_dashboard-12718 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-nova_dashboard-12718 SKIP SUSE-RU-2016:2183-1 as SUSE-Storage-3-2016-1290 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1290 SKIP SUSE-RU-2016:2183-2 as SUSE-Storage-3-2016-1290 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1290 SKIP SUSE-RU-2016:2191-1 as SUSE-SUSE-Manager-Server-3.0-2016-1296 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1296 SKIP SUSE-RU-2016:2193-1 as slessp3-release-notes-sles-12723 is not security or has no CVEs. patches: slessp3-release-notes-sles-12723 SKIP SUSE-RU-2016:2202-1 as SUSE-Storage-2.1-2016-1301 is not security or has no CVEs. patches: SUSE-Storage-2.1-2016-1301 SKIP SUSE-RU-2016:2228-1 as SUSE-SLE-SERVER-12-SP1-2016-1310 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1310,SUSE-SLE-SDK-12-SP1-2016-1310,SUSE-SLE-SERVER-12-SP1-2016-1310 SKIP SUSE-RU-2016:2239-1 as SUSE-SLE-SERVER-12-SP1-2016-1313 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1313,SUSE-SLE-SERVER-12-SP1-2016-1313 SKIP SUSE-RU-2016:2240-1 as sleclo50sp3-crowbar-barclamp-nova-12728 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-nova-12728 SKIP SUSE-RU-2016:2247-1 as SUSE-OpenStack-Cloud-6-2016-1319 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1319 SKIP SUSE-RU-2016:2260-1 as sleclo50sp3-crowbar-barclamp-neutron-12732 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-neutron-12732 SKIP SUSE-RU-2016:2262-1 as SUSE-SLE-SERVER-12-SP1-2016-1325 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1325,SUSE-SLE-SERVER-12-SP1-2016-1325 SKIP SUSE-RU-2016:2265-1 as SUSE-SLE-SERVER-12-SP1-2016-1327 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1327,SUSE-SLE-SDK-12-SP1-2016-1327,SUSE-SLE-SERVER-12-SP1-2016-1327 SKIP SUSE-RU-2016:2269-1 as slessp4-pyxml-12734 is not security or has no CVEs. patches: slessp4-pyxml-12734 SKIP SUSE-RU-2016:2279-1 as SUSE-SLE-SERVER-12-SP1-2016-1331 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1331,SUSE-SLE-SDK-12-SP1-2016-1331,SUSE-SLE-SERVER-12-SP1-2016-1331 SKIP SUSE-RU-2016:2288-1 as sleclo50sp3-crowbar-barclamp-cinder-12738 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-cinder-12738 SKIP SUSE-RU-2016:2289-1 as SUSE-Storage-3-2016-1338 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1338,SUSE-Storage-2.1-2016-1338,SUSE-Storage-3-2016-1338 SKIP SUSE-RU-2016:2289-2 as SUSE-Storage-3-2016-1338 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1338 SKIP SUSE-RU-2016:2292-1 as slehasp4-release-notes-hae-12740 is not security or has no CVEs. patches: slehasp4-release-notes-hae-12740 SKIP SUSE-RU-2016:2293-1 as SUSE-SLE-SERVER-12-SP1-2016-1342 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1342,SUSE-SLE-SERVER-12-SP1-2016-1342 SKIP SUSE-RU-2016:2298-1 as slessp4-yast2-ntp-client-12741 is not security or has no CVEs. patches: slessp4-yast2-ntp-client-12741 SKIP SUSE-RU-2016:2300-1 as SUSE-SLE-SERVER-12-SP1-2016-1344 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1344,SUSE-SLE-SERVER-12-SP1-2016-1344 SKIP SUSE-RU-2016:2301-1 as slessp4-samba-12742 is not security or has no CVEs. patches: sdksp4-samba-12742,sleclo50sp3-samba-12742,sleman21-samba-12742,slemap21-samba-12742,sleposp3-samba-12742,slessp3-samba-12742,slessp4-samba-12742 SKIP SUSE-RU-2016:2307-1 as SUSE-SLE-SERVER-12-SP1-2016-1352 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1352,SUSE-SLE-SDK-12-SP1-2016-1352,SUSE-SLE-SERVER-12-SP1-2016-1352 SKIP SUSE-RU-2016:2315-1 as slessp4-pciutils-12746 is not security or has no CVEs. patches: sdksp4-pciutils-12746,slessp4-pciutils-12746 SKIP SUSE-RU-2016:2316-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1355 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1355 SKIP SUSE-RU-2016:2317-1 as SUSE-SLE-SERVER-12-SP1-2016-1356 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1356,SUSE-SLE-SERVER-12-SP1-2016-1356 SKIP SUSE-RU-2016:2318-1 as SUSE-SLE-SERVER-12-2016-1357 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2016-1357,SUSE-SLE-SERVER-12-2016-1357 SKIP SUSE-RU-2016:2323-1 as sleclo50sp3-crowbar-barclamp-crowbar-12747 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-crowbar-12747 SKIP SUSE-RU-2016:2324-1 as sleclo50sp3-python-glanceclient-12749 is not security or has no CVEs. patches: sleclo50sp3-python-glanceclient-12749 SKIP SUSE-RU-2016:2326-1 as SUSE-SLE-SERVER-12-SP1-2016-1362 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1362,SUSE-SLE-SDK-12-SP1-2016-1362,SUSE-SLE-SERVER-12-SP1-2016-1362 SKIP SUSE-RU-2016:2327-1 as SUSE-SLE-SERVER-12-SP1-2016-1363 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1363,SUSE-SLE-SERVER-12-SP1-2016-1363 SKIP SUSE-RU-2016:2331-1 as SUSE-SLE-SERVER-12-SP1-2016-1367 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1367,SUSE-SLE-SERVER-12-SP1-2016-1367 SKIP SUSE-RU-2016:2350-1 as slessp4-aaa_base-12755 is not security or has no CVEs. patches: slessp4-aaa_base-12755 SKIP SUSE-RU-2016:2351-1 as SUSE-SLE-SERVER-12-SP1-2016-1374 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1374,SUSE-SLE-SERVER-12-SP1-2016-1374 SKIP SUSE-RU-2016:2352-1 as SUSE-SLE-SERVER-12-SP1-2016-1375 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1375,SUSE-SLE-SDK-12-SP1-2016-1375,SUSE-SLE-SERVER-12-SP1-2016-1375 SKIP SUSE-RU-2016:2356-1 as SUSE-Storage-2.1-2016-1379 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1379,SUSE-SLE-RT-12-SP1-2016-1379,SUSE-SLE-SDK-12-SP1-2016-1379,SUSE-SLE-SERVER-12-SP1-2016-1379,SUSE-SLE-WE-12-SP1-2016-1379,SUSE-Storage-2.1-2016-1379 SKIP SUSE-RU-2016:2359-1 as SUSE-SLE-Module-Web-Scripting-12-2016-1381 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2016-1381 SKIP SUSE-RU-2016:2360-1 as 5585 is not security or has no CVEs. patches: 5585 SKIP SUSE-RU-2016:2383-1 as SUSE-SLE-SERVER-12-SP1-2016-1383 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1383,SUSE-SLE-SERVER-12-SP1-2016-1383 SKIP SUSE-RU-2016:2384-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1384 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1384 SKIP SUSE-RU-2016:2390-1 as SUSE-SLE-SERVER-12-SP1-2016-1388 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1388,SUSE-SLE-SDK-12-SP1-2016-1388,SUSE-SLE-SERVER-12-SP1-2016-1388 SKIP SUSE-RU-2016:2392-1 as slessp4-lsof-12761 is not security or has no CVEs. patches: slessp4-lsof-12761 SKIP SUSE-RU-2016:2393-1 as SUSE-SLE-SERVER-12-SP1-2016-1395 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1395,SUSE-SLE-SERVER-12-SP1-2016-1395 SKIP SUSE-RU-2016:2398-1 as SUSE-SLE-SERVER-12-SP1-2016-1396 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1396,SUSE-SLE-SERVER-12-SP1-2016-1396 SKIP SUSE-RU-2016:2403-1 as slessp4-btrfsmaintenance-12762 is not security or has no CVEs. patches: slessp4-btrfsmaintenance-12762 SKIP SUSE-RU-2016:2410-1 as SUSE-SLE-SERVER-12-SP1-2016-1404 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1404,SUSE-SLE-SAP-12-SP1-2016-1404,SUSE-SLE-SERVER-12-SP1-2016-1404 SKIP SUSE-RU-2016:2417-1 as SUSE-SLE-SERVER-12-SP1-2016-1410 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1410 SKIP SUSE-RU-2016:2419-1 as slessp4-irqbalance-12768 is not security or has no CVEs. patches: slessp4-irqbalance-12768 SKIP SUSE-RU-2016:2421-1 as SUSE-SLE-SERVER-12-2016-1415 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-2016-1415,SUSE-SLE-SAP-12-2016-1415,SUSE-SLE-SERVER-12-2016-1415 SKIP SUSE-RU-2016:2426-1 as SUSE-SLE-SERVER-12-SP1-2016-1419 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1419,SUSE-SLE-SERVER-12-SP1-2016-1419 SKIP SUSE-RU-2016:2427-1 as slessp4-ding-libs-12770 is not security or has no CVEs. patches: sdksp4-ding-libs-12770,slessp4-ding-libs-12770 SKIP SUSE-RU-2016:2428-1 as SUSE-SLE-SERVER-12-SP1-2016-1418 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1418,SUSE-SLE-SDK-12-SP1-2016-1418,SUSE-SLE-SERVER-12-SP1-2016-1418 SKIP SUSE-RU-2016:2441-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1425 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1425 SKIP SUSE-RU-2016:2442-1 as SUSE-SLE-SERVER-12-SP1-2016-1424 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1424,SUSE-SLE-SERVER-12-SP1-2016-1424 SKIP SUSE-RU-2016:2452-1 as SUSE-SUSE-Manager-Server-3.0-2016-1428 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1428 SKIP SUSE-RU-2016:2454-1 as SUSE-SLE-WE-12-SP1-2016-1430 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1430,SUSE-SLE-SDK-12-SP1-2016-1430,SUSE-SLE-SERVER-12-SP1-2016-1430,SUSE-SLE-WE-12-SP1-2016-1430 SKIP SUSE-RU-2016:2462-1 as SUSE-SLE-SERVER-12-SP1-2016-1435 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1435 SKIP SUSE-RU-2016:2466-1 as SUSE-Storage-3-2016-1438 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1438 SKIP SUSE-RU-2016:2466-2 as SUSE-Storage-3-2016-1438 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1438 SKIP SUSE-RU-2016:2471-1 as slessp4-iprutils-12778 is not security or has no CVEs. patches: sdksp4-iprutils-12778,slessp4-iprutils-12778 SKIP SUSE-RU-2016:2474-1 as SUSE-SLE-SERVER-12-SP1-2016-1445 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1445,SUSE-SLE-SDK-12-SP1-2016-1445,SUSE-SLE-SERVER-12-SP1-2016-1445 SKIP SUSE-RU-2016:2478-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1449 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1449 SKIP SUSE-RU-2016:2478-2 as SUSE-SLE-Module-Public-Cloud-12-2016-1449 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1449 SKIP SUSE-RU-2016:2482-1 as pubclsp3-python-azure-agent-12779 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-12779 SKIP SUSE-RU-2016:2483-1 as SUSE-SLE-SERVER-12-SP1-2016-1452 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1452,SUSE-SLE-SERVER-12-SP1-2016-1452 SKIP SUSE-RU-2016:2487-1 as SUSE-SLE-SERVER-12-SP1-2016-1454 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1454,SUSE-SLE-SAP-12-2016-1454,SUSE-SLE-SERVER-12-2016-1454,SUSE-SLE-SERVER-12-SP1-2016-1454 SKIP SUSE-RU-2016:2488-1 as slessp4-timezone-12780 is not security or has no CVEs. patches: sdksp4-timezone-12780,sleclo50sp3-timezone-12780,sleman21-timezone-12780,slemap21-timezone-12780,sleposp3-timezone-12780,slessp2-timezone-12780,slessp3-timezone-12780,slessp4-timezone-12780 SKIP SUSE-RU-2016:2489-1 as SUSE-SLE-SERVER-12-SP1-2016-1456 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1456,SUSE-SLE-SDK-12-SP1-2016-1456,SUSE-SLE-SERVER-12-SP1-2016-1456 SKIP SUSE-RU-2016:2491-1 as SUSE-SLE-SERVER-12-SP1-2016-1457 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1457,SUSE-SLE-SERVER-12-SP1-2016-1457 SKIP SUSE-RU-2016:2499-1 as SUSE-SLE-SERVER-12-SP1-2016-1460 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1460 SKIP SUSE-RU-2016:2509-1 as SUSE-Storage-3-2016-1467 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1467,SUSE-Storage-2.1-2016-1467,SUSE-Storage-3-2016-1467 SKIP SUSE-RU-2016:2509-2 as SUSE-Storage-3-2016-1467 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1467 SKIP SUSE-RU-2016:2514-1 as SUSE-SLE-SERVER-12-SP1-2016-1470 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1470 SKIP SUSE-RU-2016:2515-1 as SUSE-SLE-SERVER-12-SP1-2016-1469 is not security or has no CVEs. patches: SUSE-SLE-RT-12-SP1-2016-1469,SUSE-SLE-SERVER-12-SP1-2016-1469 SKIP SUSE-RU-2016:2530-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1475 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1475 SKIP SUSE-RU-2016:2531-1 as SUSE-SLE-SERVER-12-SP1-2016-1474 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1474,SUSE-SLE-SDK-12-SP1-2016-1474,SUSE-SLE-SERVER-12-SP1-2016-1474 SKIP SUSE-RU-2016:2534-1 as SUSE-Storage-3-2016-1478 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1478 SKIP SUSE-RU-2016:2534-2 as SUSE-Storage-3-2016-1478 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1478 SKIP SUSE-RU-2016:2541-1 as SUSE-SLE-SERVER-12-SP1-2016-1479 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1479 SKIP SUSE-RU-2016:2542-1 as SUSE-SLE-SAP-12-SP1-2016-1480 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1480 SKIP SUSE-RU-2016:2546-1 as SUSE-SLE-SERVER-12-SP1-2016-1487 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1487,SUSE-SLE-SDK-12-SP1-2016-1487,SUSE-SLE-SERVER-12-SP1-2016-1487 SKIP SUSE-RU-2016:2547-1 as SUSE-SLE-SERVER-12-SP1-2016-1488 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1488,SUSE-SLE-SERVER-12-SP1-2016-1488 SKIP SUSE-RU-2016:2547-2 as SUSE-SLE-Module-Public-Cloud-12-2016-1488 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1488 SKIP SUSE-RU-2016:2551-1 as SUSE-SLE-SERVER-12-SP1-2016-1491 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1491,SUSE-SLE-SERVER-12-SP1-2016-1491 SKIP SUSE-RU-2016:2554-1 as SUSE-SLE-SERVER-12-SP1-2016-1493 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1493 SKIP SUSE-RU-2016:2562-1 as SUSE-OpenStack-Cloud-6-2016-1496 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1496 SKIP SUSE-RU-2016:2566-1 as slessp4-ksh-12796 is not security or has no CVEs. patches: sdksp4-ksh-12796,slessp4-ksh-12796 SKIP SUSE-RU-2016:2567-1 as SUSE-SLE-SDK-12-SP1-2016-1503 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1503,SUSE-SLE-SDK-12-SP1-2016-1503 SKIP SUSE-RU-2016:2567-2 as SUSE-SLE-Module-Legacy-12-2016-1503 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1503 SKIP SUSE-RU-2016:2568-1 as SUSE-SLE-Module-Containers-12-2016-1504 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-1504 SKIP SUSE-RU-2016:2571-1 as slessp4-crash-12801 is not security or has no CVEs. patches: sdksp4-crash-12801,slessp4-crash-12801 SKIP SUSE-RU-2016:2572-1 as SUSE-SLE-WE-12-SP1-2016-1508 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1508,SUSE-SLE-SDK-12-SP1-2016-1508,SUSE-SLE-SERVER-12-SP1-2016-1508,SUSE-SLE-WE-12-SP1-2016-1508 SKIP SUSE-RU-2016:2573-1 as SUSE-Storage-2.1-2016-1509 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1509,SUSE-SLE-Module-Containers-12-2016-1509,SUSE-SLE-Module-Public-Cloud-12-2016-1509,SUSE-SLE-SDK-12-SP1-2016-1509,SUSE-SLE-SERVER-12-SP1-2016-1509,SUSE-SLE12-CLOUD-5-2016-1509,SUSE-Storage-2.1-2016-1509 SKIP SUSE-RU-2016:2575-1 as SUSE-Storage-3-2016-1510 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1510,SUSE-SLE-SDK-12-SP1-2016-1510,SUSE-SLE-SERVER-12-SP1-2016-1510,SUSE-SLE-WE-12-SP1-2016-1510,SUSE-Storage-3-2016-1510 SKIP SUSE-RU-2016:2575-2 as SUSE-Storage-3-2016-1510 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1510 SKIP SUSE-RU-2016:2581-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2016-1514 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-1514 SKIP SUSE-RU-2016:2582-1 as SUSE-SLE-SERVER-12-SP1-2016-1515 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1515,SUSE-SLE-SDK-12-SP1-2016-1515,SUSE-SLE-SERVER-12-SP1-2016-1515 SKIP SUSE-RU-2016:2586-1 as slesappsp4-sleha-bootstrap-12805 is not security or has no CVEs. patches: slehasp4-sleha-bootstrap-12805,slesappsp4-sleha-bootstrap-12805 SKIP SUSE-RU-2016:2587-1 as slessp4-lxc-12806 is not security or has no CVEs. patches: sdksp4-lxc-12806,slessp4-lxc-12806 SKIP SUSE-RU-2016:2588-1 as SUSE-SLE-SERVER-12-SP1-2016-1519 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1519,SUSE-SLE-SERVER-12-SP1-2016-1519 SKIP SUSE-RU-2016:2590-1 as SUSE-SLE-SERVER-12-SP1-2016-1520 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1520,SUSE-SLE-HA-12-SP1-2016-1520,SUSE-SLE-SDK-12-SP1-2016-1520,SUSE-SLE-SERVER-12-SP1-2016-1520 SKIP SUSE-RU-2016:2591-1 as SUSE-SLE-HA-12-SP1-2016-1521 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1521 SKIP SUSE-RU-2016:2594-1 as SUSE-SLE-SDK-12-SP1-2016-1526 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2016-1526,SUSE-SLE-SDK-12-SP1-2016-1526 SKIP SUSE-RU-2016:2595-1 as slessp4-open-fcoe-12808 is not security or has no CVEs. patches: slessp4-open-fcoe-12808 SKIP SUSE-RU-2016:2611-1 as SUSE-Storage-3-2016-1531 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1531,SUSE-Storage-2.1-2016-1531,SUSE-Storage-3-2016-1531 SKIP SUSE-RU-2016:2611-2 as SUSE-Storage-3-2016-1531 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1531 SKIP SUSE-RU-2016:2612-1 as SUSE-OpenStack-Cloud-6-2016-1529 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1529 SKIP SUSE-RU-2016:2613-1 as SUSE-Storage-2.1-2016-1530 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1530,SUSE-Storage-2.1-2016-1530 SKIP SUSE-RU-2016:2615-1 as SUSE-SUSE-Manager-Server-3.0-2016-1533 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1533 SKIP SUSE-RU-2016:2616-1 as SUSE-SUSE-Manager-Server-3.0-2016-1539 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1539 SKIP SUSE-RU-2016:2619-1 as slesctsp4-client-tools-201610-12810 is not security or has no CVEs. patches: slesctsp3-client-tools-201610-12810,slesctsp4-client-tools-201610-12810 SKIP SUSE-RU-2016:2620-1 as SUSE-SLE-Manager-Tools-12-2016-1533 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1533 SKIP SUSE-RU-2016:2620-2 as SUSE-SLE-Manager-Tools-12-2016-1533 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1533 SKIP SUSE-RU-2016:2621-1 as SUSE-SUSE-Manager-Proxy-3.0-2016-1539 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1539 SKIP SUSE-RU-2016:2622-1 as slessp4-mvapich2-12814 is not security or has no CVEs. patches: sdksp4-mvapich2-12814,slessp4-mvapich2-12814 SKIP SUSE-RU-2016:2624-1 as sleposp3-kiwi-12815 is not security or has no CVEs. patches: sleposp3-kiwi-12815 SKIP SUSE-RU-2016:2626-1 as SUSE-Storage-3-2016-1542 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1542,SUSE-SUSE-Manager-Server-3.0-2016-1542,SUSE-Storage-3-2016-1542 SKIP SUSE-RU-2016:2626-2 as SUSE-Storage-3-2016-1542 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1542 SKIP SUSE-RU-2016:2656-1 as SUSE-SLE-SERVER-12-SP1-2016-1560 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1560,SUSE-SLE-SDK-12-SP1-2016-1560,SUSE-SLE-SERVER-12-SP1-2016-1560 SKIP SUSE-RU-2016:2660-1 as slesmtsp3-smt-12819 is not security or has no CVEs. patches: slesmtsp3-smt-12819 SKIP SUSE-RU-2016:2664-1 as SUSE-SUSE-Manager-Server-3.0-2016-1568 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1568 SKIP SUSE-RU-2016:2669-1 as SUSE-Storage-3-2016-1569 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1569 SKIP SUSE-RU-2016:2669-2 as SUSE-Storage-3-2016-1569 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1569 SKIP SUSE-RU-2016:2686-1 as slesctsp4-suse-manager-clienttools-201610-12822 is not security or has no CVEs. patches: slesctsp3-suse-manager-clienttools-201610-12822,slesctsp4-suse-manager-clienttools-201610-12822 SKIP SUSE-RU-2016:2687-1 as slemap21-suse-manager-proxy-21-201610-12822 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201610-12822 SKIP SUSE-RU-2016:2688-1 as sleman21-suse-manager-21-201610-12822 is not security or has no CVEs. patches: sleman21-suse-manager-21-201610-12822 SKIP SUSE-RU-2016:2689-1 as SUSE-SLE-SAP-12-SP1-2016-1579 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1579,SUSE-SLE-SAP-12-SP1-2016-1579 SKIP SUSE-RU-2016:2689-2 as SUSE-SLE-Module-Legacy-12-2016-1579 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1579 SKIP SUSE-RU-2016:2690-1 as SUSE-Storage-3-2016-1580 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1580,SUSE-Storage-2.1-2016-1580,SUSE-Storage-3-2016-1580 SKIP SUSE-RU-2016:2690-2 as SUSE-Storage-3-2016-1580 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1580 SKIP SUSE-RU-2016:2691-1 as SUSE-Storage-3-2016-1581 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1581,SUSE-SLE-DESKTOP-12-SP1-2016-1581,SUSE-SLE-Module-Adv-Systems-Management-12-2016-1581,SUSE-Storage-2.1-2016-1581,SUSE-Storage-3-2016-1581 SKIP SUSE-RU-2016:2691-2 as SUSE-Storage-3-2016-1581 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1581 SKIP SUSE-RU-2016:2692-1 as slessp4-squid3-12825 is not security or has no CVEs. patches: slessp4-squid3-12825 SKIP SUSE-RU-2016:2693-1 as slessp4-wget-12826 is not security or has no CVEs. patches: secsp3-wget-12826,slessp4-wget-12826 SKIP SUSE-RU-2016:2694-1 as SUSE-SLE-Module-Web-Scripting-12-2016-1405 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1405,SUSE-SLE-Module-Legacy-12-2016-1405,SUSE-SLE-Module-Public-Cloud-12-2016-1405,SUSE-SLE-Module-Toolchain-12-2016-1405,SUSE-SLE-Module-Web-Scripting-12-2016-1405 SKIP SUSE-RU-2016:2695-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1586 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1586 SKIP SUSE-RU-2016:2698-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1589 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1589 SKIP SUSE-RU-2016:2701-1 as SUSE-Storage-2.1-2016-1592 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1592,SUSE-SLE-SDK-12-SP1-2016-1592,SUSE-SLE-SERVER-12-SP1-2016-1592,SUSE-Storage-2.1-2016-1592 SKIP SUSE-RU-2016:2702-1 as slessp3-release-notes-sles-12828 is not security or has no CVEs. patches: slessp3-release-notes-sles-12828 SKIP SUSE-RU-2016:2703-1 as SUSE-OpenStack-Cloud-6-2016-1593 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1593 SKIP SUSE-RU-2016:2705-1 as SUSE-Storage-2.1-2016-1596 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1596,SUSE-Storage-2.1-2016-1596 SKIP SUSE-RU-2016:2718-1 as slessp4-shim-09-12832 is not security or has no CVEs. patches: slessp4-shim-09-12832 SKIP SUSE-RU-2016:2719-1 as SUSE-SLE-SERVER-12-SP1-2016-1602 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1602,SUSE-SLE-SERVER-12-SP1-2016-1602 SKIP SUSE-RU-2016:2720-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1603 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1603 SKIP SUSE-RU-2016:2721-1 as slessp4-parted-12833 is not security or has no CVEs. patches: sdksp4-parted-12833,slessp4-parted-12833 SKIP SUSE-RU-2016:2727-1 as slessp4-virt-utils-12837 is not security or has no CVEs. patches: slessp4-virt-utils-12837 SKIP SUSE-RU-2016:2728-1 as SUSE-SLE-SAP-12-SP2-2016-1609 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1609,SUSE-SLE-SAP-12-SP2-2016-1609 SKIP SUSE-RU-2016:2731-1 as SUSE-SLE-SERVER-12-SP2-2016-1611 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1611,SUSE-SLE-SERVER-12-SP2-2016-1611 SKIP SUSE-RU-2016:2740-1 as SUSE-SLE-SERVER-12-SP1-2016-1613 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1613,SUSE-SLE-SERVER-12-SP1-2016-1613 SKIP SUSE-RU-2016:2741-1 as SUSE-SLE-SERVER-12-SP2-2016-1615 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1615,SUSE-SLE-SERVER-12-SP1-2016-1615,SUSE-SLE-SERVER-12-SP2-2016-1615 SKIP SUSE-RU-2016:2742-1 as SUSE-SLE-SERVER-12-SP2-2016-1614 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1614,SUSE-SLE-RPI-12-SP2-2016-1614,SUSE-SLE-SERVER-12-SP2-2016-1614 SKIP SUSE-RU-2016:2743-1 as SUSE-SLE-Live-Patching-12-2016-1616 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2016-1616 SKIP SUSE-RU-2016:2744-1 as SUSE-SLE-SERVER-12-SP2-2016-1617 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1617,SUSE-SLE-DESKTOP-12-SP2-2016-1617,SUSE-SLE-RPI-12-SP2-2016-1617,SUSE-SLE-SDK-12-SP1-2016-1617,SUSE-SLE-SDK-12-SP2-2016-1617,SUSE-SLE-SERVER-12-SP1-2016-1617,SUSE-SLE-SERVER-12-SP2-2016-1617 SKIP SUSE-RU-2016:2745-1 as slessp4-kiwi-12838 is not security or has no CVEs. patches: sdksp4-kiwi-12838,slessp4-kiwi-12838 SKIP SUSE-RU-2016:2747-1 as slemap21-release-notes-susemanager-12840 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-12840,slemap21-release-notes-susemanager-12840 SKIP SUSE-RU-2016:2748-1 as SUSE-SLE-SERVER-12-SP2-2016-1621 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1621,SUSE-SLE-DESKTOP-12-SP2-2016-1621,SUSE-SLE-RPI-12-SP2-2016-1621,SUSE-SLE-SAP-12-2016-1621,SUSE-SLE-SERVER-12-2016-1621,SUSE-SLE-SERVER-12-SP1-2016-1621,SUSE-SLE-SERVER-12-SP2-2016-1621 SKIP SUSE-RU-2016:2751-1 as SUSE-SLE-WE-12-SP2-2016-1622 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1622,SUSE-SLE-HA-12-SP2-2016-1622,SUSE-SLE-Live-Patching-12-2016-1622,SUSE-SLE-RPI-12-SP2-2016-1622,SUSE-SLE-SDK-12-SP2-2016-1622,SUSE-SLE-SERVER-12-SP2-2016-1622,SUSE-SLE-WE-12-SP2-2016-1622 SKIP SUSE-RU-2016:2753-1 as SUSE-SLE-SERVER-12-SP1-2016-1623 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1623,SUSE-SLE-SERVER-12-SP1-2016-1623 SKIP SUSE-RU-2016:2754-1 as SUSE-SLE-SERVER-12-SP2-2016-1624 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1624,SUSE-SLE-SDK-12-SP2-2016-1624,SUSE-SLE-SERVER-12-SP2-2016-1624 SKIP SUSE-RU-2016:2758-1 as SUSE-SLE-SERVER-12-SP2-2016-1627 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1627,SUSE-SLE-SERVER-12-SP2-2016-1627 SKIP SUSE-RU-2016:2761-1 as SUSE-SLE-Module-Containers-12-2016-1628 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2016-1628 SKIP SUSE-RU-2016:2762-1 as SUSE-SLE-SERVER-12-SP1-2016-1631 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1631 SKIP SUSE-RU-2016:2763-1 as SUSE-SLE-HA-12-SP2-2016-1633 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2016-1633 SKIP SUSE-RU-2016:2765-1 as slessp4-netpbm-12842 is not security or has no CVEs. patches: sdksp4-netpbm-12842,slessp4-netpbm-12842 SKIP SUSE-RU-2016:2767-1 as SUSE-SLE-SERVER-12-SP2-2016-1634 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1634,SUSE-SLE-DESKTOP-12-SP2-2016-1634,SUSE-SLE-RPI-12-SP2-2016-1634,SUSE-SLE-SDK-12-SP1-2016-1634,SUSE-SLE-SDK-12-SP2-2016-1634,SUSE-SLE-SERVER-12-SP1-2016-1634,SUSE-SLE-SERVER-12-SP2-2016-1634 SKIP SUSE-RU-2016:2771-1 as SUSE-Storage-3-2016-1636 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1636 SKIP SUSE-RU-2016:2773-1 as slessp4-timezone-12844 is not security or has no CVEs. patches: sdksp4-timezone-12844,sleclo50sp3-timezone-12844,sleman21-timezone-12844,slemap21-timezone-12844,sleposp3-timezone-12844,slessp2-timezone-12844,slessp3-timezone-12844,slessp4-timezone-12844 SKIP SUSE-RU-2016:2777-1 as SUSE-SLE-SERVER-12-SP2-2016-1641 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1641,SUSE-SLE-RPI-12-SP2-2016-1641,SUSE-SLE-SDK-12-SP2-2016-1641,SUSE-SLE-SERVER-12-SP2-2016-1641 SKIP SUSE-RU-2016:2779-1 as SUSE-SLE-SERVER-12-SP2-2016-1644 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1644,SUSE-SLE-SERVER-12-SP1-2016-1644,SUSE-SLE-SERVER-12-SP2-2016-1644 SKIP SUSE-RU-2016:2790-1 as SUSE-SLE12-CLOUD-5-2016-1649 is not security or has no CVEs. patches: SUSE-SLE12-CLOUD-5-2016-1649 SKIP SUSE-RU-2016:2794-1 as SUSE-SLE-SAP-12-SP1-2016-1650 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1650 SKIP SUSE-RU-2016:2797-1 as SUSE-SLE-SERVER-12-SP2-2016-1651 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1651,SUSE-SLE-RPI-12-SP2-2016-1651,SUSE-SLE-SDK-12-SP2-2016-1651,SUSE-SLE-SERVER-12-SP2-2016-1651 SKIP SUSE-RU-2016:2808-1 as SUSE-SLE-HA-12-SP1-2016-1652 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1652 SKIP SUSE-RU-2016:2810-1 as SUSE-SLE-SERVER-12-SP2-2016-1654 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1654,SUSE-SLE-DESKTOP-12-SP2-2016-1654,SUSE-SLE-RPI-12-SP2-2016-1654,SUSE-SLE-SERVER-12-SP1-2016-1654,SUSE-SLE-SERVER-12-SP2-2016-1654 SKIP SUSE-RU-2016:2814-1 as SUSE-SLE-WE-12-SP1-2016-1655 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1655,SUSE-SLE-SDK-12-SP1-2016-1655,SUSE-SLE-SERVER-12-SP1-2016-1655,SUSE-SLE-WE-12-SP1-2016-1655 SKIP SUSE-RU-2016:2815-1 as SUSE-SLE-WE-12-SP2-2016-1656 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1656,SUSE-SLE-RPI-12-SP2-2016-1656,SUSE-SLE-SDK-12-SP2-2016-1656,SUSE-SLE-SERVER-12-SP2-2016-1656,SUSE-SLE-WE-12-SP2-2016-1656 SKIP SUSE-RU-2016:2816-1 as SUSE-SLE-WE-12-SP2-2016-1658 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1658,SUSE-SLE-DESKTOP-12-SP2-2016-1658,SUSE-SLE-SDK-12-SP1-2016-1658,SUSE-SLE-SDK-12-SP2-2016-1658,SUSE-SLE-WE-12-SP1-2016-1658,SUSE-SLE-WE-12-SP2-2016-1658 SKIP SUSE-RU-2016:2818-1 as slehasp4-crmsh-12849 is not security or has no CVEs. patches: slehasp4-crmsh-12849 SKIP SUSE-RU-2016:2819-1 as SUSE-SLE-SERVER-12-SP2-2016-1660 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1660,SUSE-SLE-RPI-12-SP2-2016-1660,SUSE-SLE-SAP-12-SP2-2016-1660,SUSE-SLE-SERVER-12-SP2-2016-1660 SKIP SUSE-RU-2016:2820-1 as SUSE-SLE-SERVER-12-SP2-2016-1661 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1661,SUSE-SLE-RPI-12-SP2-2016-1661,SUSE-SLE-SDK-12-SP2-2016-1661,SUSE-SLE-SERVER-12-SP2-2016-1661 SKIP SUSE-RU-2016:2821-1 as SUSE-SLE-SERVER-12-SP1-2016-1663 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1663,SUSE-SLE-SDK-12-SP1-2016-1663,SUSE-SLE-SERVER-12-SP1-2016-1663 SKIP SUSE-RU-2016:2822-1 as SUSE-SLE-WE-12-SP2-2016-1665 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1665,SUSE-SLE-RPI-12-SP2-2016-1665,SUSE-SLE-SDK-12-SP2-2016-1665,SUSE-SLE-SERVER-12-SP2-2016-1665,SUSE-SLE-WE-12-SP2-2016-1665 SKIP SUSE-RU-2016:2823-1 as SUSE-SLE-SERVER-12-SP2-2016-1662 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1662,SUSE-SLE-RPI-12-SP2-2016-1662,SUSE-SLE-SDK-12-SP2-2016-1662,SUSE-SLE-SERVER-12-SP2-2016-1662 SKIP SUSE-RU-2016:2824-1 as SUSE-SLE-WE-12-SP2-2016-1666 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1666,SUSE-SLE-RPI-12-SP2-2016-1666,SUSE-SLE-SDK-12-SP2-2016-1666,SUSE-SLE-SERVER-12-SP2-2016-1666,SUSE-SLE-WE-12-SP2-2016-1666 SKIP SUSE-RU-2016:2825-1 as slessp4-yast2-core-12850 is not security or has no CVEs. patches: sdksp4-yast2-core-12850,slessp4-yast2-core-12850 SKIP SUSE-RU-2016:2826-1 as SUSE-SLE-SERVER-12-SP2-2016-1667 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1667,SUSE-SLE-RPI-12-SP2-2016-1667,SUSE-SLE-SERVER-12-SP2-2016-1667 SKIP SUSE-RU-2016:2829-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1670 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1670 SKIP SUSE-RU-2016:2846-1 as SUSE-SLE-SERVER-12-SP2-2016-1671 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1671,SUSE-SLE-RPI-12-SP2-2016-1671,SUSE-SLE-SDK-12-SP2-2016-1671,SUSE-SLE-SERVER-12-SP2-2016-1671 SKIP SUSE-RU-2016:2847-1 as SUSE-SLE-SERVER-12-SP1-2016-1672 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1672,SUSE-SLE-Module-Public-Cloud-12-2016-1672,SUSE-SLE-SERVER-12-SP1-2016-1672 SKIP SUSE-RU-2016:2858-1 as SUSE-SLE-WE-12-SP2-2016-1675 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1675,SUSE-SLE-RPI-12-SP2-2016-1675,SUSE-SLE-SDK-12-SP2-2016-1675,SUSE-SLE-SERVER-12-SP2-2016-1675,SUSE-SLE-WE-12-SP2-2016-1675 SKIP SUSE-RU-2016:2867-1 as SUSE-SLE-SERVER-12-SP2-2016-1678 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1678,SUSE-SLE-SERVER-12-SP2-2016-1678 SKIP SUSE-RU-2016:2890-1 as SUSE-SLE-WE-12-SP2-2016-1684 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1684,SUSE-SLE-DESKTOP-12-SP2-2016-1684,SUSE-SLE-SDK-12-SP2-2016-1684,SUSE-SLE-WE-12-SP1-2016-1684,SUSE-SLE-WE-12-SP2-2016-1684 SKIP SUSE-RU-2016:2892-1 as SUSE-SLE-HA-12-SP2-2016-1685 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2016-1685 SKIP SUSE-RU-2016:2897-1 as SUSE-SLE-SERVER-12-SP2-2016-1691 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1691,SUSE-SLE-RPI-12-SP2-2016-1691,SUSE-SLE-SERVER-12-SP2-2016-1691 SKIP SUSE-RU-2016:2908-1 as SUSE-SLE-SERVER-12-SP2-2016-1696 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1696,SUSE-SLE-RPI-12-SP2-2016-1696,SUSE-SLE-SERVER-12-SP2-2016-1696 SKIP SUSE-RU-2016:2909-1 as SUSE-SLE-SERVER-12-SP1-2016-1697 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1697,SUSE-SLE-SERVER-12-SP1-2016-1697 SKIP SUSE-RU-2016:2910-1 as SUSE-SLE-HA-12-2016-1695 is not security or has no CVEs. patches: SUSE-SLE-HA-12-2016-1695 SKIP SUSE-RU-2016:2914-1 as SUSE-SLE-HA-12-SP1-2016-1702 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1702 SKIP SUSE-RU-2016:2916-1 as slessp4-sg3_utils-12857 is not security or has no CVEs. patches: sdksp4-sg3_utils-12857,slessp4-sg3_utils-12857 SKIP SUSE-RU-2016:2917-1 as SUSE-SLE-HA-12-SP2-2016-1705 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2016-1705 SKIP SUSE-RU-2016:2918-1 as SUSE-SLE-HA-12-SP1-2016-1701 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1701 SKIP SUSE-RU-2016:2919-1 as SUSE-SLE-SAP-12-SP1-2016-1707 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1707,SUSE-SLE-SAP-12-SP1-2016-1707 SKIP SUSE-RU-2016:2921-1 as SUSE-SLE-SERVER-12-SP2-2016-1708 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1708,SUSE-SLE-SERVER-12-SP2-2016-1708 SKIP SUSE-RU-2016:2925-1 as SUSE-SUSE-Manager-Server-3.0-2016-1711 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1711 SKIP SUSE-RU-2016:2926-1 as SUSE-SUSE-Manager-Proxy-3.0-2016-1711 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1711 SKIP SUSE-RU-2016:2928-1 as SUSE-Storage-3-2016-1712 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1712,SUSE-SUSE-Manager-Server-3.0-2016-1712,SUSE-Storage-3-2016-1712 SKIP SUSE-RU-2016:2930-1 as SUSE-SLE-Manager-Tools-12-2016-1716 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2016-1716 SKIP SUSE-RU-2016:2931-1 as slesctsp4-client-tools-201611-12861 is not security or has no CVEs. patches: slesctsp3-client-tools-201611-12861,slesctsp4-client-tools-201611-12861 SKIP SUSE-RU-2016:2940-1 as SUSE-SLE-SAP-12-SP2-2016-1724 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2016-1724 SKIP SUSE-RU-2016:2943-1 as SUSE-SLE-SERVER-12-SP1-2016-1723 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1723,SUSE-SLE-SDK-12-SP1-2016-1723,SUSE-SLE-SERVER-12-SP1-2016-1723 SKIP SUSE-RU-2016:2955-1 as slessp4-timezone-12864 is not security or has no CVEs. patches: sdksp4-timezone-12864,sleclo50sp3-timezone-12864,sleman21-timezone-12864,slemap21-timezone-12864,sleposp3-timezone-12864,slessp2-timezone-12864,slessp3-timezone-12864,slessp4-timezone-12864 SKIP SUSE-RU-2016:2959-1 as SUSE-SLE-SERVER-12-SP2-2016-1734 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1734,SUSE-SLE-DESKTOP-12-SP2-2016-1734,SUSE-SLE-RPI-12-SP2-2016-1734,SUSE-SLE-SAP-12-2016-1734,SUSE-SLE-SERVER-12-2016-1734,SUSE-SLE-SERVER-12-SP1-2016-1734,SUSE-SLE-SERVER-12-SP2-2016-1734 SKIP SUSE-RU-2016:2963-1 as SUSE-SLE-SERVER-12-SP1-2016-1735 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1735,SUSE-SLE-SDK-12-SP1-2016-1735,SUSE-SLE-SERVER-12-SP1-2016-1735 SKIP SUSE-RU-2016:2968-1 as slessp4-aaa_base-12868 is not security or has no CVEs. patches: slessp4-aaa_base-12868 SKIP SUSE-RU-2016:2973-1 as SUSE-SLE-SERVER-12-SP2-2016-1737 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1737,SUSE-SLE-RPI-12-SP2-2016-1737,SUSE-SLE-SERVER-12-SP2-2016-1737 SKIP SUSE-RU-2016:2977-1 as SUSE-SLE-SERVER-12-SP2-2016-1746 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1746,SUSE-SLE-DESKTOP-12-SP2-2016-1746,SUSE-SLE-RPI-12-SP2-2016-1746,SUSE-SLE-SDK-12-SP1-2016-1746,SUSE-SLE-SDK-12-SP2-2016-1746,SUSE-SLE-SERVER-12-SP1-2016-1746,SUSE-SLE-SERVER-12-SP2-2016-1746 SKIP SUSE-RU-2016:2987-1 as SUSE-SLE-WE-12-SP2-2016-1747 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1747,SUSE-SLE-DESKTOP-12-SP2-2016-1747,SUSE-SLE-SDK-12-SP1-2016-1747,SUSE-SLE-SDK-12-SP2-2016-1747,SUSE-SLE-WE-12-SP1-2016-1747,SUSE-SLE-WE-12-SP2-2016-1747 SKIP SUSE-RU-2016:3012-1 as slesappsp4-sle-ha-manuals_en-12870 is not security or has no CVEs. patches: slehasp4-sle-ha-manuals_en-12870,slesappsp4-sle-ha-manuals_en-12870 SKIP SUSE-RU-2016:3017-1 as SUSE-SLE-SAP-12-SP1-2016-1757 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2016-1757 SKIP SUSE-RU-2016:3018-1 as SUSE-SLE-SAP-12-SP2-2016-1755 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2016-1755 SKIP SUSE-RU-2016:3029-1 as sleclo50sp3-sleshammer-12871 is not security or has no CVEs. patches: sleclo50sp3-sleshammer-12871 SKIP SUSE-RU-2016:3030-1 as SUSE-SLE-WE-12-SP2-2016-1761 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1761,SUSE-SLE-SDK-12-SP2-2016-1761,SUSE-SLE-WE-12-SP2-2016-1761 SKIP SUSE-RU-2016:3042-1 as SUSE-SUSE-Manager-Proxy-3.0-2016-1765 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1765 SKIP SUSE-RU-2016:3045-1 as SUSE-Storage-3-2016-1766 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1766 SKIP SUSE-RU-2016:3055-1 as SUSE-SLE-SERVER-12-SP2-2016-1778 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1778,SUSE-SLE-RPI-12-SP2-2016-1778,SUSE-SLE-SERVER-12-SP2-2016-1778 SKIP SUSE-RU-2016:3062-1 as SUSE-SLE-HA-12-SP2-2016-1780 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2016-1780 SKIP SUSE-RU-2016:3064-1 as SUSE-SLE-HA-12-SP1-2016-1783 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2016-1783 SKIP SUSE-RU-2016:3065-1 as SUSE-SLE-HA-12-SP2-2016-1784 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2016-1784 SKIP SUSE-RU-2016:3066-1 as SUSE-SLE-SERVER-12-SP2-2016-1782 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1782,SUSE-SLE-RPI-12-SP2-2016-1782,SUSE-SLE-SDK-12-SP2-2016-1782,SUSE-SLE-SERVER-12-SP2-2016-1782 SKIP SUSE-RU-2016:3070-1 as SUSE-SLE-SERVER-12-SP1-2016-1788 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1788,SUSE-SLE-SDK-12-SP1-2016-1788,SUSE-SLE-SERVER-12-SP1-2016-1788 SKIP SUSE-RU-2016:3076-1 as slessp4-dbus-1-12881 is not security or has no CVEs. patches: sdksp4-dbus-1-12881,sleclo50sp3-dbus-1-12881,sleman21-dbus-1-12881,slemap21-dbus-1-12881,sleposp3-dbus-1-12881,slessp2-dbus-1-12881,slessp3-dbus-1-12881,slessp4-dbus-1-12881 SKIP SUSE-RU-2016:3114-1 as SUSE-SLE-SAP-12-SP2-2016-1805 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2016-1805 SKIP SUSE-RU-2016:3149-1 as SUSE-OpenStack-Cloud-6-2016-1821 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1821 SKIP SUSE-RU-2016:3150-1 as SUSE-OpenStack-Cloud-6-2016-1819 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1819 SKIP SUSE-RU-2016:3151-1 as SUSE-OpenStack-Cloud-6-2016-1823 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1823 SKIP SUSE-RU-2016:3152-1 as SUSE-OpenStack-Cloud-6-2016-1820 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1820 SKIP SUSE-RU-2016:3153-1 as SUSE-OpenStack-Cloud-6-2016-1822 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1822 SKIP SUSE-RU-2016:3154-1 as SUSE-Storage-2.1-2016-1817 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1817,SUSE-Storage-2.1-2016-1817 SKIP SUSE-RU-2016:3155-1 as SUSE-OpenStack-Cloud-6-2016-1818 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1818 SKIP SUSE-RU-2016:3159-1 as slessp4-xorg-x11-libXrender-12887 is not security or has no CVEs. patches: sdksp4-xorg-x11-libXrender-12887,slessp4-xorg-x11-libXrender-12887 SKIP SUSE-RU-2016:3165-1 as slessp4-tar-12890 is not security or has no CVEs. patches: slessp4-tar-12890 SKIP SUSE-RU-2016:3166-1 as SUSE-SLE-SERVER-12-SP2-2016-1831 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1831,SUSE-SLE-DESKTOP-12-SP2-2016-1831,SUSE-SLE-RPI-12-SP2-2016-1831,SUSE-SLE-SERVER-12-SP1-2016-1831,SUSE-SLE-SERVER-12-SP2-2016-1831 SKIP SUSE-RU-2016:3167-1 as SUSE-SLE-SERVER-12-SP2-2016-1833 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1833,SUSE-SLE-RPI-12-SP2-2016-1833,SUSE-SLE-SERVER-12-SP2-2016-1833 SKIP SUSE-RU-2016:3170-1 as SUSE-SLE-SERVER-12-SP2-2016-1836 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1836,SUSE-SLE-RPI-12-SP2-2016-1836,SUSE-SLE-SDK-12-SP2-2016-1836,SUSE-SLE-SERVER-12-SP2-2016-1836 SKIP SUSE-RU-2016:3171-1 as SUSE-OpenStack-Cloud-6-2016-1837 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1837 SKIP SUSE-RU-2016:3173-1 as SUSE-Storage-4-2016-1835 is not security or has no CVEs. patches: SUSE-Storage-4-2016-1835 SKIP SUSE-RU-2016:3175-1 as SUSE-Storage-3-2016-1840 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1840 SKIP SUSE-RU-2016:3176-1 as SUSE-SLE-SERVER-12-SP2-2016-1841 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1841,SUSE-SLE-DESKTOP-12-SP2-2016-1841,SUSE-SLE-RPI-12-SP2-2016-1841,SUSE-SLE-SERVER-12-SP1-2016-1841,SUSE-SLE-SERVER-12-SP2-2016-1841 SKIP SUSE-RU-2016:3187-1 as SUSE-SLE-SERVER-12-2016-1844 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2016-1844 SKIP SUSE-RU-2016:3190-1 as SUSE-SLE-HA-12-SP2-2016-1846 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2016-1846 SKIP SUSE-RU-2016:3192-1 as SUSE-SLE-SERVER-12-SP1-2016-1850 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1850,SUSE-SLE-SERVER-12-SP1-2016-1850 SKIP SUSE-RU-2016:3194-1 as SUSE-SUSE-Manager-Server-3.0-2016-1854 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2016-1854 SKIP SUSE-RU-2016:3200-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1859 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1859 SKIP SUSE-RU-2016:3204-1 as SUSE-SLE-SERVER-12-SP2-2016-1863 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1863,SUSE-SLE-DESKTOP-12-SP2-2016-1863,SUSE-SLE-RPI-12-SP2-2016-1863,SUSE-SLE-SDK-12-SP1-2016-1863,SUSE-SLE-SDK-12-SP2-2016-1863,SUSE-SLE-SERVER-12-SP1-2016-1863,SUSE-SLE-SERVER-12-SP2-2016-1863 SKIP SUSE-RU-2016:3213-1 as SUSE-Storage-4-2016-1872 is not security or has no CVEs. patches: SUSE-Storage-4-2016-1872 SKIP SUSE-RU-2016:3216-1 as SUSE-Storage-3-2016-1873 is not security or has no CVEs. patches: SUSE-Storage-3-2016-1873 SKIP SUSE-RU-2016:3219-1 as SUSE-OpenStack-Cloud-6-2016-1875 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2016-1875 SKIP SUSE-RU-2016:3225-1 as SUSE-SLE-SERVER-12-SP1-2016-1882 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1882 SKIP SUSE-RU-2016:3229-1 as sleclo50sp3-openstack-heat-templates-12908 is not security or has no CVEs. patches: sleclo50sp3-openstack-heat-templates-12908 SKIP SUSE-RU-2016:3234-1 as SUSE-SLE-SERVER-12-SP2-2016-1883 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1883,SUSE-SLE-DESKTOP-12-SP2-2016-1883,SUSE-SLE-RPI-12-SP2-2016-1883,SUSE-SLE-SERVER-12-SP1-2016-1883,SUSE-SLE-SERVER-12-SP2-2016-1883 SKIP SUSE-RU-2016:3242-1 as SUSE-SLE-Live-Patching-12-2016-1887 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2016-1887 SKIP SUSE-RU-2016:3243-1 as SUSE-SLE-Module-Web-Scripting-12-2016-1888 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2016-1888 SKIP SUSE-RU-2016:3244-1 as SUSE-SLE-Module-Toolchain-12-2016-1886 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2016-1886 SKIP SUSE-RU-2016:3245-1 as SUSE-SLE-Module-Legacy-12-2016-1889 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2016-1889 SKIP SUSE-RU-2016:3254-1 as SUSE-SLE-Module-Public-Cloud-12-2016-1903 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2016-1903 SKIP SUSE-RU-2016:3255-1 as pubclsp3-cloud-regionsrv-client-12916 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-12916 SKIP SUSE-RU-2016:3264-1 as SUSE-SLE-SERVER-12-SP2-2016-1907 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1907,SUSE-SLE-SERVER-12-SP2-2016-1907 SKIP SUSE-RU-2016:3265-1 as SUSE-SLE-SERVER-12-SP2-2016-1908 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1908,SUSE-SLE-DESKTOP-12-SP2-2016-1908,SUSE-SLE-RPI-12-SP2-2016-1908,SUSE-SLE-SDK-12-SP1-2016-1908,SUSE-SLE-SDK-12-SP2-2016-1908,SUSE-SLE-SERVER-12-SP1-2016-1908,SUSE-SLE-SERVER-12-SP2-2016-1908 SKIP SUSE-RU-2016:3274-1 as SUSE-SLE-SDK-12-SP2-2016-1919 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2016-1919 SKIP SUSE-RU-2016:3275-1 as SUSE-SLE-SERVER-12-SP2-2016-1920 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1920,SUSE-SLE-RPI-12-SP2-2016-1920,SUSE-SLE-SDK-12-SP2-2016-1920,SUSE-SLE-SERVER-12-SP2-2016-1920 SKIP SUSE-RU-2016:3283-1 as SUSE-SLE-SERVER-12-SP1-2016-1921 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2016-1921 SKIP SUSE-RU-2016:3289-1 as SUSE-SUSE-Manager-Server-3.0-2016-1925 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2016-1925,SUSE-SUSE-Manager-Server-3.0-2016-1925 SKIP SUSE-RU-2016:3290-1 as SUSE-SLE-SDK-12-SP1-2016-1927 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2016-1927 SKIP SUSE-RU-2016:3291-1 as slessp4-release-notes-sles-12922 is not security or has no CVEs. patches: slessp4-release-notes-sles-12922 SKIP SUSE-RU-2016:3292-1 as SUSE-SLE-WE-12-SP2-2016-1928 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1928,SUSE-SLE-WE-12-SP2-2016-1928 SKIP SUSE-RU-2016:3293-1 as SUSE-SLE-SERVER-12-SP2-2016-1930 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1930,SUSE-SLE-SERVER-12-SP2-2016-1930 SKIP SUSE-RU-2016:3294-1 as slessp4-hwinfo-12923 is not security or has no CVEs. patches: sdksp4-hwinfo-12923,slessp4-hwinfo-12923 SKIP SUSE-RU-2016:3295-1 as SUSE-SLE-SERVER-12-SP1-2016-1931 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2016-1931,SUSE-SLE-SDK-12-SP1-2016-1931,SUSE-SLE-SERVER-12-SP1-2016-1931 SKIP SUSE-RU-2016:3305-1 as SUSE-SLE-SERVER-12-SP2-2016-1940 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2016-1940,SUSE-SLE-SDK-12-SP1-2016-1940,SUSE-SLE-SDK-12-SP2-2016-1940,SUSE-SLE-SERVER-12-SP1-2016-1940,SUSE-SLE-SERVER-12-SP2-2016-1940 SKIP SUSE-RU-2016:3306-1 as SUSE-SLE-SERVER-12-SP2-2016-1941 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2016-1941,SUSE-SLE-RPI-12-SP2-2016-1941,SUSE-SLE-SERVER-12-SP2-2016-1941 SKIP SUSE-RU-2017:0010-1 as slessp4-zypper-12926 is not security or has no CVEs. patches: sdksp4-zypper-12926,sleclo50sp3-zypper-12926,sleman21-zypper-12926,slemap21-zypper-12926,sleposp3-zypper-12926,slessp3-zypper-12926,slessp4-zypper-12926 SKIP SUSE-RU-2017:0011-1 as SUSE-SLE-WE-12-SP2-2017-5 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-5,SUSE-SLE-DESKTOP-12-SP2-2017-5,SUSE-SLE-RPI-12-SP2-2017-5,SUSE-SLE-SDK-12-SP1-2017-5,SUSE-SLE-SDK-12-SP2-2017-5,SUSE-SLE-SERVER-12-SP1-2017-5,SUSE-SLE-SERVER-12-SP2-2017-5,SUSE-SLE-WE-12-SP1-2017-5,SUSE-SLE-WE-12-SP2-2017-5 SKIP SUSE-RU-2017:0013-1 as SUSE-SLE-SERVER-12-SP2-2017-6 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-6,SUSE-SLE-RPI-12-SP2-2017-6,SUSE-SLE-SDK-12-SP2-2017-6,SUSE-SLE-SERVER-12-SP2-2017-6 SKIP SUSE-RU-2017:0018-1 as SUSE-SLE-HA-12-SP1-2017-10 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2017-10 SKIP SUSE-RU-2017:0019-1 as SUSE-SLE-SERVER-12-SP2-2017-9 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-9,SUSE-SLE-RPI-12-SP2-2017-9,SUSE-SLE-SDK-12-SP2-2017-9,SUSE-SLE-SERVER-12-SP2-2017-9 SKIP SUSE-RU-2017:0024-1 as SUSE-SLE-SERVER-12-SP1-2017-11 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-11,SUSE-SLE-SERVER-12-SP1-2017-11 SKIP SUSE-RU-2017:0029-1 as slessp4-irqbalance-12928 is not security or has no CVEs. patches: slessp4-irqbalance-12928 SKIP SUSE-RU-2017:0030-1 as SUSE-SLE-SERVER-12-SP1-2017-16 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-16,SUSE-SLE-SERVER-12-SP1-2017-16 SKIP SUSE-RU-2017:0031-1 as SUSE-SLE-SERVER-12-SP2-2017-15 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-15,SUSE-SLE-RPI-12-SP2-2017-15,SUSE-SLE-SERVER-12-SP2-2017-15 SKIP SUSE-RU-2017:0032-1 as SUSE-SLE-SERVER-12-SP1-2017-19 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-19,SUSE-SLE-SAP-12-SP1-2017-19,SUSE-SLE-SDK-12-SP1-2017-19,SUSE-SLE-SERVER-12-SP1-2017-19 SKIP SUSE-RU-2017:0033-1 as SUSE-SLE-SERVER-12-SP1-2017-18 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-18,SUSE-SLE-SAP-12-2017-18,SUSE-SLE-SERVER-12-2017-18,SUSE-SLE-SERVER-12-SP1-2017-18 SKIP SUSE-RU-2017:0036-1 as SUSE-SLE-Module-Containers-12-2017-20 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2017-20 SKIP SUSE-RU-2017:0037-1 as SUSE-SLE-SERVER-12-SP2-2017-22 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-22,SUSE-SLE-DESKTOP-12-SP2-2017-22,SUSE-SLE-RPI-12-SP2-2017-22,SUSE-SLE-SERVER-12-SP1-2017-22,SUSE-SLE-SERVER-12-SP2-2017-22 SKIP SUSE-RU-2017:0039-1 as SUSE-Storage-4-2017-23 is not security or has no CVEs. patches: SUSE-Storage-4-2017-23 SKIP SUSE-RU-2017:0040-1 as SUSE-SLE-SERVER-12-SP2-2017-24 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-24,SUSE-SLE-DESKTOP-12-SP2-2017-24,SUSE-SLE-RPI-12-SP2-2017-24,SUSE-SLE-SERVER-12-SP1-2017-24,SUSE-SLE-SERVER-12-SP2-2017-24 SKIP SUSE-RU-2017:0041-1 as SUSE-SLE-SERVER-12-SP2-2017-26 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-26,SUSE-SLE-RPI-12-SP2-2017-26,SUSE-SLE-SERVER-12-SP2-2017-26 SKIP SUSE-RU-2017:0042-1 as SUSE-SLE-SERVER-12-SP2-2017-25 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-25,SUSE-SLE-DESKTOP-12-SP2-2017-25,SUSE-SLE-RPI-12-SP2-2017-25,SUSE-SLE-SERVER-12-SP1-2017-25,SUSE-SLE-SERVER-12-SP2-2017-25 SKIP SUSE-RU-2017:0085-1 as SUSE-SLE-SERVER-12-SP1-2017-31 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-31,SUSE-SLE-SERVER-12-SP1-2017-31 SKIP SUSE-RU-2017:0086-1 as SUSE-SLE-SERVER-12-SP2-2017-32 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-32,SUSE-SLE-DESKTOP-12-SP2-2017-32,SUSE-SLE-RPI-12-SP2-2017-32,SUSE-SLE-SERVER-12-SP1-2017-32,SUSE-SLE-SERVER-12-SP2-2017-32 SKIP SUSE-RU-2017:0087-1 as SUSE-SLE-SERVER-12-SP2-2017-35 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-35,SUSE-SLE-RPI-12-SP2-2017-35,SUSE-SLE-SAP-12-SP2-2017-35,SUSE-SLE-SDK-12-SP2-2017-35,SUSE-SLE-SERVER-12-SP2-2017-35 SKIP SUSE-RU-2017:0089-1 as SUSE-SLE-Module-Containers-12-2017-36 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-36,SUSE-SLE-Module-Containers-12-2017-36 SKIP SUSE-RU-2017:0090-1 as slessp4-lvm2-12930 is not security or has no CVEs. patches: slehasp4-lvm2-12930,slessp4-lvm2-12930 SKIP SUSE-RU-2017:0091-1 as SUSE-SLE-SERVER-12-SP2-2017-33 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-33,SUSE-SLE-RPI-12-SP2-2017-33,SUSE-SLE-SERVER-12-SP2-2017-33 SKIP SUSE-RU-2017:0092-1 as SUSE-SLE-SERVER-12-SP2-2017-37 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-37,SUSE-SLE-RPI-12-SP2-2017-37,SUSE-SLE-SERVER-12-SP1-2017-37,SUSE-SLE-SERVER-12-SP2-2017-37 SKIP SUSE-RU-2017:0096-1 as SUSE-OpenStack-Cloud-6-2017-38 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-38 SKIP SUSE-RU-2017:0097-1 as SUSE-SLE-SERVER-12-SP2-2017-39 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-39,SUSE-SLE-RPI-12-SP2-2017-39,SUSE-SLE-SDK-12-SP2-2017-39,SUSE-SLE-SERVER-12-SP2-2017-39 SKIP SUSE-RU-2017:0098-1 as SUSE-SLE-Module-Public-Cloud-12-2017-41 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-41 SKIP SUSE-RU-2017:0099-1 as SUSE-SLE-SERVER-12-SP2-2017-42 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-42,SUSE-SLE-RPI-12-SP2-2017-42,SUSE-SLE-SERVER-12-SP2-2017-42 SKIP SUSE-RU-2017:0100-1 as SUSE-SLE-SERVER-12-SP2-2017-40 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-40,SUSE-SLE-RPI-12-SP2-2017-40,SUSE-SLE-SDK-12-SP2-2017-40,SUSE-SLE-SERVER-12-SP2-2017-40 SKIP SUSE-RU-2017:0105-1 as SUSE-SLE-SERVER-12-SP2-2017-47 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-47,SUSE-SLE-RPI-12-SP2-2017-47,SUSE-SLE-SDK-12-SP2-2017-47,SUSE-SLE-SERVER-12-SP2-2017-47 SKIP SUSE-RU-2017:0106-1 as SUSE-SLE-SERVER-12-SP1-2017-48 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-48,SUSE-SLE-SAP-12-2017-48,SUSE-SLE-SERVER-12-2017-48,SUSE-SLE-SERVER-12-SP1-2017-48 SKIP SUSE-RU-2017:0115-1 as SUSE-SLE-WE-12-SP2-2017-58 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-58,SUSE-SLE-DESKTOP-12-SP2-2017-58,SUSE-SLE-RPI-12-SP2-2017-58,SUSE-SLE-SERVER-12-SP1-2017-58,SUSE-SLE-SERVER-12-SP2-2017-58,SUSE-SLE-WE-12-SP1-2017-58,SUSE-SLE-WE-12-SP2-2017-58 SKIP SUSE-RU-2017:0117-1 as SUSE-SLE-SERVER-12-SP2-2017-59 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-59,SUSE-SLE-RPI-12-SP2-2017-59,SUSE-SLE-SERVER-12-SP2-2017-59 SKIP SUSE-RU-2017:0118-1 as SUSE-SLE-SERVER-12-SP2-2017-60 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-60,SUSE-SLE-RPI-12-SP2-2017-60,SUSE-SLE-SERVER-12-SP2-2017-60 SKIP SUSE-RU-2017:0119-1 as slesmtsp3-smt-12937 is not security or has no CVEs. patches: slesmtsp3-smt-12937 SKIP SUSE-RU-2017:0120-1 as SUSE-SLE-SERVER-12-SP1-2017-62 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-62,SUSE-SLE-SDK-12-SP1-2017-62,SUSE-SLE-SERVER-12-SP1-2017-62 SKIP SUSE-RU-2017:0121-1 as SUSE-Storage-2.1-2017-63 is not security or has no CVEs. patches: SUSE-Storage-2.1-2017-63 SKIP SUSE-RU-2017:0126-1 as SUSE-SLE-SERVER-12-SP2-2017-70 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-70,SUSE-SLE-RPI-12-SP2-2017-70,SUSE-SLE-SERVER-12-SP2-2017-70 SKIP SUSE-RU-2017:0129-1 as SUSE-SLE-SERVER-12-SP1-2017-71 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-71,SUSE-SLE-SERVER-12-SP1-2017-71 SKIP SUSE-RU-2017:0130-1 as SUSE-SLE-SERVER-12-SP2-2017-69 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-69,SUSE-SLE-RPI-12-SP2-2017-69,SUSE-SLE-SDK-12-SP2-2017-69,SUSE-SLE-SERVER-12-SP2-2017-69 SKIP SUSE-RU-2017:0138-1 as SUSE-SLE-WE-12-SP2-2017-73 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-73,SUSE-SLE-RPI-12-SP2-2017-73,SUSE-SLE-SDK-12-SP2-2017-73,SUSE-SLE-SERVER-12-SP2-2017-73,SUSE-SLE-WE-12-SP2-2017-73 SKIP SUSE-RU-2017:0142-1 as SUSE-SLE-Module-Public-Cloud-12-2017-74 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-74 SKIP SUSE-RU-2017:0165-1 as SUSE-SLE-SERVER-12-SP2-2017-76 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-76,SUSE-SLE-RPI-12-SP2-2017-76,SUSE-SLE-SERVER-12-SP2-2017-76 SKIP SUSE-RU-2017:0170-1 as SUSE-Storage-4-2017-78 is not security or has no CVEs. patches: SUSE-Storage-4-2017-78 SKIP SUSE-RU-2017:0172-1 as SUSE-SLE-Manager-Tools-12-2017-82 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-82 SKIP SUSE-RU-2017:0173-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-84 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-84 SKIP SUSE-RU-2017:0175-1 as SUSE-SUSE-Manager-Server-3.0-2017-82 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-82 SKIP SUSE-RU-2017:0176-1 as SUSE-SUSE-Manager-Server-3.0-2017-84 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-84 SKIP SUSE-RU-2017:0177-1 as SUSE-SLE-SERVER-12-SP2-2017-85 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-85,SUSE-SLE-RPI-12-SP2-2017-85,SUSE-SLE-SDK-12-SP2-2017-85,SUSE-SLE-SERVER-12-SP2-2017-85 SKIP SUSE-RU-2017:0179-1 as SUSE-SLE-SERVER-12-SP2-2017-86 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-86,SUSE-SLE-RPI-12-SP2-2017-86,SUSE-SLE-SERVER-12-SP2-2017-86 SKIP SUSE-RU-2017:0188-1 as SUSE-SLE-SERVER-12-SP2-2017-88 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-88,SUSE-SLE-RPI-12-SP2-2017-88,SUSE-SLE-SDK-12-SP2-2017-88,SUSE-SLE-SERVER-12-SP2-2017-88 SKIP SUSE-RU-2017:0191-1 as SUSE-SLE-WE-12-SP2-2017-91 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-91,SUSE-SLE-RPI-12-SP2-2017-91,SUSE-SLE-SDK-12-SP2-2017-91,SUSE-SLE-SERVER-12-SP2-2017-91,SUSE-SLE-WE-12-SP2-2017-91 SKIP SUSE-RU-2017:0196-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-92 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-92 SKIP SUSE-RU-2017:0197-1 as SUSE-SUSE-Manager-Server-3.0-2017-93 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-93 SKIP SUSE-RU-2017:0200-1 as slewyst13-webyast-base-12946 is not security or has no CVEs. patches: sleslms13-webyast-base-12946,slestso13-webyast-base-12946,slewyst13-webyast-base-12946 SKIP SUSE-RU-2017:0201-1 as SUSE-SLE-SERVER-12-SP2-2017-95 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-95,SUSE-SLE-DESKTOP-12-SP2-2017-95,SUSE-SLE-RPI-12-SP2-2017-95,SUSE-SLE-SERVER-12-SP1-2017-95,SUSE-SLE-SERVER-12-SP2-2017-95 SKIP SUSE-RU-2017:0202-1 as SUSE-SLE-SERVER-12-SP1-2017-94 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-94,SUSE-SLE-SERVER-12-SP1-2017-94 SKIP SUSE-RU-2017:0204-1 as SUSE-SLE-SERVER-12-SP2-2017-98 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-98,SUSE-SLE-DESKTOP-12-SP2-2017-98,SUSE-SLE-RPI-12-SP2-2017-98,SUSE-SLE-SDK-12-SP1-2017-98,SUSE-SLE-SDK-12-SP2-2017-98,SUSE-SLE-SERVER-12-SP1-2017-98,SUSE-SLE-SERVER-12-SP2-2017-98 SKIP SUSE-RU-2017:0205-1 as SUSE-SLE-SERVER-12-SP2-2017-97 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-97,SUSE-SLE-SERVER-12-SP2-2017-97 SKIP SUSE-RU-2017:0206-1 as SUSE-SLE-SDK-12-SP2-2017-100 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-100 SKIP SUSE-RU-2017:0209-1 as SUSE-SLE-WE-12-SP1-2017-102 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-102,SUSE-SLE-SDK-12-SP1-2017-102,SUSE-SLE-SERVER-12-SP1-2017-102,SUSE-SLE-WE-12-SP1-2017-102 SKIP SUSE-RU-2017:0214-1 as SUSE-SLE-SERVER-12-SP2-2017-105 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-105,SUSE-SLE-RPI-12-SP2-2017-105,SUSE-SLE-SERVER-12-SP2-2017-105 SKIP SUSE-RU-2017:0215-1 as SUSE-SLE-SERVER-12-SP1-2017-101 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-101,SUSE-SLE-SERVER-12-SP1-2017-101 SKIP SUSE-RU-2017:0224-1 as slessp4-suse-build-key-12947 is not security or has no CVEs. patches: slessp4-suse-build-key-12947 SKIP SUSE-RU-2017:0236-1 as sleclo50sp3-crowbar-barclamp-glance-12950 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-glance-12950 SKIP SUSE-RU-2017:0238-1 as sleclo50sp3-crowbar-barclamp-crowbar-12949 is not security or has no CVEs. patches: sleclo50sp3-crowbar-barclamp-crowbar-12949 SKIP SUSE-RU-2017:0239-1 as sleclo50sp3-crowbar-12951 is not security or has no CVEs. patches: sleclo50sp3-crowbar-12951 SKIP SUSE-RU-2017:0240-1 as SUSE-SLE-SERVER-12-SP2-2017-123 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-123,SUSE-SLE-RPI-12-SP2-2017-123,SUSE-SLE-SERVER-12-SP2-2017-123 SKIP SUSE-RU-2017:0241-1 as SUSE-SLE-SERVER-12-SP1-2017-122 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-122,SUSE-SLE-SERVER-12-SP1-2017-122 SKIP SUSE-RU-2017:0243-1 as slessp4-iprutils-12952 is not security or has no CVEs. patches: sdksp4-iprutils-12952,slessp4-iprutils-12952 SKIP SUSE-RU-2017:0253-1 as SUSE-SLE-SERVER-12-SP2-2017-135 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-135,SUSE-SLE-RPI-12-SP2-2017-135,SUSE-SLE-SERVER-12-SP2-2017-135 SKIP SUSE-RU-2017:0254-1 as SUSE-SLE-SERVER-12-SP2-2017-134 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-134,SUSE-SLE-SDK-12-SP1-2017-134,SUSE-SLE-SDK-12-SP2-2017-134,SUSE-SLE-SERVER-12-SP1-2017-134,SUSE-SLE-SERVER-12-SP2-2017-134 SKIP SUSE-RU-2017:0266-1 as SUSE-SLE-Module-Containers-12-2017-140 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2017-140 SKIP SUSE-RU-2017:0271-1 as SUSE-SLE-SERVER-12-SP1-2017-144 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-144,SUSE-SLE-SDK-12-SP1-2017-144,SUSE-SLE-SERVER-12-SP1-2017-144 SKIP SUSE-RU-2017:0272-1 as SUSE-SUSE-Manager-Server-3.0-2017-143 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-143,SUSE-SLE-SDK-12-SP1-2017-143,SUSE-SLE-SDK-12-SP2-2017-143,SUSE-SLE-SERVER-12-SP1-2017-143,SUSE-SLE-SERVER-12-SP2-2017-143,SUSE-SUSE-Manager-Server-3.0-2017-143 SKIP SUSE-RU-2017:0273-1 as SUSE-SLE-SERVER-12-2017-145 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-145,SUSE-SLE-SERVER-12-2017-145 SKIP SUSE-RU-2017:0274-1 as SUSE-SLE-SERVER-12-SP2-2017-146 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-146,SUSE-SLE-RPI-12-SP2-2017-146,SUSE-SLE-SERVER-12-SP2-2017-146 SKIP SUSE-RU-2017:0275-1 as SUSE-SLE-SERVER-12-SP2-2017-147 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-147,SUSE-SLE-RPI-12-SP2-2017-147,SUSE-SLE-SERVER-12-SP2-2017-147 SKIP SUSE-RU-2017:0288-1 as SUSE-SLE-SERVER-12-SP1-2017-151 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-151,SUSE-SLE-SERVER-12-SP1-2017-151 SKIP SUSE-RU-2017:0295-1 as SUSE-SLE-SERVER-12-SP1-2017-156 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-156,SUSE-SLE-SERVER-12-SP1-2017-156 SKIP SUSE-RU-2017:0299-1 as slemap21-suse-manager-proxy-21-201701-12956 is not security or has no CVEs. patches: slemap21-suse-manager-proxy-21-201701-12956 SKIP SUSE-RU-2017:0300-1 as slesctsp4-cobbler-12956 is not security or has no CVEs. patches: slesctsp3-cobbler-12956,slesctsp4-cobbler-12956 SKIP SUSE-RU-2017:0301-1 as sleman21-suse-manager-21-201701-12956 is not security or has no CVEs. patches: sleman21-suse-manager-21-201701-12956 SKIP SUSE-RU-2017:0329-1 as slessp4-star-12960 is not security or has no CVEs. patches: slessp4-star-12960 SKIP SUSE-RU-2017:0334-1 as slessp4-kexec-tools-12962 is not security or has no CVEs. patches: sdksp4-kexec-tools-12962,slessp4-kexec-tools-12962 SKIP SUSE-RU-2017:0341-1 as SUSE-SLE-SERVER-12-SP2-2017-171 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-171,SUSE-SLE-SERVER-12-SP2-2017-171 SKIP SUSE-RU-2017:0347-1 as SUSE-SLE-Live-Patching-12-2017-175 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-175 SKIP SUSE-RU-2017:0350-1 as sleposp3-POS_Image3-12964 is not security or has no CVEs. patches: sleposp3-POS_Image3-12964 SKIP SUSE-RU-2017:0351-1 as SUSE-SLE-Module-Public-Cloud-12-2017-181 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-181 SKIP SUSE-RU-2017:0352-1 as SUSE-SLE-Module-Public-Cloud-12-2017-182 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-182 SKIP SUSE-RU-2017:0353-1 as SUSE-SLE-Manager-Tools-12-2017-183 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-183 SKIP SUSE-RU-2017:0365-1 as SUSE-SLE-POS-12-SP2-2017-184 is not security or has no CVEs. patches: SUSE-SLE-POS-12-SP2-2017-184 SKIP SUSE-RU-2017:0376-1 as SUSE-SUSE-Manager-Server-3.0-2017-188 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-188,SUSE-SUSE-Manager-Server-3.0-2017-188 SKIP SUSE-RU-2017:0410-1 as SUSE-Storage-4-2017-204 is not security or has no CVEs. patches: SUSE-Storage-4-2017-204 SKIP SUSE-RU-2017:0417-1 as SUSE-SLE-SERVER-12-SP2-2017-209 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-209,SUSE-SLE-RPI-12-SP2-2017-209,SUSE-SLE-SDK-12-SP2-2017-209,SUSE-SLE-SERVER-12-SP2-2017-209 SKIP SUSE-RU-2017:0418-1 as SUSE-SLE-SERVER-12-2017-210 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-210,SUSE-SLE-SERVER-12-2017-210 SKIP SUSE-RU-2017:0423-1 as SUSE-SLE-SERVER-12-SP1-2017-215 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-215 SKIP SUSE-RU-2017:0425-1 as SUSE-SLE-SERVER-12-SP2-2017-211 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-211,SUSE-SLE-RPI-12-SP2-2017-211,SUSE-SLE-SERVER-12-SP2-2017-211 SKIP SUSE-RU-2017:0430-1 as SUSE-SLE-SERVER-12-SP1-2017-218 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-218,SUSE-SLE-HA-12-SP1-2017-218,SUSE-SLE-SDK-12-SP1-2017-218,SUSE-SLE-SERVER-12-SP1-2017-218 SKIP SUSE-RU-2017:0432-1 as slessp4-vm-install-12975 is not security or has no CVEs. patches: slessp4-vm-install-12975 SKIP SUSE-RU-2017:0438-1 as slesmtsp3-yast2-smt-12976 is not security or has no CVEs. patches: slesmtsp3-yast2-smt-12976 SKIP SUSE-RU-2017:0440-1 as slemap21-spacewalk-backend-12978 is not security or has no CVEs. patches: sleman21-spacewalk-backend-12978,slemap21-spacewalk-backend-12978 SKIP SUSE-RU-2017:0452-1 as slessp4-grub2-12981 is not security or has no CVEs. patches: slessp4-grub2-12981 SKIP SUSE-RU-2017:0454-1 as slessp4-libvirt-12984 is not security or has no CVEs. patches: sdksp4-libvirt-12984,slessp4-libvirt-12984 SKIP SUSE-RU-2017:0455-1 as sleclo50sp3-openstack-201611-12982 is not security or has no CVEs. patches: sleclo50sp3-openstack-201611-12982 SKIP SUSE-RU-2017:0457-1 as sleclo50sp3-openstack-nova-12983 is not security or has no CVEs. patches: sleclo50sp3-openstack-nova-12983 SKIP SUSE-RU-2017:0463-1 as slessp4-libusb-1_0-12986 is not security or has no CVEs. patches: sdksp4-libusb-1_0-12986,sleposp3-libusb-1_0-12986,slessp3-libusb-1_0-12986,slessp4-libusb-1_0-12986 SKIP SUSE-RU-2017:0472-1 as SUSE-Storage-4-2017-244 is not security or has no CVEs. patches: SUSE-Storage-4-2017-244 SKIP SUSE-RU-2017:0476-1 as SUSE-SLE-Module-Containers-12-2017-249 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-249,SUSE-SLE-Module-Containers-12-2017-249 SKIP SUSE-RU-2017:0478-1 as SUSE-SLE-Module-Containers-12-2017-250 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2017-250 SKIP SUSE-RU-2017:0489-1 as SUSE-SLE-WE-12-SP2-2017-252 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-252,SUSE-SLE-WE-12-SP2-2017-252 SKIP SUSE-RU-2017:0491-1 as SUSE-SLE-SERVER-12-SP2-2017-254 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-254,SUSE-SLE-SERVER-12-SP2-2017-254 SKIP SUSE-RU-2017:0492-1 as SUSE-SLE-SDK-12-SP2-2017-251 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-251 SKIP SUSE-RU-2017:0493-1 as SUSE-SLE-WE-12-SP1-2017-253 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-253,SUSE-SLE-WE-12-SP1-2017-253 SKIP SUSE-RU-2017:0503-1 as SUSE-OpenStack-Cloud-6-2017-259 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-259 SKIP SUSE-RU-2017:0505-1 as SUSE-SLE-SERVER-12-SP2-2017-258 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-258,SUSE-SLE-RPI-12-SP2-2017-258,SUSE-SLE-SERVER-12-SP1-2017-258,SUSE-SLE-SERVER-12-SP2-2017-258 SKIP SUSE-RU-2017:0520-1 as SUSE-SLE-SERVER-12-SP2-2017-261 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-261,SUSE-SLE-DESKTOP-12-SP2-2017-261,SUSE-SLE-RPI-12-SP2-2017-261,SUSE-SLE-SERVER-12-SP1-2017-261,SUSE-SLE-SERVER-12-SP2-2017-261 SKIP SUSE-RU-2017:0521-1 as SUSE-SLE-SERVER-12-SP1-2017-260 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-260 SKIP SUSE-RU-2017:0522-1 as pubclsp3-google-compute-engine-init-12995 is not security or has no CVEs. patches: pubclsp3-google-compute-engine-init-12995 SKIP SUSE-RU-2017:0524-1 as SUSE-SLE-SERVER-12-SP2-2017-271 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-271,SUSE-SLE-RPI-12-SP2-2017-271,SUSE-SLE-SERVER-12-SP2-2017-271 SKIP SUSE-RU-2017:0525-1 as slesmtsp3-smt-12996 is not security or has no CVEs. patches: slesmtsp3-smt-12996 SKIP SUSE-RU-2017:0526-1 as SUSE-SLE-Module-Public-Cloud-12-2017-270 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-270 SKIP SUSE-RU-2017:0530-1 as SUSE-SLE-WE-12-SP2-2017-274 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-274,SUSE-SLE-RPI-12-SP2-2017-274,SUSE-SLE-SDK-12-SP2-2017-274,SUSE-SLE-SERVER-12-SP2-2017-274,SUSE-SLE-WE-12-SP2-2017-274 SKIP SUSE-RU-2017:0532-1 as SUSE-Storage-4-2017-275 is not security or has no CVEs. patches: SUSE-Storage-4-2017-275 SKIP SUSE-RU-2017:0533-1 as SUSE-SLE-Module-Public-Cloud-12-2017-276 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-276 SKIP SUSE-RU-2017:0535-1 as SUSE-SLE-Live-Patching-12-2017-4111 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-4111 SKIP SUSE-RU-2017:0536-1 as SUSE-SLE-SERVER-12-2017-280 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-280,SUSE-SLE-SERVER-12-2017-280 SKIP SUSE-RU-2017:0537-1 as SUSE-SLE-Live-Patching-12-2017-286 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-286 SKIP SUSE-RU-2017:0538-1 as SUSE-SLE-Live-Patching-12-2017-287 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-287 SKIP SUSE-RU-2017:0539-1 as SUSE-SLE-Live-Patching-12-2017-285 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-285 SKIP SUSE-RU-2017:0540-1 as SUSE-SLE-SERVER-12-2017-278 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-278,SUSE-SLE-SERVER-12-2017-278 SKIP SUSE-RU-2017:0542-1 as SUSE-SLE-Live-Patching-12-2017-282 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-282 SKIP SUSE-RU-2017:0543-1 as SUSE-SLE-Live-Patching-12-2017-289 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-289 SKIP SUSE-RU-2017:0544-1 as SUSE-SLE-Live-Patching-12-2017-283 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-283 SKIP SUSE-RU-2017:0545-1 as SUSE-SLE-Live-Patching-12-2017-284 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-284 SKIP SUSE-RU-2017:0549-1 as SUSE-SLE-SERVER-12-2017-281 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-281,SUSE-SLE-SERVER-12-2017-281 SKIP SUSE-RU-2017:0550-1 as SUSE-SLE-Live-Patching-12-2017-288 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-288 SKIP SUSE-RU-2017:0551-1 as SUSE-SLE-SERVER-12-2017-279 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-279,SUSE-SLE-SERVER-12-2017-279 SKIP SUSE-RU-2017:0577-1 as SUSE-OpenStack-Cloud-6-2017-301 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-301 SKIP SUSE-RU-2017:0578-1 as SUSE-OpenStack-Cloud-6-2017-303 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-303 SKIP SUSE-RU-2017:0581-1 as SUSE-Storage-4-2017-302 is not security or has no CVEs. patches: SUSE-Storage-4-2017-302 SKIP SUSE-RU-2017:0583-1 as SUSE-SLE-WE-12-SP2-2017-305 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-305,SUSE-SLE-WE-12-SP2-2017-305 SKIP SUSE-RU-2017:0584-1 as SUSE-SLE-SERVER-12-SP2-2017-304 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-304,SUSE-SLE-RPI-12-SP2-2017-304,SUSE-SLE-SERVER-12-SP2-2017-304 SKIP SUSE-RU-2017:0591-1 as SUSE-SLE-WE-12-SP1-2017-309 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-309,SUSE-SLE-SDK-12-SP1-2017-309,SUSE-SLE-SERVER-12-SP1-2017-309,SUSE-SLE-WE-12-SP1-2017-309 SKIP SUSE-RU-2017:0592-1 as SUSE-SLE-HA-12-SP2-2017-308 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-308 SKIP SUSE-RU-2017:0593-1 as SUSE-SLE-WE-12-SP2-2017-314 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-314,SUSE-SLE-RPI-12-SP2-2017-314,SUSE-SLE-SDK-12-SP2-2017-314,SUSE-SLE-SERVER-12-SP2-2017-314,SUSE-SLE-WE-12-SP2-2017-314 SKIP SUSE-RU-2017:0600-1 as slessp4-ecryptfs-utils-13001 is not security or has no CVEs. patches: slessp4-ecryptfs-utils-13001 SKIP SUSE-RU-2017:0602-1 as SUSE-SLE-SERVER-12-SP2-2017-315 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-315,SUSE-SLE-SERVER-12-SP1-2017-315,SUSE-SLE-SERVER-12-SP2-2017-315 SKIP SUSE-RU-2017:0604-1 as SUSE-SLE-SERVER-12-SP2-2017-317 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-317,SUSE-SLE-RPI-12-SP2-2017-317,SUSE-SLE-SERVER-12-SP2-2017-317 SKIP SUSE-RU-2017:0608-1 as SUSE-OpenStack-Cloud-6-2017-328 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-328 SKIP SUSE-RU-2017:0609-1 as SUSE-OpenStack-Cloud-6-2017-327 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-327 SKIP SUSE-RU-2017:0611-1 as SUSE-Storage-3-2017-329 is not security or has no CVEs. patches: SUSE-Storage-3-2017-329 SKIP SUSE-RU-2017:0612-1 as SUSE-Storage-4-2017-330 is not security or has no CVEs. patches: SUSE-Storage-4-2017-330 SKIP SUSE-RU-2017:0617-1 as slessp4-powerpc-utils-13007 is not security or has no CVEs. patches: slessp4-powerpc-utils-13007 SKIP SUSE-RU-2017:0623-1 as SUSE-Storage-3-2017-332 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-332,SUSE-SLE-DESKTOP-12-SP2-2017-332,SUSE-SLE-RPI-12-SP2-2017-332,SUSE-SLE-SDK-12-SP1-2017-332,SUSE-SLE-SDK-12-SP2-2017-332,SUSE-SLE-SERVER-12-SP1-2017-332,SUSE-SLE-SERVER-12-SP2-2017-332,SUSE-SLE-WE-12-SP1-2017-332,SUSE-SLE-WE-12-SP2-2017-332,SUSE-Storage-3-2017-332 SKIP SUSE-RU-2017:0626-1 as SUSE-SLE-SERVER-12-SP1-2017-333 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-333,SUSE-SLE-SERVER-12-SP1-2017-333 SKIP SUSE-RU-2017:0627-1 as slessp4-sssd-13009 is not security or has no CVEs. patches: sdksp4-sssd-13009,sleclo50sp3-sssd-13009,sleman21-sssd-13009,slemap21-sssd-13009,sleposp3-sssd-13009,slessp3-sssd-13009,slessp4-sssd-13009 SKIP SUSE-RU-2017:0629-1 as SUSE-SLE-Manager-Tools-12-2017-346 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-346 SKIP SUSE-RU-2017:0630-1 as slesctsp4-salt-13016 is not security or has no CVEs. patches: slesctsp3-salt-13016,slesctsp4-salt-13016 SKIP SUSE-RU-2017:0630-2 as slesctsp3-salt-13016 is not security or has no CVEs. patches: slesctsp3-salt-13016 SKIP SUSE-RU-2017:0631-1 as SUSE-SUSE-Manager-Server-3.0-2017-348 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-348 SKIP SUSE-RU-2017:0632-1 as SUSE-SUSE-Manager-Server-3.0-2017-339 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-339,SUSE-SUSE-Manager-Server-3.0-2017-339 SKIP SUSE-RU-2017:0633-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-348 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-348 SKIP SUSE-RU-2017:0634-1 as SUSE-Storage-4-2017-347 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-347,SUSE-SLE-Module-Adv-Systems-Management-12-2017-347,SUSE-SLE-POS-12-SP2-2017-347,SUSE-SUSE-Manager-Proxy-3.0-2017-347,SUSE-SUSE-Manager-Server-3.0-2017-347,SUSE-Storage-3-2017-347,SUSE-Storage-4-2017-347 SKIP SUSE-RU-2017:0635-1 as slesctsp4-client-tools-201702-13015 is not security or has no CVEs. patches: slesctsp3-client-tools-201702-13015,slesctsp4-client-tools-201702-13015 SKIP SUSE-RU-2017:0636-1 as SUSE-SLE-SERVER-12-SP1-2017-350 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-350,SUSE-SLE-SERVER-12-SP1-2017-350 SKIP SUSE-RU-2017:0637-1 as SUSE-SLE-POS-12-SP2-2017-349 is not security or has no CVEs. patches: SUSE-SLE-POS-12-SP2-2017-349 SKIP SUSE-RU-2017:0638-1 as SUSE-SLE-WE-12-SP2-2017-351 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-351,SUSE-SLE-DESKTOP-12-SP2-2017-351,SUSE-SLE-SDK-12-SP1-2017-351,SUSE-SLE-SDK-12-SP2-2017-351,SUSE-SLE-WE-12-SP1-2017-351,SUSE-SLE-WE-12-SP2-2017-351 SKIP SUSE-RU-2017:0640-1 as SUSE-SLE-WE-12-SP2-2017-313 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-313,SUSE-SLE-SDK-12-SP2-2017-313,SUSE-SLE-WE-12-SP2-2017-313 SKIP SUSE-RU-2017:0642-1 as slessp4-timezone-13018 is not security or has no CVEs. patches: sdksp4-timezone-13018,sleclo50sp3-timezone-13018,sleman21-timezone-13018,slemap21-timezone-13018,sleposp3-timezone-13018,slessp3-timezone-13018,slessp4-timezone-13018 SKIP SUSE-RU-2017:0643-1 as SUSE-SLE-SERVER-12-SP2-2017-354 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-354,SUSE-SLE-DESKTOP-12-SP1-2017-354,SUSE-SLE-DESKTOP-12-SP2-2017-354,SUSE-SLE-RPI-12-SP2-2017-354,SUSE-SLE-SAP-12-2017-354,SUSE-SLE-SERVER-12-2017-354,SUSE-SLE-SERVER-12-SP1-2017-354,SUSE-SLE-SERVER-12-SP2-2017-354 SKIP SUSE-RU-2017:0645-1 as SUSE-SLE-SERVER-12-SP2-2017-356 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-356,SUSE-SLE-RPI-12-SP2-2017-356,SUSE-SLE-SDK-12-SP2-2017-356,SUSE-SLE-SERVER-12-SP2-2017-356 SKIP SUSE-RU-2017:0646-1 as SUSE-SLE-SERVER-12-SP2-2017-357 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-357,SUSE-SLE-DESKTOP-12-SP2-2017-357,SUSE-SLE-RPI-12-SP2-2017-357,SUSE-SLE-SDK-12-SP1-2017-357,SUSE-SLE-SDK-12-SP2-2017-357,SUSE-SLE-SERVER-12-SP1-2017-357,SUSE-SLE-SERVER-12-SP2-2017-357 SKIP SUSE-RU-2017:0651-1 as SUSE-OpenStack-Cloud-6-2017-360 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-360 SKIP SUSE-RU-2017:0658-1 as SUSE-SLE-SERVER-12-SP1-2017-361 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-361 SKIP SUSE-RU-2017:0659-1 as SUSE-SLE-SERVER-12-SP2-2017-362 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-362,SUSE-SLE-SERVER-12-SP2-2017-362 SKIP SUSE-RU-2017:0660-1 as SUSE-SLE-SERVER-12-SP2-2017-364 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-364,SUSE-SLE-RPI-12-SP2-2017-364,SUSE-SLE-SDK-12-SP2-2017-364,SUSE-SLE-SERVER-12-SP2-2017-364 SKIP SUSE-RU-2017:0662-1 as SUSE-SLE-SERVER-12-SP2-2017-365 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-365,SUSE-SLE-RPI-12-SP2-2017-365,SUSE-SLE-SDK-12-SP2-2017-365,SUSE-SLE-SERVER-12-SP2-2017-365 SKIP SUSE-RU-2017:0672-1 as SUSE-SLE-Module-Public-Cloud-12-2017-367 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-367 SKIP SUSE-RU-2017:0683-1 as SUSE-SLE-Module-Public-Cloud-12-2017-369 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-369,SUSE-SLE-Module-Public-Cloud-12-2017-369 SKIP SUSE-RU-2017:0684-1 as SUSE-SUSE-Manager-Server-3.0-2017-370 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-370 SKIP SUSE-RU-2017:0685-1 as pubclsp3-cloud-regionsrv-client-13022 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-13022 SKIP SUSE-RU-2017:0686-1 as SUSE-SLE-SERVER-12-SP2-2017-372 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-372,SUSE-SLE-RPI-12-SP2-2017-372,SUSE-SLE-SDK-12-SP2-2017-372,SUSE-SLE-SERVER-12-SP2-2017-372 SKIP SUSE-RU-2017:0691-1 as SUSE-SLE-SERVER-12-SP2-2017-373 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-373,SUSE-SLE-RPI-12-SP2-2017-373,SUSE-SLE-SDK-12-SP2-2017-373,SUSE-SLE-SERVER-12-SP2-2017-373 SKIP SUSE-RU-2017:0692-1 as SUSE-SLE-SERVER-12-2017-375 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-375,SUSE-SLE-SERVER-12-2017-375 SKIP SUSE-RU-2017:0693-1 as SUSE-SLE-SERVER-12-SP1-2017-374 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-374,SUSE-SLE-SDK-12-SP1-2017-374,SUSE-SLE-SERVER-12-SP1-2017-374 SKIP SUSE-RU-2017:0697-1 as SUSE-SLE-SERVER-12-SP2-2017-379 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-379,SUSE-SLE-RPI-12-SP2-2017-379,SUSE-SLE-SDK-12-SP2-2017-379,SUSE-SLE-SERVER-12-SP2-2017-379 SKIP SUSE-RU-2017:0698-1 as pubclsp3-python-azure-agent-13023 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-13023 SKIP SUSE-RU-2017:0700-1 as SUSE-SLE-Module-Public-Cloud-12-2017-380 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-380 SKIP SUSE-RU-2017:0704-1 as slessp4-nautilus-13025 is not security or has no CVEs. patches: sdksp4-nautilus-13025,slessp4-nautilus-13025 SKIP SUSE-RU-2017:0709-1 as SUSE-SLE-SERVER-12-SP2-2017-389 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-389,SUSE-SLE-DESKTOP-12-SP2-2017-389,SUSE-SLE-RPI-12-SP2-2017-389,SUSE-SLE-SDK-12-SP2-2017-389,SUSE-SLE-SERVER-12-SP2-2017-389 SKIP SUSE-RU-2017:0710-1 as SUSE-SLE-WE-12-SP2-2017-388 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-388,SUSE-SLE-RPI-12-SP2-2017-388,SUSE-SLE-SDK-12-SP2-2017-388,SUSE-SLE-SERVER-12-SP2-2017-388,SUSE-SLE-WE-12-SP2-2017-388 SKIP SUSE-RU-2017:0712-1 as sleman21-release-notes-susemanager-13026 is not security or has no CVEs. patches: sleman21-release-notes-susemanager-13026 SKIP SUSE-RU-2017:0721-1 as SUSE-SLE-RT-12-SP2-2017-399 is not security or has no CVEs. patches: SUSE-SLE-RT-12-SP2-2017-399 SKIP SUSE-RU-2017:0722-1 as SUSE-SLE-SERVER-12-SP2-2017-404 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-404,SUSE-SLE-DESKTOP-12-SP2-2017-404,SUSE-SLE-RPI-12-SP2-2017-404,SUSE-SLE-SERVER-12-SP2-2017-404 SKIP SUSE-RU-2017:0725-1 as slessp4-release-notes-sles-13031 is not security or has no CVEs. patches: slessp4-release-notes-sles-13031 SKIP SUSE-RU-2017:0727-1 as SUSE-SLE-SERVER-12-SP2-2017-403 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-403,SUSE-SLE-DESKTOP-12-SP2-2017-403,SUSE-SLE-RPI-12-SP2-2017-403,SUSE-SLE-SERVER-12-SP1-2017-403,SUSE-SLE-SERVER-12-SP2-2017-403 SKIP SUSE-RU-2017:0734-1 as SUSE-SLE-SERVER-12-SP2-2017-411 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-411,SUSE-SLE-DESKTOP-12-SP2-2017-411,SUSE-SLE-RPI-12-SP2-2017-411,SUSE-SLE-SERVER-12-SP1-2017-411,SUSE-SLE-SERVER-12-SP2-2017-411 SKIP SUSE-RU-2017:0736-1 as SUSE-Storage-4-2017-412 is not security or has no CVEs. patches: SUSE-Storage-4-2017-412 SKIP SUSE-RU-2017:0755-1 as SUSE-SLE-SERVER-12-SP1-2017-414 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-414,SUSE-SLE-SERVER-12-SP1-2017-414 SKIP SUSE-RU-2017:0756-1 as SUSE-SLE-SERVER-12-SP2-2017-415 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-415,SUSE-SLE-SERVER-12-SP2-2017-415 SKIP SUSE-RU-2017:0782-1 as SUSE-SLE-SERVER-12-SP2-2017-439 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-439,SUSE-SLE-DESKTOP-12-SP1-2017-439,SUSE-SLE-DESKTOP-12-SP2-2017-439,SUSE-SLE-RPI-12-SP2-2017-439,SUSE-SLE-SERVER-12-SP1-2017-439,SUSE-SLE-SERVER-12-SP2-2017-439 SKIP SUSE-RU-2017:0783-1 as SUSE-SLE-SERVER-12-SP2-2017-440 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-440,SUSE-SLE-SDK-12-SP1-2017-440,SUSE-SLE-SDK-12-SP2-2017-440,SUSE-SLE-SERVER-12-SP1-2017-440,SUSE-SLE-SERVER-12-SP2-2017-440 SKIP SUSE-RU-2017:0784-1 as SUSE-SLE-SERVER-12-SP2-2017-441 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-441,SUSE-SLE-RPI-12-SP2-2017-441,SUSE-SLE-SDK-12-SP1-2017-441,SUSE-SLE-SDK-12-SP2-2017-441,SUSE-SLE-SERVER-12-SP1-2017-441,SUSE-SLE-SERVER-12-SP2-2017-441 SKIP SUSE-RU-2017:0785-1 as SUSE-SLE-Live-Patching-12-2017-442 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-442 SKIP SUSE-RU-2017:0787-1 as SUSE-SLE-SERVER-12-SP2-2017-444 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-444,SUSE-SLE-DESKTOP-12-SP2-2017-444,SUSE-SLE-RPI-12-SP2-2017-444,SUSE-SLE-SDK-12-SP2-2017-444,SUSE-SLE-SERVER-12-SP2-2017-444 SKIP SUSE-RU-2017:0788-1 as SUSE-SLE-SERVER-12-SP2-2017-445 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-445,SUSE-SLE-DESKTOP-12-SP2-2017-445,SUSE-SLE-RPI-12-SP2-2017-445,SUSE-SLE-SERVER-12-SP1-2017-445,SUSE-SLE-SERVER-12-SP2-2017-445 SKIP SUSE-RU-2017:0794-1 as SUSE-SLE-WE-12-SP2-2017-448 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-448,SUSE-SLE-DESKTOP-12-SP1-2017-448,SUSE-SLE-DESKTOP-12-SP2-2017-448,SUSE-SLE-RPI-12-SP2-2017-448,SUSE-SLE-SDK-12-SP1-2017-448,SUSE-SLE-SDK-12-SP2-2017-448,SUSE-SLE-SERVER-12-SP1-2017-448,SUSE-SLE-SERVER-12-SP2-2017-448,SUSE-SLE-WE-12-SP1-2017-448,SUSE-SLE-WE-12-SP2-2017-448 SKIP SUSE-RU-2017:0795-1 as SUSE-SLE-SERVER-12-SP2-2017-447 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-447,SUSE-SLE-DESKTOP-12-SP2-2017-447,SUSE-SLE-RPI-12-SP2-2017-447,SUSE-SLE-SDK-12-SP1-2017-447,SUSE-SLE-SDK-12-SP2-2017-447,SUSE-SLE-SERVER-12-SP1-2017-447,SUSE-SLE-SERVER-12-SP2-2017-447 SKIP SUSE-RU-2017:0796-1 as SUSE-SLE-SERVER-12-SP2-2017-446 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-446,SUSE-SLE-DESKTOP-12-SP2-2017-446,SUSE-SLE-Module-Web-Scripting-12-2017-446,SUSE-SLE-RPI-12-SP2-2017-446,SUSE-SLE-SAP-12-2017-446,SUSE-SLE-SDK-12-SP1-2017-446,SUSE-SLE-SDK-12-SP2-2017-446,SUSE-SLE-SERVER-12-2017-446,SUSE-SLE-SERVER-12-SP1-2017-446,SUSE-SLE-SERVER-12-SP2-2017-446 SKIP SUSE-RU-2017:0802-1 as sleclo50sp3-haproxy-13036 is not security or has no CVEs. patches: sleclo50sp3-haproxy-13036 SKIP SUSE-RU-2017:0803-1 as SUSE-SLE-SERVER-12-SP2-2017-457 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-457,SUSE-SLE-DESKTOP-12-SP1-2017-457,SUSE-SLE-DESKTOP-12-SP2-2017-457,SUSE-SLE-RPI-12-SP2-2017-457,SUSE-SLE-SAP-12-2017-457,SUSE-SLE-SERVER-12-2017-457,SUSE-SLE-SERVER-12-SP1-2017-457,SUSE-SLE-SERVER-12-SP2-2017-457 SKIP SUSE-RU-2017:0804-1 as SUSE-SLE-SERVER-12-SP2-2017-456 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-456,SUSE-SLE-SERVER-12-SP1-2017-456,SUSE-SLE-SERVER-12-SP2-2017-456 SKIP SUSE-RU-2017:0805-1 as SUSE-SLE-SERVER-12-SP2-2017-458 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-458,SUSE-SLE-DESKTOP-12-SP1-2017-458,SUSE-SLE-DESKTOP-12-SP2-2017-458,SUSE-SLE-RPI-12-SP2-2017-458,SUSE-SLE-SERVER-12-SP1-2017-458,SUSE-SLE-SERVER-12-SP2-2017-458 SKIP SUSE-RU-2017:0806-1 as SUSE-OpenStack-Cloud-6-2017-459 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-459 SKIP SUSE-RU-2017:0807-1 as SUSE-SLE-WE-12-SP2-2017-460 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-460,SUSE-SLE-DESKTOP-12-SP2-2017-460,SUSE-SLE-WE-12-SP1-2017-460,SUSE-SLE-WE-12-SP2-2017-460 SKIP SUSE-RU-2017:0808-1 as SUSE-SLE-SERVER-12-SP2-2017-462 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-462,SUSE-SLE-DESKTOP-12-SP2-2017-462,SUSE-SLE-HA-12-SP2-2017-462,SUSE-SLE-RPI-12-SP2-2017-462,SUSE-SLE-SDK-12-SP2-2017-462,SUSE-SLE-SERVER-12-SP2-2017-462 SKIP SUSE-RU-2017:0809-1 as SUSE-SLE-WE-12-SP2-2017-461 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-461,SUSE-SLE-DESKTOP-12-SP2-2017-461,SUSE-SLE-WE-12-SP1-2017-461,SUSE-SLE-WE-12-SP2-2017-461 SKIP SUSE-RU-2017:0817-1 as SUSE-Storage-4-2017-465 is not security or has no CVEs. patches: SUSE-Storage-4-2017-465 SKIP SUSE-RU-2017:0829-1 as SUSE-SLE-SERVER-12-SP2-2017-464 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-464,SUSE-SLE-DESKTOP-12-SP2-2017-464,SUSE-SLE-RPI-12-SP2-2017-464,SUSE-SLE-SDK-12-SP2-2017-464,SUSE-SLE-SERVER-12-SP2-2017-464 SKIP SUSE-RU-2017:0838-1 as SUSE-OpenStack-Cloud-6-2017-470 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-470 SKIP SUSE-RU-2017:0840-1 as slessp4-timezone-13038 is not security or has no CVEs. patches: sdksp4-timezone-13038,sleclo50sp3-timezone-13038,sleman21-timezone-13038,slemap21-timezone-13038,sleposp3-timezone-13038,slessp3-timezone-13038,slessp4-timezone-13038 SKIP SUSE-RU-2017:0842-1 as SUSE-SLE-HA-12-SP2-2017-466 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-466 SKIP SUSE-RU-2017:0861-1 as SUSE-SLE-SERVER-12-SP1-2017-484 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-484,SUSE-SLE-SDK-12-SP1-2017-484,SUSE-SLE-SERVER-12-SP1-2017-484 SKIP SUSE-RU-2017:0863-1 as SUSE-SLE-SERVER-12-SP2-2017-483 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-483,SUSE-SLE-DESKTOP-12-SP2-2017-483,SUSE-SLE-RPI-12-SP2-2017-483,SUSE-SLE-SDK-12-SP2-2017-483,SUSE-SLE-SERVER-12-SP2-2017-483 SKIP SUSE-RU-2017:0893-1 as SUSE-SLE-SERVER-12-SP2-2017-511 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-511,SUSE-SLE-SERVER-12-SP2-2017-511 SKIP SUSE-RU-2017:0895-1 as SUSE-SLE-SERVER-12-SP1-2017-512 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-512,SUSE-SLE-HA-12-SP1-2017-512,SUSE-SLE-SDK-12-SP1-2017-512,SUSE-SLE-SERVER-12-SP1-2017-512 SKIP SUSE-RU-2017:0896-1 as SUSE-SLE-SERVER-12-SP1-2017-516 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-516 SKIP SUSE-RU-2017:0898-1 as SUSE-SLE-SERVER-INSTALLER-12-SP2-2017-517 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-INSTALLER-12-SP2-2017-517,SUSE-SLE-RPI-INSTALLER-12-SP2-2017-517,SUSE-SLE-SAP-INSTALLER-12-SP2-2017-517,SUSE-SLE-SERVER-INSTALLER-12-SP2-2017-517 SKIP SUSE-RU-2017:0904-1 as SUSE-SLE-WE-12-SP2-2017-519 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-519,SUSE-SLE-RPI-12-SP2-2017-519,SUSE-SLE-SDK-12-SP2-2017-519,SUSE-SLE-SERVER-12-SP2-2017-519,SUSE-SLE-WE-12-SP2-2017-519 SKIP SUSE-RU-2017:0905-1 as SUSE-SLE-WE-12-SP2-2017-518 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-518,SUSE-SLE-WE-12-SP2-2017-518 SKIP SUSE-RU-2017:0915-1 as SUSE-SLE-HA-12-SP2-2017-529 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-529 SKIP SUSE-RU-2017:0930-1 as SUSE-SLE-SERVER-12-2017-538 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-538,SUSE-SLE-SERVER-12-2017-538 SKIP SUSE-RU-2017:0931-1 as slessp4-libzypp-13050 is not security or has no CVEs. patches: sdksp4-libzypp-13050,sleclo50sp3-libzypp-13050,sleman21-libzypp-13050,slemap21-libzypp-13050,sleposp3-libzypp-13050,slessp3-libzypp-13050,slessp4-libzypp-13050 SKIP SUSE-RU-2017:0936-1 as SUSE-SLE-WE-12-SP2-2017-541 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-541,SUSE-SLE-DESKTOP-12-SP2-2017-541,SUSE-SLE-WE-12-SP1-2017-541,SUSE-SLE-WE-12-SP2-2017-541 SKIP SUSE-RU-2017:0943-1 as SUSE-SLE-SERVER-12-SP2-2017-540 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-540,SUSE-SLE-RPI-12-SP2-2017-540,SUSE-SLE-SERVER-12-SP2-2017-540 SKIP SUSE-RU-2017:0947-1 as SUSE-OpenStack-Cloud-6-2017-544 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-544 SKIP SUSE-RU-2017:0949-1 as SUSE-SLE-WE-12-SP2-2017-549 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-549,SUSE-SLE-RPI-12-SP2-2017-549,SUSE-SLE-SDK-12-SP2-2017-549,SUSE-SLE-SERVER-12-SP2-2017-549,SUSE-SLE-WE-12-SP2-2017-549 SKIP SUSE-RU-2017:0952-1 as SUSE-SLE-WE-12-SP2-2017-553 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-553,SUSE-SLE-RPI-12-SP2-2017-553,SUSE-SLE-SDK-12-SP2-2017-553,SUSE-SLE-SERVER-12-SP2-2017-553,SUSE-SLE-WE-12-SP2-2017-553 SKIP SUSE-RU-2017:0954-1 as SUSE-SLE-SAP-12-SP2-2017-552 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-552 SKIP SUSE-RU-2017:0960-1 as SUSE-SLE-SERVER-12-SP1-2017-555 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-555 SKIP SUSE-RU-2017:0968-1 as SUSE-SLE-SERVER-12-SP2-2017-563 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-563,SUSE-SLE-SERVER-12-SP2-2017-563 SKIP SUSE-RU-2017:0970-1 as slessp4-libssh2_org-13058 is not security or has no CVEs. patches: sdksp4-libssh2_org-13058,slessp4-libssh2_org-13058 SKIP SUSE-RU-2017:0971-1 as SUSE-OpenStack-Cloud-6-2017-566 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-566 SKIP SUSE-RU-2017:0972-1 as SUSE-SLE-SERVER-12-SP2-2017-567 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-567,SUSE-SLE-DESKTOP-12-SP2-2017-567,SUSE-SLE-RPI-12-SP2-2017-567,SUSE-SLE-SDK-12-SP2-2017-567,SUSE-SLE-SERVER-12-SP2-2017-567 SKIP SUSE-RU-2017:0978-1 as SUSE-SUSE-Manager-Server-3.0-2017-571 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-571,SUSE-OpenStack-Cloud-7-2017-571,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-571,SUSE-SLE-DESKTOP-12-SP1-2017-571,SUSE-SLE-DESKTOP-12-SP2-2017-571,SUSE-SLE-Module-Public-Cloud-12-2017-571,SUSE-SLE-RPI-12-SP2-2017-571,SUSE-SLE-SERVER-12-SP1-2017-571,SUSE-SLE-SERVER-12-SP2-2017-571,SUSE-SUSE-Manager-Proxy-3.0-2017-571,SUSE-SUSE-Manager-Server-3.0-2017-571 SKIP SUSE-RU-2017:0979-1 as SUSE-Storage-4-2017-569 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-569,SUSE-Storage-4-2017-569 SKIP SUSE-RU-2017:0981-1 as SUSE-Storage-3-2017-570 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-570,SUSE-SLE-Module-Public-Cloud-12-2017-570,SUSE-SLE12-CLOUD-5-2017-570,SUSE-Storage-3-2017-570 SKIP SUSE-RU-2017:0984-1 as SUSE-SLE-SERVER-12-SP2-2017-574 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-574,SUSE-SLE-RPI-12-SP2-2017-574,SUSE-SLE-SAP-12-SP2-2017-574,SUSE-SLE-SDK-12-SP2-2017-574,SUSE-SLE-SERVER-12-SP2-2017-574 SKIP SUSE-RU-2017:0985-1 as SUSE-SLE-SERVER-12-SP2-2017-573 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-573,SUSE-SLE-SERVER-12-SP2-2017-573 SKIP SUSE-RU-2017:0986-1 as slessp4-openslp-13059 is not security or has no CVEs. patches: sdksp4-openslp-13059,secsp3-openslp-13059,slessp4-openslp-13059 SKIP SUSE-RU-2017:0992-1 as SUSE-SLE-SERVER-12-SP2-2017-577 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-577,SUSE-SLE-RPI-12-SP2-2017-577,SUSE-SLE-SDK-12-SP2-2017-577,SUSE-SLE-SERVER-12-SP2-2017-577 SKIP SUSE-RU-2017:0995-1 as SUSE-SLE-SERVER-12-SP2-2017-578 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-578,SUSE-SLE-RPI-12-SP2-2017-578,SUSE-SLE-SERVER-12-SP2-2017-578 SKIP SUSE-RU-2017:0996-1 as SUSE-SLE-SERVER-12-SP1-2017-579 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-579,SUSE-SLE-DESKTOP-12-SP1-2017-579,SUSE-SLE-SERVER-12-SP1-2017-579 SKIP SUSE-RU-2017:0997-1 as SUSE-SLE-SERVER-12-SP2-2017-580 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-580,SUSE-SLE-DESKTOP-12-SP1-2017-580,SUSE-SLE-DESKTOP-12-SP2-2017-580,SUSE-SLE-RPI-12-SP2-2017-580,SUSE-SLE-SERVER-12-SP1-2017-580,SUSE-SLE-SERVER-12-SP2-2017-580 SKIP SUSE-RU-2017:1013-1 as slessp4-libtool-13062 is not security or has no CVEs. patches: sdksp4-libtool-13062,slessp4-libtool-13062 SKIP SUSE-RU-2017:1014-1 as SUSE-SLE-Module-Public-Cloud-12-2017-591 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-591 SKIP SUSE-RU-2017:1015-1 as SUSE-SLE-SERVER-12-SP2-2017-589 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-589,SUSE-SLE-DESKTOP-12-SP2-2017-589,SUSE-SLE-RPI-12-SP2-2017-589,SUSE-SLE-SDK-12-SP1-2017-589,SUSE-SLE-SDK-12-SP2-2017-589,SUSE-SLE-SERVER-12-SP1-2017-589,SUSE-SLE-SERVER-12-SP2-2017-589 SKIP SUSE-RU-2017:1016-1 as SUSE-SLE-SERVER-12-SP1-2017-592 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-592 SKIP SUSE-RU-2017:1017-1 as SUSE-SLE-SERVER-12-SP2-2017-593 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-593,SUSE-SLE-SERVER-12-SP2-2017-593 SKIP SUSE-RU-2017:1018-1 as SUSE-SLE-SERVER-12-SP2-2017-595 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-595,SUSE-SLE-DESKTOP-12-SP2-2017-595,SUSE-SLE-RPI-12-SP2-2017-595,SUSE-SLE-SDK-12-SP2-2017-595,SUSE-SLE-SERVER-12-SP2-2017-595 SKIP SUSE-RU-2017:1019-1 as SUSE-SLE-SAP-12-SP2-2017-594 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-594 SKIP SUSE-RU-2017:1020-1 as SUSE-Storage-4-2017-596 is not security or has no CVEs. patches: SUSE-Storage-4-2017-596 SKIP SUSE-RU-2017:1024-1 as SUSE-SLE-HA-12-SP2-2017-599 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-599 SKIP SUSE-RU-2017:1025-1 as SUSE-SLE-SERVER-12-SP2-2017-598 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-598,SUSE-SLE-DESKTOP-12-SP1-2017-598,SUSE-SLE-DESKTOP-12-SP2-2017-598,SUSE-SLE-RPI-12-SP2-2017-598,SUSE-SLE-SERVER-12-SP1-2017-598,SUSE-SLE-SERVER-12-SP2-2017-598 SKIP SUSE-RU-2017:1026-1 as SUSE-SLE-HA-12-SP1-2017-600 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2017-600 SKIP SUSE-RU-2017:1029-1 as SUSE-SLE-SERVER-12-SP1-2017-604 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-604,SUSE-SLE-SDK-12-SP1-2017-604,SUSE-SLE-SERVER-12-SP1-2017-604 SKIP SUSE-RU-2017:1036-1 as SUSE-SLE-SERVER-12-SP2-2017-603 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-603,SUSE-SLE-RPI-12-SP2-2017-603,SUSE-SLE-SDK-12-SP2-2017-603,SUSE-SLE-SERVER-12-SP2-2017-603 SKIP SUSE-RU-2017:1055-1 as SUSE-SLE-SERVER-12-SP2-2017-614 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-614,SUSE-SLE-SERVER-12-SP2-2017-614 SKIP SUSE-RU-2017:1056-1 as SUSE-SLE-SDK-12-SP2-2017-616 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-616 SKIP SUSE-RU-2017:1057-1 as SUSE-SLE-SERVER-12-SP2-2017-615 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-615,SUSE-SLE-RPI-12-SP2-2017-615,SUSE-SLE-SERVER-12-SP2-2017-615 SKIP SUSE-RU-2017:1070-1 as SUSE-SLE-SERVER-12-SP1-2017-625 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-625 SKIP SUSE-RU-2017:1082-1 as slessp4-mkinitrd-13070 is not security or has no CVEs. patches: slessp4-mkinitrd-13070 SKIP SUSE-RU-2017:1083-1 as SUSE-SLE-SERVER-12-SP2-2017-629 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-629,SUSE-SLE-RPI-12-SP2-2017-629,SUSE-SLE-SERVER-12-SP2-2017-629 SKIP SUSE-RU-2017:1089-1 as SUSE-SLE-Module-Public-Cloud-12-2017-631 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-631 SKIP SUSE-RU-2017:1090-1 as pubclsp3-python-susepubliccloudinfo-13072 is not security or has no CVEs. patches: pubclsp3-python-susepubliccloudinfo-13072 SKIP SUSE-RU-2017:1091-1 as SUSE-SLE-SERVER-12-SP2-2017-633 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-633,SUSE-SLE-SDK-12-SP2-2017-633,SUSE-SLE-SERVER-12-SP2-2017-633 SKIP SUSE-RU-2017:1097-1 as pubclsp3-cloud-regionsrv-client-13073 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-13073 SKIP SUSE-RU-2017:1101-1 as SUSE-SLE-SERVER-12-SP2-2017-641 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-641,SUSE-SLE-DESKTOP-12-SP2-2017-641,SUSE-SLE-RPI-12-SP2-2017-641,SUSE-SLE-SERVER-12-SP1-2017-641,SUSE-SLE-SERVER-12-SP2-2017-641 SKIP SUSE-RU-2017:1103-1 as SUSE-SLE-SERVER-12-SP2-2017-643 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-643,SUSE-SLE-DESKTOP-12-SP1-2017-643,SUSE-SLE-DESKTOP-12-SP2-2017-643,SUSE-SLE-RPI-12-SP2-2017-643,SUSE-SLE-SAP-12-2017-643,SUSE-SLE-SDK-12-SP1-2017-643,SUSE-SLE-SDK-12-SP2-2017-643,SUSE-SLE-SERVER-12-2017-643,SUSE-SLE-SERVER-12-SP1-2017-643,SUSE-SLE-SERVER-12-SP2-2017-643 SKIP SUSE-RU-2017:1120-1 as SUSE-SLE-SERVER-12-SP1-2017-646 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-646,SUSE-SLE-SERVER-12-SP1-2017-646 SKIP SUSE-RU-2017:1122-1 as slessp4-crash-13076 is not security or has no CVEs. patches: sdksp4-crash-13076,slessp4-crash-13076 SKIP SUSE-RU-2017:1123-1 as SUSE-SLE-SERVER-12-SP2-2017-647 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-647,SUSE-SLE-RPI-12-SP2-2017-647,SUSE-SLE-SERVER-12-SP2-2017-647 SKIP SUSE-RU-2017:1125-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2017-651 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2017-651 SKIP SUSE-RU-2017:1130-1 as SUSE-OpenStack-Cloud-6-2017-652 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-652 SKIP SUSE-RU-2017:1132-1 as SUSE-OpenStack-Cloud-6-2017-653 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-653 SKIP SUSE-RU-2017:1133-1 as SUSE-SLE-SERVER-12-SP2-2017-655 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-655,SUSE-SLE-DESKTOP-12-SP2-2017-655,SUSE-SLE-RPI-12-SP2-2017-655,SUSE-SLE-SERVER-12-SP2-2017-655 SKIP SUSE-RU-2017:1134-1 as SUSE-SLE-SERVER-12-SP2-2017-656 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-656,SUSE-SLE-DESKTOP-12-SP1-2017-656,SUSE-SLE-DESKTOP-12-SP2-2017-656,SUSE-SLE-RPI-12-SP2-2017-656,SUSE-SLE-SDK-12-SP1-2017-656,SUSE-SLE-SDK-12-SP2-2017-656,SUSE-SLE-SERVER-12-SP1-2017-656,SUSE-SLE-SERVER-12-SP2-2017-656 SKIP SUSE-RU-2017:1154-1 as SUSE-OpenStack-Cloud-7-2017-675 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-675 SKIP SUSE-RU-2017:1155-1 as SUSE-OpenStack-Cloud-7-2017-678 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-678 SKIP SUSE-RU-2017:1157-1 as SUSE-OpenStack-Cloud-7-2017-677 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-677 SKIP SUSE-RU-2017:1158-1 as SUSE-OpenStack-Cloud-7-2017-681 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-681 SKIP SUSE-RU-2017:1159-1 as SUSE-OpenStack-Cloud-6-2017-687 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-687 SKIP SUSE-RU-2017:1160-1 as SUSE-OpenStack-Cloud-6-2017-686 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-686 SKIP SUSE-RU-2017:1161-1 as SUSE-OpenStack-Cloud-7-2017-680 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-680 SKIP SUSE-RU-2017:1162-1 as SUSE-OpenStack-Cloud-7-2017-672 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-672 SKIP SUSE-RU-2017:1163-1 as SUSE-OpenStack-Cloud-7-2017-673 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-673 SKIP SUSE-RU-2017:1164-1 as SUSE-OpenStack-Cloud-7-2017-674 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-674 SKIP SUSE-RU-2017:1165-1 as SUSE-OpenStack-Cloud-6-2017-685 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-685 SKIP SUSE-RU-2017:1166-1 as SUSE-OpenStack-Cloud-7-2017-676 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-676 SKIP SUSE-RU-2017:1167-1 as SUSE-OpenStack-Cloud-6-2017-684 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-684 SKIP SUSE-RU-2017:1168-1 as SUSE-OpenStack-Cloud-7-2017-682 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-682 SKIP SUSE-RU-2017:1169-1 as SUSE-OpenStack-Cloud-6-2017-683 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-683 SKIP SUSE-RU-2017:1170-1 as SUSE-OpenStack-Cloud-7-2017-679 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-679 SKIP SUSE-RU-2017:1171-1 as slessp4-release-notes-sles-13087 is not security or has no CVEs. patches: slessp4-release-notes-sles-13087 SKIP SUSE-RU-2017:1172-1 as slessp4-boost-13088 is not security or has no CVEs. patches: sdksp4-boost-13088,slessp4-boost-13088 SKIP SUSE-RU-2017:1173-1 as SUSE-SLE-WE-12-SP2-2017-690 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-690,SUSE-SLE-SDK-12-SP2-2017-690,SUSE-SLE-WE-12-SP2-2017-690 SKIP SUSE-RU-2017:1178-1 as SUSE-SLE-SERVER-12-SP2-2017-693 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-693,SUSE-SLE-DESKTOP-12-SP2-2017-693,SUSE-SLE-RPI-12-SP2-2017-693,SUSE-SLE-SERVER-12-SP1-2017-693,SUSE-SLE-SERVER-12-SP2-2017-693 SKIP SUSE-RU-2017:1179-1 as pubclsp3-python-azure-agent-13091 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-13091 SKIP SUSE-RU-2017:1180-1 as SUSE-SLE-Module-Public-Cloud-12-2017-695 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-695 SKIP SUSE-RU-2017:1181-1 as slessp4-xorg-x11-driver-video-13092 is not security or has no CVEs. patches: slessp4-xorg-x11-driver-video-13092 SKIP SUSE-RU-2017:1184-1 as SUSE-SLE-WE-12-SP1-2017-699 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-699,SUSE-SLE-SDK-12-SP1-2017-699,SUSE-SLE-SERVER-12-SP1-2017-699,SUSE-SLE-WE-12-SP1-2017-699 SKIP SUSE-RU-2017:1185-1 as SUSE-SLE-SERVER-12-SP1-2017-700 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-700,SUSE-SLE-SERVER-12-SP1-2017-700 SKIP SUSE-RU-2017:1186-1 as SUSE-SLE-SERVER-12-SP2-2017-701 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-701,SUSE-SLE-RPI-12-SP2-2017-701,SUSE-SLE-SERVER-12-SP1-2017-701,SUSE-SLE-SERVER-12-SP2-2017-701 SKIP SUSE-RU-2017:1198-1 as SUSE-SLE-SERVER-12-SP2-2017-709 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-709,SUSE-SLE-DESKTOP-12-SP2-2017-709,SUSE-SLE-RPI-12-SP2-2017-709,SUSE-SLE-SDK-12-SP2-2017-709,SUSE-SLE-SERVER-12-SP2-2017-709 SKIP SUSE-RU-2017:1206-1 as SUSE-SLE-SERVER-12-SP2-2017-708 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-708,SUSE-SLE-RPI-12-SP2-2017-708,SUSE-SLE-SDK-12-SP2-2017-708,SUSE-SLE-SERVER-12-SP2-2017-708 SKIP SUSE-RU-2017:1207-1 as SUSE-SLE-SERVER-12-SP1-2017-707 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-707,SUSE-SLE-SDK-12-SP1-2017-707,SUSE-SLE-SERVER-12-SP1-2017-707 SKIP SUSE-RU-2017:1220-1 as SUSE-SLE-SERVER-12-SP1-2017-720 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-720,SUSE-SLE-SERVER-12-SP1-2017-720 SKIP SUSE-RU-2017:1223-1 as SUSE-SLE-SERVER-12-SP1-2017-728 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-728,SUSE-SLE-SDK-12-SP1-2017-728,SUSE-SLE-SERVER-12-SP1-2017-728 SKIP SUSE-RU-2017:1224-1 as SUSE-SLE-SERVER-12-SP2-2017-725 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-725,SUSE-SLE-RPI-12-SP2-2017-725,SUSE-SLE-SERVER-12-SP2-2017-725 SKIP SUSE-RU-2017:1225-1 as SUSE-SLE-SERVER-12-SP1-2017-727 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-727,SUSE-SLE-SERVER-12-SP1-2017-727 SKIP SUSE-RU-2017:1226-1 as SUSE-SLE-SERVER-12-2017-726 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-726,SUSE-SLE-SERVER-12-2017-726 SKIP SUSE-RU-2017:1227-1 as slessp4-SuSEfirewall2-13097 is not security or has no CVEs. patches: slessp4-SuSEfirewall2-13097 SKIP SUSE-RU-2017:1228-1 as SUSE-SLE-SERVER-12-SP2-2017-729 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-729,SUSE-SLE-SERVER-12-SP2-2017-729 SKIP SUSE-RU-2017:1231-1 as SUSE-SLE-SERVER-12-SP2-2017-732 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-732,SUSE-SLE-DESKTOP-12-SP1-2017-732,SUSE-SLE-DESKTOP-12-SP2-2017-732,SUSE-SLE-RPI-12-SP2-2017-732,SUSE-SLE-SDK-12-SP1-2017-732,SUSE-SLE-SDK-12-SP2-2017-732,SUSE-SLE-SERVER-12-SP1-2017-732,SUSE-SLE-SERVER-12-SP2-2017-732 SKIP SUSE-RU-2017:1234-1 as SUSE-SLE-SERVER-12-2017-731 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-731,SUSE-SLE-SERVER-12-2017-731 SKIP SUSE-RU-2017:1235-1 as SUSE-SLE-SERVER-12-SP2-2017-735 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-735,SUSE-SLE-DESKTOP-12-SP1-2017-735,SUSE-SLE-DESKTOP-12-SP2-2017-735,SUSE-SLE-RPI-12-SP2-2017-735,SUSE-SLE-SERVER-12-SP1-2017-735,SUSE-SLE-SERVER-12-SP2-2017-735 SKIP SUSE-RU-2017:1237-1 as slessp4-openldap2-13098 is not security or has no CVEs. patches: sdksp4-openldap2-13098,secsp3-openldap2-13098,slessp4-openldap2-13098 SKIP SUSE-RU-2017:1239-1 as SUSE-SLE-SERVER-12-SP2-2017-739 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-739,SUSE-SLE-DESKTOP-12-SP2-2017-739,SUSE-SLE-RPI-12-SP2-2017-739,SUSE-SLE-SERVER-12-SP1-2017-739,SUSE-SLE-SERVER-12-SP2-2017-739 SKIP SUSE-RU-2017:1242-1 as SUSE-SLE-Module-Public-Cloud-12-2017-741 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-741 SKIP SUSE-RU-2017:1244-1 as SUSE-SLE-SERVER-12-SP2-2017-744 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-744,SUSE-SLE-RPI-12-SP2-2017-744,SUSE-SLE-SERVER-12-SP2-2017-744 SKIP SUSE-RU-2017:1245-1 as SUSE-SLE-SERVER-12-SP1-2017-743 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-743,SUSE-SLE-SDK-12-SP1-2017-743,SUSE-SLE-SERVER-12-SP1-2017-743 SKIP SUSE-RU-2017:1246-1 as SUSE-SLE-SERVER-12-SP2-2017-742 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-742,SUSE-SLE-DESKTOP-12-SP2-2017-742,SUSE-SLE-SERVER-12-SP1-2017-742,SUSE-SLE-SERVER-12-SP2-2017-742 SKIP SUSE-RU-2017:1249-1 as SUSE-SLE-SERVER-12-SP2-2017-751 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-751,SUSE-SLE-DESKTOP-12-SP2-2017-751,SUSE-SLE-RPI-12-SP2-2017-751,SUSE-SLE-SDK-12-SP2-2017-751,SUSE-SLE-SERVER-12-SP2-2017-751 SKIP SUSE-RU-2017:1251-1 as SUSE-SLE-SERVER-12-SP2-2017-750 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-750,SUSE-SLE-DESKTOP-12-SP2-2017-750,SUSE-SLE-RPI-12-SP2-2017-750,SUSE-SLE-SERVER-12-SP1-2017-750,SUSE-SLE-SERVER-12-SP2-2017-750 SKIP SUSE-RU-2017:1252-1 as SUSE-SLE-SERVER-12-SP2-2017-745 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-2017-745 SKIP SUSE-RU-2017:1253-1 as SUSE-SLE-WE-12-SP2-2017-746 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-746,SUSE-SLE-RPI-12-SP2-2017-746,SUSE-SLE-SDK-12-SP2-2017-746,SUSE-SLE-SERVER-12-SP2-2017-746,SUSE-SLE-WE-12-SP2-2017-746 SKIP SUSE-RU-2017:1261-1 as SUSE-SLE-SERVER-12-SP1-2017-754 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-754,SUSE-SLE-SDK-12-SP1-2017-754,SUSE-SLE-SERVER-12-SP1-2017-754 SKIP SUSE-RU-2017:1262-1 as slessp4-autofs-13102 is not security or has no CVEs. patches: slessp4-autofs-13102 SKIP SUSE-RU-2017:1265-1 as SUSE-SLE-SERVER-12-SP2-2017-756 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-756,SUSE-SLE-RPI-12-SP2-2017-756,SUSE-SLE-SERVER-12-SP2-2017-756 SKIP SUSE-RU-2017:1286-1 as SUSE-SLE-SERVER-12-SP1-2017-760 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-760,SUSE-SLE-SERVER-12-SP1-2017-760 SKIP SUSE-RU-2017:1296-1 as SUSE-SLE-SERVER-12-SP2-2017-761 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-761,SUSE-SLE-DESKTOP-12-SP2-2017-761,SUSE-SLE-RPI-12-SP2-2017-761,SUSE-SLE-SERVER-12-SP2-2017-761 SKIP SUSE-RU-2017:1298-1 as SUSE-OpenStack-Cloud-7-2017-757 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-757 SKIP SUSE-RU-2017:1304-1 as SUSE-SLE-SERVER-12-SP2-2017-785 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-785,SUSE-OpenStack-Cloud-7-2017-785,SUSE-SLE-DESKTOP-12-SP1-2017-785,SUSE-SLE-DESKTOP-12-SP2-2017-785,SUSE-SLE-RPI-12-SP2-2017-785,SUSE-SLE-SERVER-12-SP1-2017-785,SUSE-SLE-SERVER-12-SP2-2017-785 SKIP SUSE-RU-2017:1307-1 as SUSE-SLE-WE-12-SP2-2017-791 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-791,SUSE-SLE-DESKTOP-12-SP2-2017-791,SUSE-SLE-RPI-12-SP2-2017-791,SUSE-SLE-SDK-12-SP2-2017-791,SUSE-SLE-SERVER-12-SP2-2017-791,SUSE-SLE-WE-12-SP2-2017-791 SKIP SUSE-RU-2017:1309-1 as SUSE-SLE-WE-12-SP1-2017-790 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-790,SUSE-SLE-SDK-12-SP1-2017-790,SUSE-SLE-SERVER-12-SP1-2017-790,SUSE-SLE-WE-12-SP1-2017-790 SKIP SUSE-RU-2017:1310-1 as SUSE-SLE-SERVER-12-SP1-2017-789 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-789,SUSE-SLE-SERVER-12-SP1-2017-789 SKIP SUSE-RU-2017:1319-1 as slessp4-vsftpd-13108 is not security or has no CVEs. patches: secsp3-vsftpd-13108,slessp4-vsftpd-13108 SKIP SUSE-RU-2017:1321-1 as SUSE-SLE-SERVER-12-SP2-2017-799 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-799,SUSE-SLE-DESKTOP-12-SP2-2017-799,SUSE-SLE-RPI-12-SP2-2017-799,SUSE-SLE-SDK-12-SP2-2017-799,SUSE-SLE-SERVER-12-SP2-2017-799 SKIP SUSE-RU-2017:1325-1 as slessp4-s390-tools-13110 is not security or has no CVEs. patches: slessp4-s390-tools-13110 SKIP SUSE-RU-2017:1329-1 as SUSE-SLE-SERVER-12-SP1-2017-807 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-807,SUSE-SLE-SERVER-12-SP1-2017-807 SKIP SUSE-RU-2017:1330-1 as SUSE-SLE-SERVER-12-SP2-2017-809 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-809,SUSE-SLE-DESKTOP-12-SP2-2017-809,SUSE-SLE-RPI-12-SP2-2017-809,SUSE-SLE-SERVER-12-SP2-2017-809 SKIP SUSE-RU-2017:1331-1 as SUSE-SLE-SERVER-12-2017-806 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-806,SUSE-SLE-SERVER-12-2017-806 SKIP SUSE-RU-2017:1332-1 as SUSE-Storage-4-2017-814 is not security or has no CVEs. patches: SUSE-Storage-4-2017-814 SKIP SUSE-RU-2017:1333-1 as SUSE-SLE-SERVER-12-SP1-2017-810 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-810,SUSE-SLE-SERVER-12-SP1-2017-810 SKIP SUSE-RU-2017:1334-1 as SUSE-SLE-WE-12-SP1-2017-812 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-812,SUSE-SLE-SDK-12-SP1-2017-812,SUSE-SLE-SERVER-12-SP1-2017-812,SUSE-SLE-WE-12-SP1-2017-812 SKIP SUSE-RU-2017:1338-1 as SUSE-SLE-WE-12-SP2-2017-811 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-811,SUSE-SLE-RPI-12-SP2-2017-811,SUSE-SLE-SDK-12-SP2-2017-811,SUSE-SLE-SERVER-12-SP2-2017-811,SUSE-SLE-WE-12-SP2-2017-811 SKIP SUSE-RU-2017:1340-1 as SUSE-SLE-SERVER-12-SP2-2017-808 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-808,SUSE-SLE-DESKTOP-12-SP2-2017-808,SUSE-SLE-RPI-12-SP2-2017-808,SUSE-SLE-SERVER-12-SP2-2017-808 SKIP SUSE-RU-2017:1341-1 as SUSE-SLE-SERVER-12-SP2-2017-817 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-817,SUSE-SLE-DESKTOP-12-SP2-2017-817,SUSE-SLE-RPI-12-SP2-2017-817,SUSE-SLE-SDK-12-SP1-2017-817,SUSE-SLE-SDK-12-SP2-2017-817,SUSE-SLE-SERVER-12-SP1-2017-817,SUSE-SLE-SERVER-12-SP2-2017-817 SKIP SUSE-RU-2017:1342-1 as SUSE-SLE-SERVER-12-2017-815 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-815,SUSE-SLE-SERVER-12-2017-815 SKIP SUSE-RU-2017:1344-1 as SUSE-SLE-SERVER-12-SP1-2017-816 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-816,SUSE-SLE-SDK-12-SP1-2017-816,SUSE-SLE-SERVER-12-SP1-2017-816 SKIP SUSE-RU-2017:1345-1 as slesctsp4-salt-13114 is not security or has no CVEs. patches: slesctsp3-salt-13114,slesctsp4-salt-13114 SKIP SUSE-RU-2017:1348-1 as SUSE-SUSE-Manager-Server-3.0-2017-828 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-828,SUSE-SUSE-Manager-Server-3.0-2017-828 SKIP SUSE-RU-2017:1350-1 as SUSE-SUSE-Manager-Server-3.0-2017-822 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-822 SKIP SUSE-RU-2017:1353-1 as SUSE-Storage-4-2017-821 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-821,SUSE-SLE-Manager-Tools-12-2017-821,SUSE-SLE-Module-Adv-Systems-Management-12-2017-821,SUSE-SLE-POS-12-SP2-2017-821,SUSE-SUSE-Manager-Proxy-3.0-2017-821,SUSE-SUSE-Manager-Server-3.0-2017-821,SUSE-Storage-3-2017-821,SUSE-Storage-4-2017-821 SKIP SUSE-RU-2017:1359-1 as slessp4-xorg-x11-libX11-13120 is not security or has no CVEs. patches: sdksp4-xorg-x11-libX11-13120,slessp4-xorg-x11-libX11-13120 SKIP SUSE-RU-2017:1369-1 as SUSE-SLE-RT-12-SP2-2017-837 is not security or has no CVEs. patches: SUSE-SLE-RT-12-SP2-2017-837 SKIP SUSE-RU-2017:1372-1 as SUSE-SLE-SERVER-12-SP2-2017-838 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-838,SUSE-SLE-DESKTOP-12-SP2-2017-838,SUSE-SLE-RPI-12-SP2-2017-838,SUSE-SLE-SDK-12-SP1-2017-838,SUSE-SLE-SDK-12-SP2-2017-838,SUSE-SLE-SERVER-12-SP1-2017-838,SUSE-SLE-SERVER-12-SP2-2017-838 SKIP SUSE-RU-2017:1373-1 as SUSE-SUSE-Manager-Server-3.0-2017-839 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-839,SUSE-SLE-RPI-12-SP2-2017-839,SUSE-SLE-SERVER-12-SP1-2017-839,SUSE-SLE-SERVER-12-SP2-2017-839,SUSE-SUSE-Manager-Proxy-3.0-2017-839,SUSE-SUSE-Manager-Server-3.0-2017-839 SKIP SUSE-RU-2017:1378-1 as SUSE-SLE-SERVER-12-SP1-2017-842 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2017-842,SUSE-SLE-SERVER-12-SP1-2017-842 SKIP SUSE-RU-2017:1380-1 as slessp4-multipath-tools-13126 is not security or has no CVEs. patches: slessp4-multipath-tools-13126 SKIP SUSE-RU-2017:1388-1 as slessp4-SuSEfirewall2-13125 is not security or has no CVEs. patches: slessp4-SuSEfirewall2-13125 SKIP SUSE-RU-2017:1394-1 as SUSE-SLE-SERVER-12-SP2-2017-856 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-856,SUSE-SLE-SERVER-12-SP1-2017-856,SUSE-SLE-SERVER-12-SP2-2017-856 SKIP SUSE-RU-2017:1397-1 as SUSE-SLE-SERVER-12-SP1-2017-863 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-863,SUSE-SLE-SDK-12-SP1-2017-863,SUSE-SLE-SERVER-12-SP1-2017-863 SKIP SUSE-RU-2017:1399-1 as SUSE-SLE-SERVER-12-SP2-2017-861 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-861,SUSE-SLE-RPI-12-SP2-2017-861,SUSE-SLE-SERVER-12-SP2-2017-861 SKIP SUSE-RU-2017:1403-1 as SUSE-SLE-SERVER-12-SP1-2017-859 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-859,SUSE-SLE-SDK-12-SP1-2017-859,SUSE-SLE-SERVER-12-SP1-2017-859 SKIP SUSE-RU-2017:1405-1 as slesmtsp3-smt-13128 is not security or has no CVEs. patches: slesmtsp3-smt-13128 SKIP SUSE-RU-2017:1406-1 as SUSE-SLE-SERVER-12-SP2-2017-858 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-858,SUSE-SLE-RPI-12-SP2-2017-858,SUSE-SLE-SERVER-12-SP2-2017-858 SKIP SUSE-RU-2017:1408-1 as SUSE-SLE-WE-12-SP2-2017-857 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-857,SUSE-SLE-DESKTOP-12-SP2-2017-857,SUSE-SLE-RPI-12-SP2-2017-857,SUSE-SLE-SDK-12-SP1-2017-857,SUSE-SLE-SDK-12-SP2-2017-857,SUSE-SLE-SERVER-12-SP1-2017-857,SUSE-SLE-SERVER-12-SP2-2017-857,SUSE-SLE-WE-12-SP1-2017-857,SUSE-SLE-WE-12-SP2-2017-857 SKIP SUSE-RU-2017:1409-1 as SUSE-SLE-SERVER-12-SP2-2017-862 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-862,SUSE-SLE-DESKTOP-12-SP2-2017-862,SUSE-SLE-RPI-12-SP2-2017-862,SUSE-SLE-SERVER-12-SP1-2017-862,SUSE-SLE-SERVER-12-SP2-2017-862 SKIP SUSE-RU-2017:1410-1 as SUSE-SLE-SERVER-12-SP2-2017-869 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-869,SUSE-SLE-DESKTOP-12-SP2-2017-869,SUSE-SLE-RPI-12-SP2-2017-869,SUSE-SLE-SERVER-12-SP1-2017-869,SUSE-SLE-SERVER-12-SP2-2017-869 SKIP SUSE-RU-2017:1416-1 as SUSE-SLE-SERVER-12-SP1-2017-871 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2017-871,SUSE-SLE-SERVER-12-SP1-2017-871 SKIP SUSE-RU-2017:1417-1 as SUSE-SLE-SERVER-12-SP2-2017-872 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-872,SUSE-SLE-DESKTOP-12-SP2-2017-872,SUSE-SLE-RPI-12-SP2-2017-872,SUSE-SLE-SERVER-12-SP1-2017-872,SUSE-SLE-SERVER-12-SP2-2017-872 SKIP SUSE-RU-2017:1418-1 as SUSE-SLE-SERVER-12-SP2-2017-870 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-870,SUSE-SLE-DESKTOP-12-SP2-2017-870,SUSE-SLE-RPI-12-SP2-2017-870,SUSE-SLE-SERVER-12-SP1-2017-870,SUSE-SLE-SERVER-12-SP2-2017-870 SKIP SUSE-RU-2017:1419-1 as SUSE-SLE-SERVER-12-SP2-2017-873 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-873,SUSE-SLE-DESKTOP-12-SP1-2017-873,SUSE-SLE-DESKTOP-12-SP2-2017-873,SUSE-SLE-RPI-12-SP2-2017-873,SUSE-SLE-SDK-12-SP1-2017-873,SUSE-SLE-SDK-12-SP2-2017-873,SUSE-SLE-SERVER-12-SP1-2017-873,SUSE-SLE-SERVER-12-SP2-2017-873 SKIP SUSE-RU-2017:1436-1 as SUSE-OpenStack-Cloud-7-2017-876 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-876 SKIP SUSE-RU-2017:1437-1 as SUSE-SLE-WE-12-SP2-2017-878 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-878,SUSE-SLE-DESKTOP-12-SP2-2017-878,SUSE-SLE-RPI-12-SP2-2017-878,SUSE-SLE-SERVER-12-SP1-2017-878,SUSE-SLE-SERVER-12-SP2-2017-878,SUSE-SLE-WE-12-SP1-2017-878,SUSE-SLE-WE-12-SP2-2017-878 SKIP SUSE-RU-2017:1438-1 as SUSE-SLE-SERVER-12-SP2-2017-877 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-877,SUSE-SLE-DESKTOP-12-SP1-2017-877,SUSE-SLE-DESKTOP-12-SP2-2017-877,SUSE-SLE-RPI-12-SP2-2017-877,SUSE-SLE-SDK-12-SP1-2017-877,SUSE-SLE-SDK-12-SP2-2017-877,SUSE-SLE-SERVER-12-SP1-2017-877,SUSE-SLE-SERVER-12-SP2-2017-877 SKIP SUSE-RU-2017:1447-1 as SUSE-SLE-SERVER-12-SP2-2017-890 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-890,SUSE-SLE-DESKTOP-12-SP2-2017-890,SUSE-SLE-RPI-12-SP2-2017-890,SUSE-SLE-SERVER-12-SP1-2017-890,SUSE-SLE-SERVER-12-SP2-2017-890 SKIP SUSE-RU-2017:1448-1 as SUSE-SLE-HA-12-SP2-2017-886 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-886 SKIP SUSE-RU-2017:1449-1 as SUSE-SLE-HA-12-SP1-2017-885 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2017-885 SKIP SUSE-RU-2017:1452-1 as SUSE-SLE-SERVER-12-SP2-2017-887 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-887,SUSE-SLE-RPI-12-SP2-2017-887,SUSE-SLE-SERVER-12-SP1-2017-887,SUSE-SLE-SERVER-12-SP2-2017-887 SKIP SUSE-RU-2017:1461-1 as SUSE-SLE-SERVER-12-SP2-2017-895 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-895,SUSE-SLE-DESKTOP-12-SP1-2017-895,SUSE-SLE-DESKTOP-12-SP2-2017-895,SUSE-SLE-RPI-12-SP2-2017-895,SUSE-SLE-SERVER-12-SP1-2017-895,SUSE-SLE-SERVER-12-SP2-2017-895 SKIP SUSE-RU-2017:1462-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2017-894 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP1-2017-894,SUSE-SLE-DESKTOP-12-SP2-2017-894,SUSE-SLE-Module-Adv-Systems-Management-12-2017-894 SKIP SUSE-RU-2017:1465-1 as SUSE-SLE-SERVER-12-SP2-2017-902 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-902,SUSE-SLE-RPI-12-SP2-2017-902,SUSE-SLE-SERVER-12-SP2-2017-902 SKIP SUSE-RU-2017:1466-1 as SUSE-SLE-SERVER-12-SP1-2017-903 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP1-2017-903,SUSE-SLE-SERVER-12-SP1-2017-903 SKIP SUSE-RU-2017:1467-1 as SUSE-SLE-SERVER-12-SP2-2017-901 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-901,SUSE-SLE-RPI-12-SP2-2017-901,SUSE-SLE-SERVER-12-SP2-2017-901 SKIP SUSE-RU-2017:1469-1 as SUSE-SLE-SERVER-12-SP1-2017-904 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-904 SKIP SUSE-RU-2017:1472-1 as SUSE-SLE-SERVER-12-SP2-2017-907 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-907,SUSE-SLE-DESKTOP-12-SP2-2017-907,SUSE-SLE-RPI-12-SP2-2017-907,SUSE-SLE-SERVER-12-SP2-2017-907 SKIP SUSE-RU-2017:1476-1 as SUSE-Storage-4-2017-909 is not security or has no CVEs. patches: SUSE-Storage-4-2017-909 SKIP SUSE-RU-2017:1477-1 as SUSE-SLE-SERVER-12-SP2-2017-908 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-908,SUSE-SLE-RPI-12-SP2-2017-908,SUSE-SLE-SDK-12-SP2-2017-908,SUSE-SLE-SERVER-12-SP2-2017-908 SKIP SUSE-RU-2017:1484-1 as SUSE-SLE-SERVER-12-SP2-2017-912 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-912,SUSE-SLE-RPI-12-SP2-2017-912,SUSE-SLE-SDK-12-SP2-2017-912,SUSE-SLE-SERVER-12-SP2-2017-912 SKIP SUSE-RU-2017:1486-1 as SUSE-SLE-SERVER-12-SP2-2017-916 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-916,SUSE-SLE-RPI-12-SP2-2017-916,SUSE-SLE-SDK-12-SP2-2017-916,SUSE-SLE-SERVER-12-SP2-2017-916 SKIP SUSE-RU-2017:1488-1 as SUSE-SLE-SERVER-12-SP2-2017-918 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-918,SUSE-SLE-DESKTOP-12-SP2-2017-918,SUSE-SLE-RPI-12-SP2-2017-918,SUSE-SLE-SDK-12-SP2-2017-918,SUSE-SLE-SERVER-12-SP2-2017-918 SKIP SUSE-RU-2017:1492-1 as SUSE-SLE-SERVER-12-SP2-2017-919 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-919,SUSE-SLE-RPI-12-SP2-2017-919,SUSE-SLE-SDK-12-SP2-2017-919,SUSE-SLE-SERVER-12-SP2-2017-919 SKIP SUSE-RU-2017:1500-1 as slessp4-tcpd-13139 is not security or has no CVEs. patches: sdksp4-tcpd-13139,slessp4-tcpd-13139 SKIP SUSE-RU-2017:1503-1 as SUSE-SLE-SERVER-12-SP2-2017-923 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-923,SUSE-SLE-RPI-12-SP2-2017-923,SUSE-SLE-SDK-12-SP2-2017-923,SUSE-SLE-SERVER-12-SP2-2017-923 SKIP SUSE-RU-2017:1508-1 as SUSE-SLE-SERVER-12-SP2-2017-926 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-926,SUSE-SLE-SERVER-12-SP2-2017-926 SKIP SUSE-RU-2017:1509-1 as SUSE-SLE-SERVER-12-SP2-2017-925 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-925,SUSE-SLE-RPI-12-SP2-2017-925,SUSE-SLE-SDK-12-SP2-2017-925,SUSE-SLE-SERVER-12-SP2-2017-925 SKIP SUSE-RU-2017:1512-1 as SUSE-SLE-WE-12-SP2-2017-928 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-928,SUSE-SLE-WE-12-SP2-2017-928 SKIP SUSE-RU-2017:1514-1 as SUSE-SLE-SERVER-12-SP2-2017-929 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-929,SUSE-SLE-RPI-12-SP2-2017-929,SUSE-SLE-SERVER-12-SP2-2017-929 SKIP SUSE-RU-2017:1517-1 as SUSE-SLE-SERVER-12-SP1-2017-924 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-924,SUSE-SLE-SERVER-12-SP1-2017-924 SKIP SUSE-RU-2017:1518-1 as SUSE-SLE-WE-12-SP2-2017-927 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-927,SUSE-SLE-WE-12-SP2-2017-927 SKIP SUSE-RU-2017:1519-1 as SUSE-SLE-SERVER-12-SP2-2017-930 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-930,SUSE-SLE-RPI-12-SP2-2017-930,SUSE-SLE-SERVER-12-SP2-2017-930 SKIP SUSE-RU-2017:1522-1 as SUSE-SLE-WE-12-SP2-2017-932 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-932,SUSE-SLE-RPI-12-SP2-2017-932,SUSE-SLE-SDK-12-SP2-2017-932,SUSE-SLE-SERVER-12-SP2-2017-932,SUSE-SLE-WE-12-SP2-2017-932 SKIP SUSE-RU-2017:1523-1 as SUSE-SLE-SERVER-12-SP2-2017-931 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-931,SUSE-SLE-RPI-12-SP2-2017-931,SUSE-SLE-SERVER-12-SP2-2017-931 SKIP SUSE-RU-2017:1524-1 as SUSE-SLE-SERVER-12-SP2-2017-934 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-934,SUSE-SLE-RPI-12-SP2-2017-934,SUSE-SLE-SERVER-12-SP2-2017-934 SKIP SUSE-RU-2017:1525-1 as SUSE-SLE-SERVER-12-SP2-2017-936 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-936,SUSE-SLE-RPI-12-SP2-2017-936,SUSE-SLE-SAP-12-2017-936,SUSE-SLE-SAP-12-SP1-2017-936,SUSE-SLE-SERVER-12-2017-936,SUSE-SLE-SERVER-12-SP1-2017-936,SUSE-SLE-SERVER-12-SP2-2017-936 SKIP SUSE-RU-2017:1526-1 as SUSE-SLE-SERVER-12-SP2-2017-933 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-933,SUSE-SLE-RPI-12-SP2-2017-933,SUSE-SLE-SDK-12-SP2-2017-933,SUSE-SLE-SERVER-12-SP2-2017-933 SKIP SUSE-RU-2017:1527-1 as SUSE-SLE-SERVER-12-SP2-2017-935 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-935,SUSE-SLE-RPI-12-SP2-2017-935,SUSE-SLE-SDK-12-SP2-2017-935,SUSE-SLE-SERVER-12-SP2-2017-935 SKIP SUSE-RU-2017:1528-1 as SUSE-SLE-SERVER-12-SP2-2017-937 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-937,SUSE-SLE-RPI-12-SP2-2017-937,SUSE-SLE-SERVER-12-SP2-2017-937 SKIP SUSE-RU-2017:1529-1 as slestso13-susestudio-13140 is not security or has no CVEs. patches: slestso13-susestudio-13140 SKIP SUSE-RU-2017:1544-1 as SUSE-SLE-WE-12-SP2-2017-940 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-940,SUSE-SLE-WE-12-SP2-2017-940 SKIP SUSE-RU-2017:1545-1 as SUSE-OpenStack-Cloud-7-2017-941 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-941 SKIP SUSE-RU-2017:1547-1 as SUSE-SLE-SERVER-12-SP2-2017-943 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-943,SUSE-SLE-RPI-12-SP2-2017-943,SUSE-SLE-SDK-12-SP2-2017-943,SUSE-SLE-SERVER-12-SP2-2017-943 SKIP SUSE-RU-2017:1548-1 as SUSE-OpenStack-Cloud-6-2017-946 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-946 SKIP SUSE-RU-2017:1549-1 as SUSE-OpenStack-Cloud-6-2017-947 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-947 SKIP SUSE-RU-2017:1550-1 as SUSE-OpenStack-Cloud-6-2017-948 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-948 SKIP SUSE-RU-2017:1552-1 as SUSE-OpenStack-Cloud-6-2017-945 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-945 SKIP SUSE-RU-2017:1553-1 as slesctsp4-client-tools-201705-13142 is not security or has no CVEs. patches: slesctsp3-client-tools-201705-13142,slesctsp4-client-tools-201705-13142 SKIP SUSE-RU-2017:1554-1 as SUSE-SLE-SERVER-12-SP2-2017-950 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-950,SUSE-SLE-RPI-12-SP2-2017-950,SUSE-SLE-SDK-12-SP2-2017-950,SUSE-SLE-SERVER-12-SP2-2017-950 SKIP SUSE-RU-2017:1555-1 as SUSE-SLE-SDK-12-SP2-2017-949 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-949 SKIP SUSE-RU-2017:1556-1 as SUSE-SLE-Manager-Tools-12-2017-953 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-953 SKIP SUSE-RU-2017:1561-1 as SUSE-OpenStack-Cloud-6-2017-956 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-956 SKIP SUSE-RU-2017:1563-1 as SUSE-SLE-WE-12-SP2-2017-961 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-961,SUSE-SLE-RPI-12-SP2-2017-961,SUSE-SLE-SDK-12-SP2-2017-961,SUSE-SLE-SERVER-12-SP2-2017-961,SUSE-SLE-WE-12-SP2-2017-961 SKIP SUSE-RU-2017:1564-1 as SUSE-SLE-SERVER-12-SP2-2017-957 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-957,SUSE-SLE-RPI-12-SP2-2017-957,SUSE-SLE-SDK-12-SP2-2017-957,SUSE-SLE-SERVER-12-SP2-2017-957 SKIP SUSE-RU-2017:1565-1 as slessp4-gcc5-13145 is not security or has no CVEs. patches: sdksp4-gcc5-13145,slessp4-gcc5-13145 SKIP SUSE-RU-2017:1566-1 as SUSE-SLE-SERVER-12-SP2-2017-959 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-959,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-959,SUSE-SLE-DESKTOP-12-SP2-2017-959,SUSE-SLE-Module-Toolchain-12-2017-959,SUSE-SLE-RPI-12-SP2-2017-959,SUSE-SLE-SAP-12-2017-959,SUSE-SLE-SAP-12-SP1-2017-959,SUSE-SLE-SERVER-12-2017-959,SUSE-SLE-SERVER-12-SP1-2017-959,SUSE-SLE-SERVER-12-SP2-2017-959 SKIP SUSE-RU-2017:1570-1 as SUSE-SLE-SERVER-12-SP2-2017-964 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-964,SUSE-SLE-SERVER-12-SP2-2017-964 SKIP SUSE-RU-2017:1578-1 as slessp4-perf-13147 is not security or has no CVEs. patches: slessp4-perf-13147 SKIP SUSE-RU-2017:1580-1 as SUSE-SLE-SERVER-12-SP2-2017-970 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-970,SUSE-SLE-RPI-12-SP2-2017-970,SUSE-SLE-SERVER-12-SP2-2017-970 SKIP SUSE-RU-2017:1590-1 as SUSE-SLE-WE-12-SP2-2017-977 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-977,SUSE-SLE-DESKTOP-12-SP2-2017-977,SUSE-SLE-RPI-12-SP2-2017-977,SUSE-SLE-SDK-12-SP2-2017-977,SUSE-SLE-SERVER-12-SP2-2017-977,SUSE-SLE-WE-12-SP2-2017-977 SKIP SUSE-RU-2017:1602-1 as pubclsp3-python-azure-agent-13154 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-13154 SKIP SUSE-RU-2017:1605-1 as SUSE-SLE-Module-Public-Cloud-12-2017-983 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-983 SKIP SUSE-RU-2017:1616-1 as SUSE-SLE-SERVER-12-SP1-2017-987 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-987,SUSE-SLE-SAP-12-SP1-2017-987,SUSE-SLE-SERVER-12-SP1-2017-987 SKIP SUSE-RU-2017:1624-1 as slessp4-biosdevname-13159 is not security or has no CVEs. patches: slessp4-biosdevname-13159 SKIP SUSE-RU-2017:1630-1 as slessp4-pure-ftpd-13161 is not security or has no CVEs. patches: slessp4-pure-ftpd-13161 SKIP SUSE-RU-2017:1631-1 as slessp4-openldap2-13163 is not security or has no CVEs. patches: sdksp4-openldap2-13163,secsp3-openldap2-13163,slessp4-openldap2-13163 SKIP SUSE-RU-2017:1634-1 as SUSE-SLE-SERVER-12-SP2-2017-1016 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1016,SUSE-SLE-RPI-12-SP2-2017-1016,SUSE-SLE-SERVER-12-SP2-2017-1016 SKIP SUSE-RU-2017:1636-1 as SUSE-SLE-SDK-12-SP2-2017-1009 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1009 SKIP SUSE-RU-2017:1637-1 as SUSE-SLE-SERVER-12-2017-1017 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-1017,SUSE-SLE-SERVER-12-2017-1017 SKIP SUSE-RU-2017:1639-1 as SUSE-SLE-SERVER-12-SP2-2017-1010 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1010,SUSE-SLE-RPI-12-SP2-2017-1010,SUSE-SLE-SERVER-12-SP2-2017-1010 SKIP SUSE-RU-2017:1640-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-1015 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1015 SKIP SUSE-RU-2017:1641-1 as sdksp4-rpmlint-13165 is not security or has no CVEs. patches: sdksp4-rpmlint-13165 SKIP SUSE-RU-2017:1643-1 as SUSE-SLE-SERVER-12-SP1-2017-1018 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1018,SUSE-SLE-SAP-12-SP1-2017-1018,SUSE-SLE-SERVER-12-SP1-2017-1018 SKIP SUSE-RU-2017:1644-1 as SUSE-SLE-SERVER-12-SP2-2017-1014 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1014,SUSE-SLE-RPI-12-SP2-2017-1014,SUSE-SLE-SERVER-12-SP2-2017-1014 SKIP SUSE-RU-2017:1645-1 as SUSE-SUSE-Manager-Server-3.0-2017-1015 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-1015 SKIP SUSE-RU-2017:1646-1 as SUSE-SLE-SERVER-12-SP2-2017-1013 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1013,SUSE-SLE-SERVER-12-SP2-2017-1013 SKIP SUSE-RU-2017:1648-1 as slessp4-rsyslog-13167 is not security or has no CVEs. patches: slessp4-rsyslog-13167 SKIP SUSE-RU-2017:1652-1 as SUSE-SLE-SERVER-12-2017-1024 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-1024,SUSE-SLE-SERVER-12-2017-1024 SKIP SUSE-RU-2017:1653-1 as SUSE-SLE-SERVER-12-SP1-2017-1023 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1023,SUSE-SLE-SERVER-12-SP1-2017-1023 SKIP SUSE-RU-2017:1657-1 as SUSE-SLE-SERVER-12-SP2-2017-1022 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1022,SUSE-SLE-DESKTOP-12-SP2-2017-1022,SUSE-SLE-RPI-12-SP2-2017-1022,SUSE-SLE-SDK-12-SP2-2017-1022,SUSE-SLE-SERVER-12-SP2-2017-1022 SKIP SUSE-RU-2017:1659-1 as SUSE-SLE-SERVER-12-SP2-2017-1025 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1025,SUSE-SLE-RPI-12-SP2-2017-1025,SUSE-SLE-SDK-12-SP2-2017-1025,SUSE-SLE-SERVER-12-SP2-2017-1025 SKIP SUSE-RU-2017:1665-1 as SUSE-SLE-SAP-12-SP2-2017-1029 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-1029 SKIP SUSE-RU-2017:1666-1 as SUSE-Storage-4-2017-1032 is not security or has no CVEs. patches: SUSE-Storage-4-2017-1032 SKIP SUSE-RU-2017:1667-1 as SUSE-SLE-SERVER-12-SP2-2017-1033 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1033,SUSE-SLE-DESKTOP-12-SP2-2017-1033,SUSE-SLE-RPI-12-SP2-2017-1033,SUSE-SLE-SDK-12-SP2-2017-1033,SUSE-SLE-SERVER-12-SP2-2017-1033 SKIP SUSE-RU-2017:1692-1 as SUSE-SLE-SERVER-12-SP2-2017-1041 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1041,SUSE-SLE-SERVER-12-SP2-2017-1041 SKIP SUSE-RU-2017:1693-1 as SUSE-SLE-SERVER-12-SP2-2017-1040 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1040,SUSE-SLE-DESKTOP-12-SP2-2017-1040,SUSE-SLE-RPI-12-SP2-2017-1040,SUSE-SLE-SDK-12-SP2-2017-1040,SUSE-SLE-SERVER-12-SP2-2017-1040 SKIP SUSE-RU-2017:1694-1 as slertesp4-bigmem-kmps-13171 is not security or has no CVEs. patches: slehasp4-bigmem-kmps-13171,slertesp4-bigmem-kmps-13171 SKIP SUSE-RU-2017:1702-1 as SUSE-SLE-SDK-12-SP2-2017-1049 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1049 SKIP SUSE-RU-2017:1710-1 as SUSE-SLE-SERVER-12-SP2-2017-1059 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1059,SUSE-SLE-SERVER-12-SP2-2017-1059 SKIP SUSE-RU-2017:1711-1 as SUSE-SLE-SDK-12-SP2-2017-1061 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1061 SKIP SUSE-RU-2017:1713-1 as SUSE-SLE-SERVER-12-SP2-2017-1064 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1064,SUSE-SLE-SDK-12-SP2-2017-1064,SUSE-SLE-SERVER-12-SP2-2017-1064 SKIP SUSE-RU-2017:1721-1 as SUSE-SUSE-Manager-Server-3.1-2017-1072 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-1072 SKIP SUSE-RU-2017:1723-1 as SUSE-SUSE-Manager-Server-3.1-2017-1071 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-1071 SKIP SUSE-RU-2017:1726-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1074 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1074,SUSE-SLE-Module-Public-Cloud-12-2017-1074 SKIP SUSE-RU-2017:1729-1 as SUSE-Storage-4-2017-1075 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1075,SUSE-OpenStack-Cloud-7-2017-1075,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1075,SUSE-SLE-HA-12-SP2-2017-1075,SUSE-SLE-Manager-Tools-12-2017-1075,SUSE-SLE-Module-Adv-Systems-Management-12-2017-1075,SUSE-SLE-Module-Containers-12-2017-1075,SUSE-SLE-Module-Public-Cloud-12-2017-1075,SUSE-SLE-POS-12-SP2-2017-1075,SUSE-SUSE-Manager-Proxy-3.0-2017-1075,SUSE-SUSE-Manager-Server-3.0-2017-1075,SUSE-Storage-3-2017-1075,SUSE-Storage-4-2017-1075 SKIP SUSE-RU-2017:1732-1 as SUSE-SLE-SAP-12-SP1-2017-1076 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1076 SKIP SUSE-RU-2017:1739-1 as SUSE-SLE-SERVER-12-SP2-2017-1082 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1082,SUSE-SLE-DESKTOP-12-SP2-2017-1082,SUSE-SLE-RPI-12-SP2-2017-1082,SUSE-SLE-SERVER-12-SP2-2017-1082 SKIP SUSE-RU-2017:1740-1 as SUSE-SLE-SERVER-12-SP2-2017-1083 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1083,SUSE-SLE-RPI-12-SP2-2017-1083,SUSE-SLE-SDK-12-SP2-2017-1083,SUSE-SLE-SERVER-12-SP2-2017-1083 SKIP SUSE-RU-2017:1761-1 as SUSE-SLE-SERVER-12-SP2-2017-1093 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1093,SUSE-SLE-RPI-12-SP2-2017-1093,SUSE-SLE-SERVER-12-SP2-2017-1093 SKIP SUSE-RU-2017:1762-1 as SUSE-SLE-SERVER-12-SP2-2017-1094 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1094,SUSE-SLE-SERVER-12-SP2-2017-1094 SKIP SUSE-RU-2017:1768-1 as SUSE-SLE-SERVER-12-SP2-2017-1099 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1099,SUSE-SLE-SERVER-12-SP2-2017-1099 SKIP SUSE-RU-2017:1784-1 as SUSE-SLE-SERVER-12-SP2-2017-1110 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1110,SUSE-SLE-RPI-12-SP2-2017-1110,SUSE-SLE-SERVER-12-SP2-2017-1110 SKIP SUSE-RU-2017:1785-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1111 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1111,SUSE-OpenStack-Cloud-7-2017-1111,SUSE-SLE-Manager-Tools-12-2017-1111,SUSE-SLE-Module-Containers-12-2017-1111,SUSE-SLE-Module-Public-Cloud-12-2017-1111 SKIP SUSE-RU-2017:1787-1 as SUSE-SLE-SERVER-12-SP2-2017-1113 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1113,SUSE-SLE-SERVER-12-SP2-2017-1113 SKIP SUSE-RU-2017:1816-1 as SUSE-SLE-SERVER-12-SP2-2017-1122 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1122,SUSE-SLE-RPI-12-SP2-2017-1122,SUSE-SLE-SERVER-12-SP2-2017-1122 SKIP SUSE-RU-2017:1817-1 as slessp4-yast2-ldap-client-13200 is not security or has no CVEs. patches: slessp4-yast2-ldap-client-13200 SKIP SUSE-RU-2017:1819-1 as SUSE-SLE-SERVER-12-SP2-2017-1124 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1124,SUSE-SLE-DESKTOP-12-SP2-2017-1124,SUSE-SLE-RPI-12-SP2-2017-1124,SUSE-SLE-SDK-12-SP2-2017-1124,SUSE-SLE-SERVER-12-SP2-2017-1124 SKIP SUSE-RU-2017:1820-1 as SUSE-SLE-SERVER-12-SP2-2017-1126 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1126,SUSE-SLE-HA-12-SP2-2017-1126,SUSE-SLE-Manager-Tools-12-2017-1126,SUSE-SLE-Module-Adv-Systems-Management-12-2017-1126,SUSE-SLE-Module-Public-Cloud-12-2017-1126,SUSE-SLE-RPI-12-SP2-2017-1126,SUSE-SLE-SERVER-12-SP2-2017-1126 SKIP SUSE-RU-2017:1829-1 as slessp4-release-notes-sles-13201 is not security or has no CVEs. patches: slessp4-release-notes-sles-13201 SKIP SUSE-RU-2017:1830-1 as SUSE-SLE-SERVER-12-SP2-2017-1129 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1129,SUSE-SLE-DESKTOP-12-SP2-2017-1129,SUSE-SLE-RPI-12-SP2-2017-1129,SUSE-SLE-SAP-12-2017-1129,SUSE-SLE-SAP-12-SP1-2017-1129,SUSE-SLE-SERVER-12-2017-1129,SUSE-SLE-SERVER-12-SP1-2017-1129,SUSE-SLE-SERVER-12-SP2-2017-1129 SKIP SUSE-RU-2017:1831-1 as SUSE-SLE-HA-12-SP2-2017-1130 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1130 SKIP SUSE-RU-2017:1833-1 as SUSE-SLE-SDK-12-SP2-2017-1131 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1131 SKIP SUSE-RU-2017:1834-1 as slesappsp4-SAPHanaSR-13202 is not security or has no CVEs. patches: slesappsp4-SAPHanaSR-13202 SKIP SUSE-RU-2017:1845-1 as slessp4-glib2-pango-13204 is not security or has no CVEs. patches: sdksp4-glib2-pango-13204,sleposp3-glib2-pango-13204,slessp3-glib2-pango-13204,slessp4-glib2-pango-13204 SKIP SUSE-RU-2017:1847-1 as slessp4-libcgroup1-13205 is not security or has no CVEs. patches: sdksp4-libcgroup1-13205,slessp4-libcgroup1-13205 SKIP SUSE-RU-2017:1849-1 as SUSE-SLE-SERVER-12-SP2-2017-1142 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1142,SUSE-SLE-DESKTOP-12-SP2-2017-1142,SUSE-SLE-RPI-12-SP2-2017-1142,SUSE-SLE-SERVER-12-SP2-2017-1142 SKIP SUSE-RU-2017:1856-1 as slessp3-release-notes-sles-13208 is not security or has no CVEs. patches: sleposp3-release-notes-sles-13208,slessp3-release-notes-sles-13208 SKIP SUSE-RU-2017:1863-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1151 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1151 SKIP SUSE-RU-2017:1864-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1152 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1152 SKIP SUSE-RU-2017:1867-1 as slessp4-autoyast2-13210 is not security or has no CVEs. patches: slessp4-autoyast2-13210 SKIP SUSE-RU-2017:1869-1 as slessp4-yast2-samba-client-13211 is not security or has no CVEs. patches: slessp4-yast2-samba-client-13211 SKIP SUSE-RU-2017:1870-1 as SUSE-SLE-SERVER-12-SP2-2017-1160 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1160,SUSE-SLE-DESKTOP-12-SP2-2017-1160,SUSE-SLE-RPI-12-SP2-2017-1160,SUSE-SLE-SDK-12-SP2-2017-1160,SUSE-SLE-SERVER-12-SP2-2017-1160 SKIP SUSE-RU-2017:1871-1 as SUSE-SUSE-Manager-Server-3.1-2017-1154 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2017-1154,SUSE-SUSE-Manager-Proxy-3.0-2017-1154,SUSE-SUSE-Manager-Server-3.0-2017-1154,SUSE-SUSE-Manager-Server-3.1-2017-1154 SKIP SUSE-RU-2017:1887-1 as SUSE-SLE-SERVER-12-SP2-2017-1164 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1164,SUSE-SLE-RPI-12-SP2-2017-1164,SUSE-SLE-SERVER-12-SP2-2017-1164 SKIP SUSE-RU-2017:1888-1 as SUSE-SLE-SERVER-12-SP2-2017-1163 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-2017-1163 SKIP SUSE-RU-2017:1890-1 as SUSE-SLE-SERVER-12-SP2-2017-1165 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1165,SUSE-SLE-RPI-12-SP2-2017-1165,SUSE-SLE-SERVER-12-SP2-2017-1165 SKIP SUSE-RU-2017:1891-1 as SUSE-SLE-Module-Containers-12-2017-1167 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2017-1167 SKIP SUSE-RU-2017:1895-1 as SUSE-SUSE-Manager-Server-3.0-2017-1173 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1173,SUSE-SUSE-Manager-Server-3.0-2017-1173 SKIP SUSE-RU-2017:1896-1 as SUSE-SUSE-Manager-Server-3.0-2017-1172 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2017-1172 SKIP SUSE-RU-2017:1897-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-1172 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1172 SKIP SUSE-RU-2017:1900-1 as slessp4-release-notes-sles-13216 is not security or has no CVEs. patches: slessp4-release-notes-sles-13216 SKIP SUSE-RU-2017:1902-1 as SUSE-SLE-SERVER-12-SP2-2017-1177 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1177,SUSE-SLE-SDK-12-SP2-2017-1177,SUSE-SLE-SERVER-12-SP2-2017-1177 SKIP SUSE-RU-2017:1917-1 as SUSE-SLE-SERVER-12-SP2-2017-1192 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1192,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1192,SUSE-SLE-DESKTOP-12-SP2-2017-1192,SUSE-SLE-RPI-12-SP2-2017-1192,SUSE-SLE-SAP-12-2017-1192,SUSE-SLE-SAP-12-SP1-2017-1192,SUSE-SLE-SDK-12-SP2-2017-1192,SUSE-SLE-SERVER-12-2017-1192,SUSE-SLE-SERVER-12-SP1-2017-1192,SUSE-SLE-SERVER-12-SP2-2017-1192 SKIP SUSE-RU-2017:1919-1 as SUSE-SLE-SERVER-12-SP2-2017-1193 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1193,SUSE-SLE-RPI-12-SP2-2017-1193,SUSE-SLE-SDK-12-SP2-2017-1193,SUSE-SLE-SERVER-12-SP2-2017-1193 SKIP SUSE-RU-2017:1926-1 as SUSE-Storage-3-2017-1198 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1198,SUSE-OpenStack-Cloud-7-2017-1198,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1198,SUSE-SLE-DESKTOP-12-SP2-2017-1198,SUSE-SLE-Module-Public-Cloud-12-2017-1198,SUSE-SLE-RPI-12-SP2-2017-1198,SUSE-SLE-SAP-12-SP1-2017-1198,SUSE-SLE-SERVER-12-SP1-2017-1198,SUSE-SLE-SERVER-12-SP2-2017-1198,SUSE-Storage-3-2017-1198 SKIP SUSE-RU-2017:1927-1 as slessp4-s390-tools-13218 is not security or has no CVEs. patches: slessp4-s390-tools-13218 SKIP SUSE-RU-2017:1928-1 as slewyst13-collectd-13217 is not security or has no CVEs. patches: sleslms13-collectd-13217,slewyst13-collectd-13217 SKIP SUSE-RU-2017:1929-1 as SUSE-SLE-SERVER-12-SP3-2017-1201 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1201,SUSE-SLE-DESKTOP-12-SP2-2017-1201,SUSE-SLE-DESKTOP-12-SP3-2017-1201,SUSE-SLE-RPI-12-SP2-2017-1201,SUSE-SLE-SAP-12-2017-1201,SUSE-SLE-SAP-12-SP1-2017-1201,SUSE-SLE-SDK-12-SP2-2017-1201,SUSE-SLE-SDK-12-SP3-2017-1201,SUSE-SLE-SERVER-12-2017-1201,SUSE-SLE-SERVER-12-SP1-2017-1201,SUSE-SLE-SERVER-12-SP2-2017-1201,SUSE-SLE-SERVER-12-SP3-2017-1201 SKIP SUSE-RU-2017:1935-1 as SUSE-SLE-SERVER-12-SP2-2017-1204 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1204,SUSE-SLE-DESKTOP-12-SP2-2017-1204,SUSE-SLE-RPI-12-SP2-2017-1204,SUSE-SLE-SERVER-12-SP2-2017-1204 SKIP SUSE-RU-2017:1936-1 as slessp3-ipmitool-13219 is not security or has no CVEs. patches: sleposp3-ipmitool-13219,slessp3-ipmitool-13219 SKIP SUSE-RU-2017:1940-1 as SUSE-SLE-SERVER-12-SP2-2017-1214 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1214,SUSE-SLE-SDK-12-SP2-2017-1214,SUSE-SLE-SERVER-12-SP2-2017-1214 SKIP SUSE-RU-2017:1953-1 as SUSE-SLE-SERVER-12-SP3-2017-1215 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1215,SUSE-SLE-DESKTOP-12-SP3-2017-1215,SUSE-SLE-RPI-12-SP2-2017-1215,SUSE-SLE-SERVER-12-SP2-2017-1215,SUSE-SLE-SERVER-12-SP3-2017-1215 SKIP SUSE-RU-2017:1954-1 as SUSE-SLE-SERVER-12-SP2-2017-1217 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1217,SUSE-SLE-RPI-12-SP2-2017-1217,SUSE-SLE-SERVER-12-SP2-2017-1217 SKIP SUSE-RU-2017:1955-1 as SUSE-SLE-SERVER-12-SP3-2017-1218 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1218,SUSE-SLE-DESKTOP-12-SP3-2017-1218,SUSE-SLE-RPI-12-SP2-2017-1218,SUSE-SLE-SERVER-12-SP2-2017-1218,SUSE-SLE-SERVER-12-SP3-2017-1218 SKIP SUSE-RU-2017:1963-1 as SUSE-SLE-SERVER-12-SP3-2017-1222 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1222,SUSE-SLE-DESKTOP-12-SP2-2017-1222,SUSE-SLE-DESKTOP-12-SP3-2017-1222,SUSE-SLE-RPI-12-SP2-2017-1222,SUSE-SLE-SDK-12-SP2-2017-1222,SUSE-SLE-SDK-12-SP3-2017-1222,SUSE-SLE-SERVER-12-SP2-2017-1222,SUSE-SLE-SERVER-12-SP3-2017-1222 SKIP SUSE-RU-2017:1968-1 as slessp4-microcode_ctl-13221 is not security or has no CVEs. patches: sleposp3-microcode_ctl-13221,slessp3-microcode_ctl-13221,slessp4-microcode_ctl-13221 SKIP SUSE-RU-2017:1969-1 as SUSE-SLE-SERVER-12-SP3-2017-1223 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1223,SUSE-SLE-DESKTOP-12-SP2-2017-1223,SUSE-SLE-DESKTOP-12-SP3-2017-1223,SUSE-SLE-SAP-12-2017-1223,SUSE-SLE-SAP-12-SP1-2017-1223,SUSE-SLE-SERVER-12-2017-1223,SUSE-SLE-SERVER-12-SP1-2017-1223,SUSE-SLE-SERVER-12-SP2-2017-1223,SUSE-SLE-SERVER-12-SP3-2017-1223 SKIP SUSE-RU-2017:1979-1 as SUSE-SLE-SERVER-12-SP3-2017-1226 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1226,SUSE-SLE-SERVER-12-SP3-2017-1226 SKIP SUSE-RU-2017:1980-1 as SUSE-SLE-WE-12-SP3-2017-1225 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1225,SUSE-SLE-DESKTOP-12-SP3-2017-1225,SUSE-SLE-WE-12-SP2-2017-1225,SUSE-SLE-WE-12-SP3-2017-1225 SKIP SUSE-RU-2017:1983-1 as SUSE-SLE-SERVER-12-SP3-2017-1227 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1227,SUSE-SLE-SERVER-12-SP2-2017-1227,SUSE-SLE-SERVER-12-SP3-2017-1227 SKIP SUSE-RU-2017:1992-1 as SUSE-SLE-SERVER-12-SP2-2017-1232 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1232,SUSE-SLE-RPI-12-SP2-2017-1232,SUSE-SLE-SERVER-12-SP2-2017-1232 SKIP SUSE-RU-2017:1995-1 as SUSE-SUSE-Manager-Server-3.0-2017-1234 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1234,SUSE-SUSE-Manager-Server-3.0-2017-1234 SKIP SUSE-RU-2017:1996-1 as SUSE-SUSE-Manager-Server-3.1-2017-1235 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-1235 SKIP SUSE-RU-2017:2018-1 as SUSE-SLE-SERVER-12-SP3-2017-1239 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1239,SUSE-SLE-DESKTOP-12-SP3-2017-1239,SUSE-SLE-SERVER-12-SP2-2017-1239,SUSE-SLE-SERVER-12-SP3-2017-1239 SKIP SUSE-RU-2017:2019-1 as slehasp4-resource-agents-13224 is not security or has no CVEs. patches: slehasp4-resource-agents-13224 SKIP SUSE-RU-2017:2020-1 as SUSE-SLE-Live-Patching-12-SP3-2017-1241 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-1241,SUSE-SLE-Live-Patching-12-SP3-2017-1241 SKIP SUSE-RU-2017:2029-1 as SUSE-SLE-SERVER-12-SP3-2017-1243 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1243,SUSE-SLE-DESKTOP-12-SP3-2017-1243,SUSE-SLE-RPI-12-SP2-2017-1243,SUSE-SLE-SERVER-12-SP2-2017-1243,SUSE-SLE-SERVER-12-SP3-2017-1243 SKIP SUSE-RU-2017:2036-1 as SUSE-SLE-Live-Patching-12-SP3-2017-1249 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-1249,SUSE-SLE-Live-Patching-12-SP3-2017-1249 SKIP SUSE-RU-2017:2038-1 as SUSE-SLE-SERVER-12-SP3-2017-1250 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1250,SUSE-SLE-SDK-12-SP3-2017-1250,SUSE-SLE-SERVER-12-SP3-2017-1250 SKIP SUSE-RU-2017:2047-1 as SUSE-SLE-SERVER-12-SP3-2017-1259 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1259 SKIP SUSE-RU-2017:2048-1 as SUSE-SLE-HA-12-SP2-2017-1260 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1260 SKIP SUSE-RU-2017:2059-1 as SUSE-SLE-SERVER-12-SP3-2017-1268 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1268,SUSE-SLE-DESKTOP-12-SP2-2017-1268,SUSE-SLE-DESKTOP-12-SP3-2017-1268,SUSE-SLE-RPI-12-SP2-2017-1268,SUSE-SLE-SDK-12-SP2-2017-1268,SUSE-SLE-SDK-12-SP3-2017-1268,SUSE-SLE-SERVER-12-SP2-2017-1268,SUSE-SLE-SERVER-12-SP3-2017-1268 SKIP SUSE-RU-2017:2077-1 as SUSE-OpenStack-Cloud-7-2017-1280 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1280 SKIP SUSE-RU-2017:2078-1 as SUSE-Storage-4-2017-1289 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1289,SUSE-Storage-4-2017-1289 SKIP SUSE-RU-2017:2079-1 as SUSE-Storage-4-2017-1288 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1288,SUSE-Storage-4-2017-1288 SKIP SUSE-RU-2017:2080-1 as SUSE-OpenStack-Cloud-7-2017-1281 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1281 SKIP SUSE-RU-2017:2081-1 as SUSE-Storage-4-2017-1285 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1285,SUSE-Storage-4-2017-1285 SKIP SUSE-RU-2017:2082-1 as SUSE-OpenStack-Cloud-7-2017-1282 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1282 SKIP SUSE-RU-2017:2083-1 as SUSE-OpenStack-Cloud-7-2017-1284 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1284 SKIP SUSE-RU-2017:2084-1 as SUSE-Storage-4-2017-1283 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1283,SUSE-Storage-4-2017-1283 SKIP SUSE-RU-2017:2085-1 as SUSE-Storage-4-2017-1287 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1287,SUSE-Storage-4-2017-1287 SKIP SUSE-RU-2017:2086-1 as SUSE-OpenStack-Cloud-7-2017-1286 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1286 SKIP SUSE-RU-2017:2097-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1305 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1305 SKIP SUSE-RU-2017:2101-1 as SUSE-SLE-SERVER-12-SP3-2017-1299 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1299,SUSE-SLE-SERVER-12-SP3-2017-1299 SKIP SUSE-RU-2017:2106-1 as SUSE-SLE-SERVER-12-SP2-2017-1307 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1307,SUSE-SLE-RPI-12-SP2-2017-1307,SUSE-SLE-SERVER-12-SP2-2017-1307 SKIP SUSE-RU-2017:2107-1 as SUSE-SLE-SERVER-12-SP3-2017-1309 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1309,SUSE-SLE-SERVER-12-SP3-2017-1309 SKIP SUSE-RU-2017:2116-1 as SUSE-OpenStack-Cloud-7-2017-1312 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1312 SKIP SUSE-RU-2017:2128-1 as SUSE-SLE-WE-12-SP3-2017-1316 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1316,SUSE-SLE-SDK-12-SP3-2017-1316,SUSE-SLE-SERVER-12-SP2-2017-1316,SUSE-SLE-SERVER-12-SP3-2017-1316,SUSE-SLE-WE-12-SP2-2017-1316,SUSE-SLE-WE-12-SP3-2017-1316 SKIP SUSE-RU-2017:2128-2 as SUSE-SLE-SDK-12-SP2-2017-1316 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1316,SUSE-SLE-DESKTOP-12-SP2-2017-1316,SUSE-SLE-DESKTOP-12-SP3-2017-1316,SUSE-SLE-RPI-12-SP2-2017-1316,SUSE-SLE-SDK-12-SP2-2017-1316 SKIP SUSE-RU-2017:2140-1 as SUSE-SLE-SERVER-12-SP1-2017-1320 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2017-1320 SKIP SUSE-RU-2017:2145-1 as SUSE-SLE-SAP-12-SP2-2017-1323 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-1323,SUSE-SLE-SAP-12-SP1-2017-1323,SUSE-SLE-SAP-12-SP2-2017-1323 SKIP SUSE-RU-2017:2146-1 as SUSE-SLE-SERVER-12-SP1-2017-1322 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-1322,SUSE-SLE-SAP-12-SP1-2017-1322,SUSE-SLE-SERVER-12-2017-1322,SUSE-SLE-SERVER-12-SP1-2017-1322 SKIP SUSE-RU-2017:2147-1 as slessp4-xfsprogs-13229 is not security or has no CVEs. patches: sdksp4-xfsprogs-13229,slessp4-xfsprogs-13229 SKIP SUSE-RU-2017:2165-1 as SUSE-SLE-SERVER-12-SP3-2017-1330 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1330,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1330,SUSE-SLE-DESKTOP-12-SP2-2017-1330,SUSE-SLE-DESKTOP-12-SP3-2017-1330,SUSE-SLE-RPI-12-SP2-2017-1330,SUSE-SLE-SERVER-12-SP2-2017-1330,SUSE-SLE-SERVER-12-SP3-2017-1330 SKIP SUSE-RU-2017:2172-1 as SUSE-SLE-SERVER-12-SP3-2017-1334 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1334,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1334,SUSE-SLE-DESKTOP-12-SP2-2017-1334,SUSE-SLE-DESKTOP-12-SP3-2017-1334,SUSE-SLE-RPI-12-SP2-2017-1334,SUSE-SLE-SDK-12-SP2-2017-1334,SUSE-SLE-SDK-12-SP3-2017-1334,SUSE-SLE-SERVER-12-SP2-2017-1334,SUSE-SLE-SERVER-12-SP3-2017-1334 SKIP SUSE-RU-2017:2177-1 as slessp4-sed-13233 is not security or has no CVEs. patches: slessp4-sed-13233 SKIP SUSE-RU-2017:2203-1 as SUSE-SLE-SERVER-12-SP3-2017-1344 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1344,SUSE-SLE-SERVER-12-SP3-2017-1344 SKIP SUSE-RU-2017:2204-1 as SUSE-SLE-SERVER-12-SP3-2017-1345 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1345,SUSE-SLE-RPI-12-SP2-2017-1345,SUSE-SLE-SERVER-12-SP2-2017-1345,SUSE-SLE-SERVER-12-SP3-2017-1345 SKIP SUSE-RU-2017:2206-1 as SUSE-Storage-4-2017-1346 is not security or has no CVEs. patches: SUSE-Storage-4-2017-1346 SKIP SUSE-RU-2017:2213-1 as SUSE-SLE-SERVER-12-SP3-2017-1347 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1347,SUSE-OpenStack-Cloud-6-2017-1347,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1347,SUSE-SLE-DESKTOP-12-SP2-2017-1347,SUSE-SLE-DESKTOP-12-SP3-2017-1347,SUSE-SLE-RPI-12-SP2-2017-1347,SUSE-SLE-SAP-12-2017-1347,SUSE-SLE-SAP-12-SP1-2017-1347,SUSE-SLE-SDK-12-SP2-2017-1347,SUSE-SLE-SDK-12-SP3-2017-1347,SUSE-SLE-SERVER-12-SP2-2017-1347,SUSE-SLE-SERVER-12-SP3-2017-1347 SKIP SUSE-RU-2017:2214-1 as SUSE-SLE-SERVER-12-SP3-2017-1349 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1349,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1349,SUSE-SLE-DESKTOP-12-SP2-2017-1349,SUSE-SLE-DESKTOP-12-SP3-2017-1349,SUSE-SLE-RPI-12-SP2-2017-1349,SUSE-SLE-SDK-12-SP2-2017-1349,SUSE-SLE-SDK-12-SP3-2017-1349,SUSE-SLE-SERVER-12-SP2-2017-1349,SUSE-SLE-SERVER-12-SP3-2017-1349 SKIP SUSE-RU-2017:2216-1 as SUSE-OpenStack-Cloud-7-2017-1351 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1351 SKIP SUSE-RU-2017:2219-1 as slessp4-bash-13234 is not security or has no CVEs. patches: sdksp4-bash-13234,slessp4-bash-13234 SKIP SUSE-RU-2017:2220-1 as SUSE-SLE-SERVER-12-SP3-2017-1352 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1352,SUSE-SLE-SERVER-12-SP3-2017-1352 SKIP SUSE-RU-2017:2221-1 as SUSE-SLE-SDK-12-SP3-2017-1354 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1354,SUSE-SLE-SDK-12-SP3-2017-1354 SKIP SUSE-RU-2017:2226-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1357 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1357 SKIP SUSE-RU-2017:2231-1 as SUSE-OpenStack-Cloud-7-2017-1361 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1361 SKIP SUSE-RU-2017:2232-1 as SUSE-SLE-SERVER-12-SP3-2017-1364 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1364,SUSE-SLE-DESKTOP-12-SP2-2017-1364,SUSE-SLE-DESKTOP-12-SP3-2017-1364,SUSE-SLE-RPI-12-SP2-2017-1364,SUSE-SLE-SERVER-12-SP2-2017-1364,SUSE-SLE-SERVER-12-SP3-2017-1364 SKIP SUSE-RU-2017:2233-1 as SUSE-SLE-SERVER-12-SP2-2017-1362 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1362,SUSE-SLE-RPI-12-SP2-2017-1362,SUSE-SLE-SERVER-12-SP2-2017-1362 SKIP SUSE-RU-2017:2238-1 as SUSE-SLE-HA-12-SP2-2017-1369 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1369 SKIP SUSE-RU-2017:2239-1 as SUSE-SLE-SAP-12-SP2-2017-1370 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-1370 SKIP SUSE-RU-2017:2242-1 as SUSE-OpenStack-Cloud-7-2017-1371 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1371 SKIP SUSE-RU-2017:2248-1 as SUSE-OpenStack-Cloud-7-2017-1374 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1374 SKIP SUSE-RU-2017:2254-1 as SUSE-SUSE-Manager-Server-3.1-2017-1385 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2017-1385,SUSE-SUSE-Manager-Server-3.1-2017-1385 SKIP SUSE-RU-2017:2255-1 as slesctsp4-client-tools-201708-13246 is not security or has no CVEs. patches: slesctsp3-client-tools-201708-13246,slesctsp4-client-tools-201708-13246 SKIP SUSE-RU-2017:2256-1 as SUSE-Storage-4-2017-1384 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1384,SUSE-SLE-Manager-Tools-12-2017-1384,SUSE-SLE-Module-Adv-Systems-Management-12-2017-1384,SUSE-SLE-POS-12-SP2-2017-1384,SUSE-SUSE-Manager-Proxy-3.0-2017-1384,SUSE-SUSE-Manager-Server-3.0-2017-1384,SUSE-Storage-3-2017-1384,SUSE-Storage-4-2017-1384 SKIP SUSE-RU-2017:2259-1 as SUSE-SLE-Manager-Tools-12-2017-1385 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-1385 SKIP SUSE-RU-2017:2260-1 as slesctsp4-salt-13245 is not security or has no CVEs. patches: slesctsp3-salt-13245,slesctsp4-salt-13245 SKIP SUSE-RU-2017:2261-1 as SUSE-OpenStack-Cloud-7-2017-1388 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1388 SKIP SUSE-RU-2017:2265-1 as SUSE-SUSE-Manager-Server-3.1-2017-1386 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2017-1386,SUSE-SUSE-Manager-Server-3.1-2017-1386 SKIP SUSE-RU-2017:2282-1 as SUSE-SLE-SERVER-12-SP1-2017-1397 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1397,SUSE-SLE-Module-Public-Cloud-12-2017-1397,SUSE-SLE-SAP-12-SP1-2017-1397,SUSE-SLE-SERVER-12-SP1-2017-1397 SKIP SUSE-RU-2017:2283-1 as SUSE-SLE-SAP-12-SP3-2017-1398 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1398,SUSE-SLE-SAP-12-SP2-2017-1398,SUSE-SLE-SAP-12-SP3-2017-1398 SKIP SUSE-RU-2017:2284-1 as SUSE-SLE-SERVER-12-SP3-2017-1399 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1399 SKIP SUSE-RU-2017:2285-1 as SUSE-SLE-SERVER-12-SP1-2017-1400 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1400,SUSE-SLE-SERVER-12-SP1-2017-1400 SKIP SUSE-RU-2017:2287-1 as SUSE-SLE-SERVER-12-SP3-2017-1402 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1402,SUSE-SLE-DESKTOP-12-SP3-2017-1402,SUSE-SLE-RPI-12-SP2-2017-1402,SUSE-SLE-SERVER-12-SP2-2017-1402,SUSE-SLE-SERVER-12-SP3-2017-1402 SKIP SUSE-RU-2017:2288-1 as SUSE-SLE-SERVER-12-SP2-2017-1401 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1401,SUSE-SLE-SERVER-12-SP2-2017-1401 SKIP SUSE-RU-2017:2291-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1411 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1411 SKIP SUSE-RU-2017:2292-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1410 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1410 SKIP SUSE-RU-2017:2295-1 as pubclsp3-cloud-regionsrv-client-13253 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-13253 SKIP SUSE-RU-2017:2296-1 as SUSE-SLE-SERVER-12-SP3-2017-1412 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1412,SUSE-SLE-HA-12-SP3-2017-1412,SUSE-SLE-SERVER-12-SP3-2017-1412 SKIP SUSE-RU-2017:2297-1 as SUSE-OpenStack-Cloud-7-2017-1413 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1413 SKIP SUSE-RU-2017:2301-1 as SUSE-SLE-SERVER-12-2017-1420 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1420,SUSE-SLE-SAP-12-2017-1420,SUSE-SLE-SERVER-12-2017-1420 SKIP SUSE-RU-2017:2304-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1421 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1421 SKIP SUSE-RU-2017:2305-1 as slessp4-xorg-x11-driver-video-13255 is not security or has no CVEs. patches: slessp4-xorg-x11-driver-video-13255 SKIP SUSE-RU-2017:2313-1 as SUSE-SLE-SERVER-12-SP3-2017-1424 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1424,SUSE-SLE-DESKTOP-12-SP3-2017-1424,SUSE-SLE-RPI-12-SP2-2017-1424,SUSE-SLE-SERVER-12-SP2-2017-1424,SUSE-SLE-SERVER-12-SP3-2017-1424 SKIP SUSE-RU-2017:2314-1 as SUSE-SLE-SERVER-12-SP3-2017-1425 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1425,SUSE-SLE-DESKTOP-12-SP2-2017-1425,SUSE-SLE-DESKTOP-12-SP3-2017-1425,SUSE-SLE-SERVER-12-SP2-2017-1425,SUSE-SLE-SERVER-12-SP3-2017-1425 SKIP SUSE-RU-2017:2316-1 as SUSE-Storage-4-2017-1426 is not security or has no CVEs. patches: SUSE-Storage-4-2017-1426 SKIP SUSE-RU-2017:2321-1 as SUSE-SLE-SERVER-12-SP3-2017-1433 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2017-1433,SUSE-SLE-SERVER-12-SP3-2017-1433 SKIP SUSE-RU-2017:2322-1 as SUSE-SLE-SERVER-12-SP3-2017-1436 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1436,SUSE-SLE-DESKTOP-12-SP3-2017-1436,SUSE-SLE-RPI-12-SP2-2017-1436,SUSE-SLE-SDK-12-SP2-2017-1436,SUSE-SLE-SDK-12-SP3-2017-1436,SUSE-SLE-SERVER-12-SP2-2017-1436,SUSE-SLE-SERVER-12-SP3-2017-1436 SKIP SUSE-RU-2017:2323-1 as SUSE-SLE-SERVER-12-SP3-2017-1434 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1434 SKIP SUSE-RU-2017:2324-1 as slessp4-systemtap-13257 is not security or has no CVEs. patches: slessp4-systemtap-13257 SKIP SUSE-RU-2017:2325-1 as SUSE-SLE-SERVER-12-SP2-2017-1432 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1432,SUSE-SLE-SERVER-12-SP2-2017-1432 SKIP SUSE-RU-2017:2328-1 as slessp4-powerpc-utils-13258 is not security or has no CVEs. patches: slessp4-powerpc-utils-13258 SKIP SUSE-RU-2017:2329-1 as SUSE-SLE-SERVER-12-SP2-2017-1441 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-2017-1441 SKIP SUSE-RU-2017:2330-1 as SUSE-SLE-SERVER-12-SP3-2017-1439 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1439,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1439,SUSE-SLE-DESKTOP-12-SP2-2017-1439,SUSE-SLE-DESKTOP-12-SP3-2017-1439,SUSE-SLE-RPI-12-SP2-2017-1439,SUSE-SLE-SDK-12-SP2-2017-1439,SUSE-SLE-SDK-12-SP3-2017-1439,SUSE-SLE-SERVER-12-SP2-2017-1439,SUSE-SLE-SERVER-12-SP3-2017-1439 SKIP SUSE-RU-2017:2338-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1443 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1443 SKIP SUSE-RU-2017:2340-1 as pubclsp3-supportutils-plugin-suse-public-cloud-13260 is not security or has no CVEs. patches: pubclsp3-supportutils-plugin-suse-public-cloud-13260 SKIP SUSE-RU-2017:2341-1 as SUSE-SLE-SDK-12-SP3-2017-1449 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2017-1449 SKIP SUSE-RU-2017:2343-1 as SUSE-SLE-SERVER-12-SP3-2017-1451 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1451,SUSE-SLE-SERVER-12-SP3-2017-1451 SKIP SUSE-RU-2017:2345-1 as SUSE-SLE-SERVER-12-SP3-2017-1450 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1450,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1450,SUSE-SLE-DESKTOP-12-SP2-2017-1450,SUSE-SLE-DESKTOP-12-SP3-2017-1450,SUSE-SLE-RPI-12-SP2-2017-1450,SUSE-SLE-SERVER-12-SP2-2017-1450,SUSE-SLE-SERVER-12-SP3-2017-1450 SKIP SUSE-RU-2017:2346-1 as SUSE-SLE-SERVER-12-SP3-2017-1453 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1453,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1453,SUSE-SLE-DESKTOP-12-SP2-2017-1453,SUSE-SLE-DESKTOP-12-SP3-2017-1453,SUSE-SLE-RPI-12-SP2-2017-1453,SUSE-SLE-SDK-12-SP2-2017-1453,SUSE-SLE-SDK-12-SP3-2017-1453,SUSE-SLE-SERVER-12-SP2-2017-1453,SUSE-SLE-SERVER-12-SP3-2017-1453 SKIP SUSE-RU-2017:2352-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2017-1454 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2017-1454 SKIP SUSE-RU-2017:2353-1 as slestso13-susestudio-13263 is not security or has no CVEs. patches: slestso13-susestudio-13263 SKIP SUSE-RU-2017:2357-1 as SUSE-SLE-SERVER-12-SP2-2017-1463 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1463,SUSE-SLE-RPI-12-SP2-2017-1463,SUSE-SLE-SERVER-12-SP2-2017-1463 SKIP SUSE-RU-2017:2358-1 as SUSE-Storage-3-2017-1462 is not security or has no CVEs. patches: SUSE-Storage-3-2017-1462 SKIP SUSE-RU-2017:2376-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2017-1469 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1469,SUSE-SLE-SDK-12-SP3-2017-1469,SUSE-SLE-SERVER-12-SP3-2017-1469,SUSE-SLE-SERVER-INSTALLER-12-SP3-2017-1469 SKIP SUSE-RU-2017:2377-1 as SUSE-SLE-SERVER-12-SP3-2017-1468 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1468,SUSE-SLE-DESKTOP-12-SP3-2017-1468,SUSE-SLE-RPI-12-SP2-2017-1468,SUSE-SLE-SERVER-12-SP2-2017-1468,SUSE-SLE-SERVER-12-SP3-2017-1468 SKIP SUSE-RU-2017:2378-1 as SUSE-SLE-WE-12-SP3-2017-1467 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1467,SUSE-SLE-SDK-12-SP3-2017-1467,SUSE-SLE-SERVER-12-SP3-2017-1467,SUSE-SLE-WE-12-SP3-2017-1467 SKIP SUSE-RU-2017:2379-1 as SUSE-SLE-WE-12-SP2-2017-1466 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1466,SUSE-SLE-RPI-12-SP2-2017-1466,SUSE-SLE-SDK-12-SP2-2017-1466,SUSE-SLE-SERVER-12-SP2-2017-1466,SUSE-SLE-WE-12-SP2-2017-1466 SKIP SUSE-RU-2017:2382-1 as SUSE-SLE-SERVER-12-SP3-2017-1472 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1472,SUSE-SLE-SERVER-12-SP2-2017-1472,SUSE-SLE-SERVER-12-SP3-2017-1472 SKIP SUSE-RU-2017:2388-1 as SUSE-Storage-4-2017-1477 is not security or has no CVEs. patches: SUSE-Storage-4-2017-1477 SKIP SUSE-RU-2017:2395-1 as SUSE-Storage-4-2017-1482 is not security or has no CVEs. patches: SUSE-Storage-4-2017-1482 SKIP SUSE-RU-2017:2396-1 as SUSE-SLE-SERVER-12-SP3-2017-1481 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1481,SUSE-SLE-SERVER-12-SP3-2017-1481 SKIP SUSE-RU-2017:2397-1 as SUSE-SLE-SERVER-12-SP2-2017-1483 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1483,SUSE-SLE-DESKTOP-12-SP2-2017-1483,SUSE-SLE-RPI-12-SP2-2017-1483,SUSE-SLE-SERVER-12-SP2-2017-1483 SKIP SUSE-RU-2017:2411-1 as SUSE-SLE-SERVER-12-SP3-2017-1487 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1487,SUSE-SLE-DESKTOP-12-SP3-2017-1487,SUSE-SLE-RPI-12-SP2-2017-1487,SUSE-SLE-SDK-12-SP2-2017-1487,SUSE-SLE-SDK-12-SP3-2017-1487,SUSE-SLE-SERVER-12-SP2-2017-1487,SUSE-SLE-SERVER-12-SP3-2017-1487 SKIP SUSE-RU-2017:2412-1 as slessp4-yast2-support-13275 is not security or has no CVEs. patches: slessp4-yast2-support-13275 SKIP SUSE-RU-2017:2413-1 as SUSE-SLE-SERVER-12-SP3-2017-1485 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1485,SUSE-SLE-SERVER-12-SP2-2017-1485,SUSE-SLE-SERVER-12-SP3-2017-1485 SKIP SUSE-RU-2017:2414-1 as SUSE-SLE-SAP-12-SP1-2017-1488 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1488 SKIP SUSE-RU-2017:2415-1 as SUSE-SLE-SAP-12-SP3-2017-1489 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-1489,SUSE-SLE-SAP-12-SP3-2017-1489 SKIP SUSE-RU-2017:2417-1 as pubclsp3-python-gcemetadata-13276 is not security or has no CVEs. patches: pubclsp3-python-gcemetadata-13276 SKIP SUSE-RU-2017:2421-1 as slessp4-yast2-sound-13280 is not security or has no CVEs. patches: slessp4-yast2-sound-13280 SKIP SUSE-RU-2017:2425-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1495 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1495 ERROR: notice SUSE-RU-2017:2444-1 has no valid patches out of: SUSE-CAASP-ALL-2017-1516 SKIP SUSE-RU-2017:2445-1 as SUSE-SLE-SERVER-12-SP3-2017-1517 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1517,SUSE-SLE-SERVER-12-SP3-2017-1517 SKIP SUSE-RU-2017:2451-1 as SUSE-SUSE-Manager-Server-3.0-2017-1519 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1519,SUSE-SUSE-Manager-Server-3.0-2017-1519 SKIP SUSE-RU-2017:2452-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-1520 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1520 SKIP SUSE-RU-2017:2460-1 as SUSE-SLE-SERVER-12-SP2-2017-1530 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1530,SUSE-SLE-SERVER-12-SP2-2017-1530 SKIP SUSE-RU-2017:2461-1 as SUSE-SLE-SERVER-12-SP3-2017-1527 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1527 SKIP SUSE-RU-2017:2462-1 as SUSE-SLE-SERVER-12-SP2-2017-1529 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1529,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1529,SUSE-SLE-DESKTOP-12-SP2-2017-1529,SUSE-SLE-RPI-12-SP2-2017-1529,SUSE-SLE-SDK-12-SP2-2017-1529,SUSE-SLE-SERVER-12-SP2-2017-1529 SKIP SUSE-RU-2017:2463-1 as SUSE-SLE-SERVER-12-SP3-2017-1528 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1528,SUSE-SLE-SDK-12-SP3-2017-1528,SUSE-SLE-SERVER-12-SP3-2017-1528 SKIP SUSE-RU-2017:2503-1 as SUSE-SLE-SERVER-12-SP3-2017-1549 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1549,SUSE-SLE-DESKTOP-12-SP3-2017-1549,SUSE-SLE-RPI-12-SP2-2017-1549,SUSE-SLE-SERVER-12-SP2-2017-1549,SUSE-SLE-SERVER-12-SP3-2017-1549 SKIP SUSE-RU-2017:2505-1 as SUSE-SLE-SERVER-12-SP3-2017-1548 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1548,SUSE-SLE-DESKTOP-12-SP2-2017-1548,SUSE-SLE-DESKTOP-12-SP3-2017-1548,SUSE-SLE-RPI-12-SP2-2017-1548,SUSE-SLE-SDK-12-SP2-2017-1548,SUSE-SLE-SDK-12-SP3-2017-1548,SUSE-SLE-SERVER-12-SP2-2017-1548,SUSE-SLE-SERVER-12-SP3-2017-1548 SKIP SUSE-RU-2017:2507-1 as SUSE-SLE-HA-12-SP3-2017-1550 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2017-1550 SKIP SUSE-RU-2017:2517-1 as SUSE-Storage-4-2017-1556 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1556,SUSE-OpenStack-Cloud-7-2017-1556,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1556,SUSE-Storage-4-2017-1556 SKIP SUSE-RU-2017:2530-1 as SUSE-Storage-4-2017-1566 is not security or has no CVEs. patches: SUSE-Storage-4-2017-1566 SKIP SUSE-RU-2017:2533-1 as SUSE-Storage-4-2017-1568 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1568,SUSE-Storage-4-2017-1568 SKIP SUSE-RU-2017:2543-1 as SUSE-SLE-SERVER-12-SP1-2017-1577 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1577,SUSE-SLE-SAP-12-SP1-2017-1577,SUSE-SLE-SERVER-12-SP1-2017-1577 SKIP SUSE-RU-2017:2544-1 as SUSE-SLE-SERVER-12-SP3-2017-1574 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1574,SUSE-SLE-RPI-12-SP2-2017-1574,SUSE-SLE-SAP-12-SP2-2017-1574,SUSE-SLE-SDK-12-SP2-2017-1574,SUSE-SLE-SDK-12-SP3-2017-1574,SUSE-SLE-SERVER-12-SP2-2017-1574,SUSE-SLE-SERVER-12-SP3-2017-1574 SKIP SUSE-RU-2017:2545-1 as SUSE-SLE-HA-12-SP2-2017-1571 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1571 SKIP SUSE-RU-2017:2547-1 as SUSE-SLE-WE-12-SP3-2017-1573 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1573,SUSE-SLE-HA-12-SP3-2017-1573,SUSE-SLE-Live-Patching-12-SP3-2017-1573,SUSE-SLE-SDK-12-SP3-2017-1573,SUSE-SLE-SERVER-12-SP3-2017-1573,SUSE-SLE-WE-12-SP3-2017-1573 SKIP SUSE-RU-2017:2551-1 as SUSE-SLE-SERVER-12-2017-1580 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2017-1580 SKIP SUSE-RU-2017:2553-1 as SUSE-SLE-SERVER-12-SP2-2017-1578 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1578,SUSE-SLE-RPI-12-SP2-2017-1578,SUSE-SLE-SERVER-12-SP2-2017-1578 SKIP SUSE-RU-2017:2554-1 as SUSE-SLE-SERVER-12-SP3-2017-1579 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1579,SUSE-SLE-DESKTOP-12-SP3-2017-1579,SUSE-SLE-RPI-12-SP2-2017-1579,SUSE-SLE-SERVER-12-SP2-2017-1579,SUSE-SLE-SERVER-12-SP3-2017-1579 SKIP SUSE-RU-2017:2556-1 as SUSE-SLE-HA-12-SP3-2017-1584 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2017-1584 SKIP SUSE-RU-2017:2563-1 as SUSE-SLE-SERVER-12-SP3-2017-1588 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1588,SUSE-SLE-SERVER-12-SP2-2017-1588,SUSE-SLE-SERVER-12-SP3-2017-1588 SKIP SUSE-RU-2017:2564-1 as SUSE-SLE-SERVER-12-SP3-2017-1585 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1585,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1585,SUSE-SLE-DESKTOP-12-SP2-2017-1585,SUSE-SLE-DESKTOP-12-SP3-2017-1585,SUSE-SLE-RPI-12-SP2-2017-1585,SUSE-SLE-SDK-12-SP2-2017-1585,SUSE-SLE-SDK-12-SP3-2017-1585,SUSE-SLE-SERVER-12-SP2-2017-1585,SUSE-SLE-SERVER-12-SP3-2017-1585 SKIP SUSE-RU-2017:2565-1 as SUSE-SLE-WE-12-SP2-2017-1587 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1587,SUSE-SLE-SDK-12-SP2-2017-1587,SUSE-SLE-WE-12-SP2-2017-1587 SKIP SUSE-RU-2017:2566-1 as SUSE-SLE-SERVER-12-SP3-2017-1586 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1586,SUSE-SLE-DESKTOP-12-SP3-2017-1586,SUSE-SLE-RPI-12-SP2-2017-1586,SUSE-SLE-SERVER-12-SP2-2017-1586,SUSE-SLE-SERVER-12-SP3-2017-1586 SKIP SUSE-RU-2017:2571-1 as SUSE-SLE-SERVER-12-SP3-2017-1592 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1592,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1592,SUSE-SLE-DESKTOP-12-SP2-2017-1592,SUSE-SLE-DESKTOP-12-SP3-2017-1592,SUSE-SLE-HA-12-SP2-2017-1592,SUSE-SLE-HA-12-SP3-2017-1592,SUSE-SLE-RPI-12-SP2-2017-1592,SUSE-SLE-SDK-12-SP2-2017-1592,SUSE-SLE-SDK-12-SP3-2017-1592,SUSE-SLE-SERVER-12-SP2-2017-1592,SUSE-SLE-SERVER-12-SP3-2017-1592 SKIP SUSE-RU-2017:2572-1 as SUSE-SLE-SERVER-12-SP3-2017-1591 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1591 SKIP SUSE-RU-2017:2574-1 as slessp4-open-iscsi-13287 is not security or has no CVEs. patches: slessp4-open-iscsi-13287 ERROR: notice SUSE-RU-2017:2575-1 has no valid patches out of: SUSE-SLE-SAP-12-2017-1593 SKIP SUSE-RU-2017:2578-1 as slessp4-autofs-13288 is not security or has no CVEs. patches: slessp4-autofs-13288 SKIP SUSE-RU-2017:2582-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1599 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1599 SKIP SUSE-RU-2017:2583-1 as pubclsp3-cloud-regionsrv-client-13289 is not security or has no CVEs. patches: pubclsp3-cloud-regionsrv-client-13289 SKIP SUSE-RU-2017:2586-1 as SUSE-SLE-SERVER-12-SP3-2017-1597 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1597,SUSE-SLE-DESKTOP-12-SP2-2017-1597,SUSE-SLE-DESKTOP-12-SP3-2017-1597,SUSE-SLE-RPI-12-SP2-2017-1597,SUSE-SLE-SERVER-12-SP2-2017-1597,SUSE-SLE-SERVER-12-SP3-2017-1597 SKIP SUSE-RU-2017:2592-1 as SUSE-SLE-SERVER-12-SP3-2017-1602 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1602,SUSE-SLE-DESKTOP-12-SP3-2017-1602,SUSE-SLE-RPI-12-SP2-2017-1602,SUSE-SLE-SDK-12-SP2-2017-1602,SUSE-SLE-SDK-12-SP3-2017-1602,SUSE-SLE-SERVER-12-SP2-2017-1602,SUSE-SLE-SERVER-12-SP3-2017-1602 SKIP SUSE-RU-2017:2593-1 as SUSE-SLE-SERVER-12-SP3-2017-1606 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1606,SUSE-SLE-DESKTOP-12-SP3-2017-1606,SUSE-SLE-RPI-12-SP2-2017-1606,SUSE-SLE-SERVER-12-SP2-2017-1606,SUSE-SLE-SERVER-12-SP3-2017-1606 SKIP SUSE-RU-2017:2600-1 as SUSE-SLE-SERVER-12-SP3-2017-1612 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2017-1612,SUSE-SLE-SERVER-12-SP3-2017-1612 SKIP SUSE-RU-2017:2620-1 as SUSE-OpenStack-Cloud-7-2017-1628 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1628 SKIP SUSE-RU-2017:2621-1 as SUSE-OpenStack-Cloud-7-2017-1620 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1620 SKIP SUSE-RU-2017:2622-1 as SUSE-OpenStack-Cloud-7-2017-1618 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1618 SKIP SUSE-RU-2017:2623-1 as SUSE-OpenStack-Cloud-7-2017-1619 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1619 SKIP SUSE-RU-2017:2624-1 as SUSE-OpenStack-Cloud-7-2017-1629 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1629 SKIP SUSE-RU-2017:2625-1 as SUSE-Storage-4-2017-1625 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1625,SUSE-Storage-4-2017-1625 SKIP SUSE-RU-2017:2626-1 as SUSE-Storage-4-2017-1626 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1626,SUSE-Storage-4-2017-1626 SKIP SUSE-RU-2017:2629-1 as SUSE-SLE-SERVER-12-SP3-2017-1622 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1622,SUSE-SLE-DESKTOP-12-SP3-2017-1622,SUSE-SLE-RPI-12-SP2-2017-1622,SUSE-SLE-SERVER-12-SP2-2017-1622,SUSE-SLE-SERVER-12-SP3-2017-1622 SKIP SUSE-RU-2017:2630-1 as SUSE-Storage-4-2017-1627 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1627,SUSE-Storage-4-2017-1627 SKIP SUSE-RU-2017:2634-1 as SUSE-SLE-SERVER-12-SP3-2017-1632 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1632,SUSE-SLE-SERVER-12-SP3-2017-1632 SKIP SUSE-RU-2017:2636-1 as SUSE-SLE-SERVER-12-SP2-2017-1633 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1633,SUSE-SLE-RPI-12-SP2-2017-1633,SUSE-SLE-SERVER-12-SP2-2017-1633 SKIP SUSE-RU-2017:2637-1 as SUSE-SLE-SERVER-12-SP1-2017-1634 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1634,SUSE-SLE-SAP-12-SP1-2017-1634,SUSE-SLE-SERVER-12-SP1-2017-1634 SKIP SUSE-RU-2017:2651-1 as SUSE-SLE-SERVER-12-SP3-2017-1638 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1638,SUSE-SLE-SERVER-12-SP3-2017-1638 SKIP SUSE-RU-2017:2654-1 as SUSE-SLE-SERVER-12-SP2-2017-1640 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1640,SUSE-SLE-DESKTOP-12-SP2-2017-1640,SUSE-SLE-RPI-12-SP2-2017-1640,SUSE-SLE-SERVER-12-SP2-2017-1640 SKIP SUSE-RU-2017:2656-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1641 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1641 SKIP SUSE-RU-2017:2657-1 as SUSE-SLE-SERVER-12-SP3-2017-1643 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1643,SUSE-SLE-SDK-12-SP3-2017-1643,SUSE-SLE-SERVER-12-SP3-2017-1643 SKIP SUSE-RU-2017:2658-1 as SUSE-SLE-SERVER-12-SP3-2017-1639 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1639,SUSE-SLE-SERVER-12-SP3-2017-1639 SKIP SUSE-RU-2017:2664-1 as SUSE-SUSE-Manager-Server-3.1-2017-1656 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2017-1656,SUSE-SUSE-Manager-Server-3.1-2017-1656 SKIP SUSE-RU-2017:2665-1 as SUSE-SUSE-Manager-Proxy-3.1-2017-1655 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2017-1655 SKIP SUSE-RU-2017:2668-1 as SUSE-SUSE-Manager-Server-3.0-2017-1659 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1659,SUSE-SUSE-Manager-Server-3.0-2017-1659 SKIP SUSE-RU-2017:2670-1 as SUSE-SLE-Manager-Tools-12-2017-1659 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-1659 SKIP SUSE-RU-2017:2671-1 as SUSE-SUSE-Manager-Server-3.1-2017-1655 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-1655 SKIP SUSE-RU-2017:2672-1 as slesctsp4-client-tools-201709-13302 is not security or has no CVEs. patches: slesctsp3-client-tools-201709-13302,slesctsp4-client-tools-201709-13302 SKIP SUSE-RU-2017:2673-1 as slessp4-zypp-plugin-spacewalk-13303 is not security or has no CVEs. patches: slesctsp3-zypp-plugin-spacewalk-13303,slesctsp4-zypp-plugin-spacewalk-13303,slessp4-zypp-plugin-spacewalk-13303 SKIP SUSE-RU-2017:2687-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1664 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1664,SUSE-SLE-Module-Public-Cloud-12-2017-1664 SKIP SUSE-RU-2017:2689-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1665 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1665 SKIP SUSE-RU-2017:2691-1 as SUSE-SLE-SERVER-12-SP3-2017-1663 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1663,SUSE-SLE-SDK-12-SP3-2017-1663,SUSE-SLE-SERVER-12-SP3-2017-1663 SKIP SUSE-RU-2017:2693-1 as slessp4-xinetd-13306 is not security or has no CVEs. patches: slessp4-xinetd-13306 SKIP SUSE-RU-2017:2698-1 as SUSE-SLE-SERVER-12-2017-1670 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2017-1670 SKIP SUSE-RU-2017:2702-1 as SUSE-SLE-SERVER-12-SP3-2017-1676 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1676,SUSE-OpenStack-Cloud-6-2017-1676,SUSE-SLE-DESKTOP-12-SP2-2017-1676,SUSE-SLE-DESKTOP-12-SP3-2017-1676,SUSE-SLE-RPI-12-SP2-2017-1676,SUSE-SLE-SAP-12-SP1-2017-1676,SUSE-SLE-SERVER-12-2017-1676,SUSE-SLE-SERVER-12-SP1-2017-1676,SUSE-SLE-SERVER-12-SP2-2017-1676,SUSE-SLE-SERVER-12-SP3-2017-1676 SKIP SUSE-RU-2017:2703-1 as slessp4-supportutils-13308 is not security or has no CVEs. patches: sleposp3-supportutils-13308,slessp3-supportutils-13308,slessp4-supportutils-13308 SKIP SUSE-RU-2017:2720-1 as SUSE-SLE-SERVER-12-SP3-2017-1683 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1683,SUSE-SLE-SDK-12-SP3-2017-1683,SUSE-SLE-SERVER-12-SP3-2017-1683 SKIP SUSE-RU-2017:2721-1 as pubclsp3-google-cloud-engine-13311 is not security or has no CVEs. patches: pubclsp3-google-cloud-engine-13311 SKIP SUSE-RU-2017:2722-1 as SUSE-SLE-WE-12-SP3-2017-1685 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1685,SUSE-SLE-DESKTOP-12-SP3-2017-1685,SUSE-SLE-WE-12-SP2-2017-1685,SUSE-SLE-WE-12-SP3-2017-1685 SKIP SUSE-RU-2017:2724-1 as slessp4-mdadm-13313 is not security or has no CVEs. patches: slessp4-mdadm-13313 SKIP SUSE-RU-2017:2727-1 as slessp4-iproute2-13315 is not security or has no CVEs. patches: sdksp4-iproute2-13315,slessp4-iproute2-13315 SKIP SUSE-RU-2017:2728-1 as SUSE-SLE-SERVER-12-SP3-2017-1692 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1692,SUSE-SLE-SERVER-12-SP3-2017-1692 SKIP SUSE-RU-2017:2729-1 as SUSE-SLE-SERVER-12-SP2-2017-1691 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1691,SUSE-SLE-RPI-12-SP2-2017-1691,SUSE-SLE-SERVER-12-SP2-2017-1691 SKIP SUSE-RU-2017:2733-1 as SUSE-SLE-HA-12-SP1-2017-1693 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2017-1693 SKIP SUSE-RU-2017:2737-1 as slessp4-vm-install-13316 is not security or has no CVEs. patches: slessp4-vm-install-13316 SKIP SUSE-RU-2017:2738-1 as SUSE-SLE-SERVER-12-SP3-2017-1695 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1695,SUSE-SLE-DESKTOP-12-SP3-2017-1695,SUSE-SLE-RPI-12-SP2-2017-1695,SUSE-SLE-SERVER-12-SP2-2017-1695,SUSE-SLE-SERVER-12-SP3-2017-1695 SKIP SUSE-RU-2017:2740-1 as SUSE-SLE-SERVER-12-SP2-2017-1697 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1697,SUSE-SLE-RPI-12-SP2-2017-1697,SUSE-SLE-SERVER-12-SP2-2017-1697 SKIP SUSE-RU-2017:2742-1 as SUSE-SLE-SERVER-12-SP3-2017-1698 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1698,SUSE-SLE-SERVER-12-SP3-2017-1698 SKIP SUSE-RU-2017:2743-1 as SUSE-SLE-WE-12-SP3-2017-1696 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1696,SUSE-SLE-DESKTOP-12-SP3-2017-1696,SUSE-SLE-RPI-12-SP2-2017-1696,SUSE-SLE-SDK-12-SP2-2017-1696,SUSE-SLE-SDK-12-SP3-2017-1696,SUSE-SLE-SERVER-12-SP2-2017-1696,SUSE-SLE-SERVER-12-SP3-2017-1696,SUSE-SLE-WE-12-SP2-2017-1696,SUSE-SLE-WE-12-SP3-2017-1696 SKIP SUSE-RU-2017:2748-1 as SUSE-SLE-SERVER-12-SP3-2017-1703 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1703,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1703,SUSE-SLE-DESKTOP-12-SP2-2017-1703,SUSE-SLE-DESKTOP-12-SP3-2017-1703,SUSE-SLE-RPI-12-SP2-2017-1703,SUSE-SLE-SDK-12-SP2-2017-1703,SUSE-SLE-SDK-12-SP3-2017-1703,SUSE-SLE-SERVER-12-SP2-2017-1703,SUSE-SLE-SERVER-12-SP3-2017-1703 SKIP SUSE-RU-2017:2750-1 as SUSE-SLE-Module-Containers-12-2017-1706 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1706,SUSE-SLE-Module-Containers-12-2017-1706 SKIP SUSE-RU-2017:2808-1 as SUSE-SLE-SERVER-INSTALLER-12-SP2-2017-1747 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1747,SUSE-SLE-DESKTOP-INSTALLER-12-SP2-2017-1747,SUSE-SLE-RPI-12-SP2-2017-1747,SUSE-SLE-RPI-INSTALLER-12-SP2-2017-1747,SUSE-SLE-SAP-INSTALLER-12-SP2-2017-1747,SUSE-SLE-SERVER-12-SP2-2017-1747,SUSE-SLE-SERVER-INSTALLER-12-SP2-2017-1747 SKIP SUSE-RU-2017:2814-1 as SUSE-SLE-SERVER-12-SP3-2017-1755 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1755,SUSE-SLE-DESKTOP-12-SP3-2017-1755,SUSE-SLE-RPI-12-SP2-2017-1755,SUSE-SLE-SERVER-12-SP2-2017-1755,SUSE-SLE-SERVER-12-SP3-2017-1755 SKIP SUSE-RU-2017:2817-1 as SUSE-SLE-HA-12-SP3-2017-1756 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2017-1756 SKIP SUSE-RU-2017:2819-1 as SUSE-SLE-HA-12-SP2-2017-1757 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1757 SKIP SUSE-RU-2017:2836-1 as SUSE-SLE-Live-Patching-12-SP3-2017-1759 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-1759,SUSE-SLE-Live-Patching-12-SP3-2017-1759 SKIP SUSE-RU-2017:2837-1 as SUSE-SLE-SAP-12-2017-1761 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2017-1761 SKIP SUSE-RU-2017:2840-1 as SUSE-SLE-SDK-12-SP2-2017-1768 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1768,SUSE-SLE-SDK-12-SP2-2017-1768 SKIP SUSE-RU-2017:2841-1 as SUSE-SLE-SDK-12-SP3-2017-1769 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2017-1769,SUSE-SLE-SDK-12-SP3-2017-1769 SKIP SUSE-RU-2017:2842-1 as slessp4-logrotate-13325 is not security or has no CVEs. patches: slessp4-logrotate-13325 SKIP SUSE-RU-2017:2843-1 as SUSE-SLE-SERVER-12-SP2-2017-1766 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1766,SUSE-SLE-DESKTOP-12-SP2-2017-1766,SUSE-SLE-RPI-12-SP2-2017-1766,SUSE-SLE-SERVER-12-SP2-2017-1766 SKIP SUSE-RU-2017:2849-1 as SUSE-SLE-SERVER-12-SP3-2017-1772 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1772,SUSE-SLE-SERVER-12-SP3-2017-1772 SKIP SUSE-RU-2017:2851-1 as SUSE-SLE-SERVER-12-SP3-2017-1773 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1773,SUSE-SLE-DESKTOP-12-SP3-2017-1773,SUSE-SLE-RPI-12-SP2-2017-1773,SUSE-SLE-SDK-12-SP2-2017-1773,SUSE-SLE-SDK-12-SP3-2017-1773,SUSE-SLE-SERVER-12-SP2-2017-1773,SUSE-SLE-SERVER-12-SP3-2017-1773 SKIP SUSE-RU-2017:2853-1 as SUSE-SLE-SERVER-12-SP3-2017-1775 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1775,SUSE-SLE-SDK-12-SP3-2017-1775,SUSE-SLE-SERVER-12-SP3-2017-1775 SKIP SUSE-RU-2017:2857-1 as SUSE-SLE-SERVER-12-SP2-2017-1779 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1779,SUSE-SLE-RPI-12-SP2-2017-1779,SUSE-SLE-SERVER-12-SP2-2017-1779 ERROR: notice SUSE-RU-2017:2858-1 has no valid patches out of: SUSE-Storage-5-2017-1675 SKIP SUSE-RU-2017:2859-1 as SUSE-SLE-SERVER-12-SP2-2017-1781 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1781,SUSE-SLE-RPI-12-SP2-2017-1781,SUSE-SLE-SDK-12-SP2-2017-1781,SUSE-SLE-SERVER-12-SP2-2017-1781 SKIP SUSE-RU-2017:2862-1 as SUSE-SLE-SERVER-12-SP2-2017-1783 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1783,SUSE-OpenStack-Cloud-6-2017-1783,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1783,SUSE-SLE-DESKTOP-12-SP2-2017-1783,SUSE-SLE-RPI-12-SP2-2017-1783,SUSE-SLE-SAP-12-SP1-2017-1783,SUSE-SLE-SDK-12-SP2-2017-1783,SUSE-SLE-SERVER-12-2017-1783,SUSE-SLE-SERVER-12-SP1-2017-1783,SUSE-SLE-SERVER-12-SP2-2017-1783 SKIP SUSE-RU-2017:2865-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1788 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1788 SKIP SUSE-RU-2017:2866-1 as pubclsp3-python-azure-agent-13328 is not security or has no CVEs. patches: pubclsp3-python-azure-agent-13328 SKIP SUSE-RU-2017:2897-1 as SUSE-SLE-WE-12-SP3-2017-1796 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1796,SUSE-OpenStack-Cloud-6-2017-1796,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1796,SUSE-SLE-DESKTOP-12-SP2-2017-1796,SUSE-SLE-DESKTOP-12-SP3-2017-1796,SUSE-SLE-HA-12-2017-1796,SUSE-SLE-HA-12-SP1-2017-1796,SUSE-SLE-HA-12-SP2-2017-1796,SUSE-SLE-HA-12-SP3-2017-1796,SUSE-SLE-RPI-12-SP2-2017-1796,SUSE-SLE-SAP-12-SP1-2017-1796,SUSE-SLE-SDK-12-SP2-2017-1796,SUSE-SLE-SDK-12-SP3-2017-1796,SUSE-SLE-SERVER-12-2017-1796,SUSE-SLE-SERVER-12-SP1-2017-1796,SUSE-SLE-SERVER-12-SP2-2017-1796,SUSE-SLE-SERVER-12-SP3-2017-1796,SUSE-SLE-WE-12-SP2-2017-1796,SUSE-SLE-WE-12-SP3-2017-1796 SKIP SUSE-RU-2017:2898-1 as SUSE-SLE-SERVER-12-SP3-2017-1797 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1797,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1797,SUSE-SLE-DESKTOP-12-SP2-2017-1797,SUSE-SLE-DESKTOP-12-SP3-2017-1797,SUSE-SLE-RPI-12-SP2-2017-1797,SUSE-SLE-SERVER-12-SP2-2017-1797,SUSE-SLE-SERVER-12-SP3-2017-1797 SKIP SUSE-RU-2017:2909-1 as SUSE-SLE-SERVER-12-SP3-2017-1800 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-1800,SUSE-SLE-SDK-12-SP3-2017-1800,SUSE-SLE-SERVER-12-SP2-2017-1800,SUSE-SLE-SERVER-12-SP3-2017-1800 SKIP SUSE-RU-2017:2910-1 as SUSE-SLE-SERVER-12-SP3-2017-1802 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1802,SUSE-SLE-SDK-12-SP3-2017-1802,SUSE-SLE-SERVER-12-SP3-2017-1802 SKIP SUSE-RU-2017:2917-1 as SUSE-SLE-WE-12-SP3-2017-1803 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1803,SUSE-SLE-DESKTOP-12-SP3-2017-1803,SUSE-SLE-RPI-12-SP2-2017-1803,SUSE-SLE-SDK-12-SP2-2017-1803,SUSE-SLE-SDK-12-SP3-2017-1803,SUSE-SLE-SERVER-12-SP2-2017-1803,SUSE-SLE-SERVER-12-SP3-2017-1803,SUSE-SLE-WE-12-SP2-2017-1803,SUSE-SLE-WE-12-SP3-2017-1803 SKIP SUSE-RU-2017:2925-1 as slessp4-rhnlib-13335 is not security or has no CVEs. patches: slessp4-rhnlib-13335 SKIP SUSE-RU-2017:2926-1 as SUSE-OpenStack-Cloud-7-2017-1811 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1811 SKIP SUSE-RU-2017:2927-1 as SUSE-SLE-SERVER-12-SP1-2017-1813 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1813,SUSE-SLE-SAP-12-SP1-2017-1813,SUSE-SLE-SERVER-12-SP1-2017-1813 SKIP SUSE-RU-2017:2945-1 as SUSE-SLE-SERVER-12-SP3-2017-1824 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1824 SKIP SUSE-RU-2017:2954-1 as SUSE-SLE-RT-12-SP2-2017-1832 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-1832,SUSE-SLE-RT-12-SP2-2017-1832 SKIP SUSE-RU-2017:2957-1 as SUSE-SLE-SERVER-12-SP2-2017-1834 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1834,SUSE-SLE-RPI-12-SP2-2017-1834,SUSE-SLE-SERVER-12-SP2-2017-1834 SKIP SUSE-RU-2017:2958-1 as slessp4-SuSEfirewall2-13340 is not security or has no CVEs. patches: slessp4-SuSEfirewall2-13340 SKIP SUSE-RU-2017:2962-1 as SUSE-SLE-Module-HPC-12-2017-1837 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1837 SKIP SUSE-RU-2017:2965-1 as SUSE-SUSE-Manager-Proxy-3.0-2017-1840 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2017-1840 SKIP SUSE-RU-2017:2970-1 as SUSE-SLE-Module-HPC-12-2017-1841 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1841 SKIP SUSE-RU-2017:2972-1 as SUSE-SLE-Module-HPC-12-2017-1843 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1843 SKIP SUSE-RU-2017:2973-1 as SUSE-SLE-Module-HPC-12-2017-1850 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1850 SKIP SUSE-RU-2017:2983-1 as SUSE-SLE-SERVER-12-SP3-2017-1848 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1848,SUSE-SLE-SAP-12-SP3-2017-1848,SUSE-SLE-SERVER-12-SP3-2017-1848 SKIP SUSE-RU-2017:2985-1 as SUSE-SLE-Module-HPC-12-2017-1845 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1845 SKIP SUSE-RU-2017:2987-1 as SUSE-SLE-Module-HPC-12-2017-1849 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1849 SKIP SUSE-RU-2017:2995-1 as SUSE-SLE-Module-HPC-12-2017-1851 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1851 SKIP SUSE-RU-2017:2997-1 as SUSE-SLE-Module-HPC-12-2017-1853 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1853 SKIP SUSE-RU-2017:3001-1 as SUSE-SLE-Module-HPC-12-2017-1857 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1857 SKIP SUSE-RU-2017:3002-1 as SUSE-SLE-Module-HPC-12-2017-1856 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1856 SKIP SUSE-RU-2017:3003-1 as SUSE-SLE-Module-HPC-12-2017-1858 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1858 SKIP SUSE-RU-2017:3004-1 as SUSE-OpenStack-Cloud-6-2017-1860 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1860 SKIP SUSE-RU-2017:3005-1 as SUSE-Storage-3-2017-1862 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1862,SUSE-Storage-3-2017-1862 SKIP SUSE-RU-2017:3006-1 as SUSE-SLE-Module-HPC-12-2017-1859 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1859 SKIP SUSE-RU-2017:3007-1 as SUSE-OpenStack-Cloud-6-2017-1861 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1861 SKIP SUSE-RU-2017:3008-1 as SUSE-Storage-3-2017-1863 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-1863,SUSE-Storage-3-2017-1863 SKIP SUSE-RU-2017:3009-1 as SUSE-SLE-Module-HPC-12-2017-1864 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1864 SKIP SUSE-RU-2017:3011-1 as SUSE-SLE-Module-HPC-12-2017-1866 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1866 SKIP SUSE-RU-2017:3012-1 as SUSE-Storage-5-2017-1867 is not security or has no CVEs. patches: SUSE-Storage-5-2017-1867 SKIP SUSE-RU-2017:3013-1 as SUSE-SLE-Module-HPC-12-2017-1868 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1868 SKIP SUSE-RU-2017:3014-1 as SUSE-SLE-Module-HPC-12-2017-1869 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2017-1869 ERROR: notice SUSE-RU-2017:3024-1 has no valid patches out of: SUSE-CAASP-ALL-2017-1871 SKIP SUSE-RU-2017:3026-1 as SUSE-SLE-SERVER-12-SP2-2017-1872 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1872,SUSE-SLE-RPI-12-SP2-2017-1872,SUSE-SLE-SERVER-12-SP2-2017-1872 SKIP SUSE-RU-2017:3038-1 as SUSE-SLE-SERVER-12-SP3-2017-1875 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1875,SUSE-SLE-DESKTOP-12-SP3-2017-1875,SUSE-SLE-RPI-12-SP2-2017-1875,SUSE-SLE-SDK-12-SP2-2017-1875,SUSE-SLE-SDK-12-SP3-2017-1875,SUSE-SLE-SERVER-12-SP2-2017-1875,SUSE-SLE-SERVER-12-SP3-2017-1875 SKIP SUSE-RU-2017:3040-1 as SUSE-SLE-HA-12-SP3-2017-1876 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2017-1876 SKIP SUSE-RU-2017:3041-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2017-1879 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1879,SUSE-SLE-DESKTOP-INSTALLER-12-SP3-2017-1879,SUSE-SLE-SAP-INSTALLER-12-SP3-2017-1879,SUSE-SLE-SERVER-12-SP3-2017-1879,SUSE-SLE-SERVER-INSTALLER-12-SP3-2017-1879 SKIP SUSE-RU-2017:3042-1 as SUSE-Storage-5-2017-1880 is not security or has no CVEs. patches: SUSE-Storage-5-2017-1880 SKIP SUSE-RU-2017:3043-1 as SUSE-SLE-SERVER-12-SP2-2017-1878 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1878,SUSE-SLE-RPI-12-SP2-2017-1878,SUSE-SLE-SDK-12-SP2-2017-1878,SUSE-SLE-SERVER-12-SP2-2017-1878 SKIP SUSE-RU-2017:3044-1 as SUSE-SLE-SERVER-12-SP3-2017-1877 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-1877,SUSE-SLE-SDK-12-SP3-2017-1877,SUSE-SLE-SERVER-12-SP3-2017-1877 SKIP SUSE-RU-2017:3045-1 as SUSE-Storage-5-2017-1885 is not security or has no CVEs. patches: SUSE-Storage-5-2017-1885 SKIP SUSE-RU-2017:3046-1 as SUSE-SLE-SERVER-12-SP3-2017-1882 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1882,SUSE-OpenStack-Cloud-6-2017-1882,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1882,SUSE-SLE-DESKTOP-12-SP2-2017-1882,SUSE-SLE-DESKTOP-12-SP3-2017-1882,SUSE-SLE-RPI-12-SP2-2017-1882,SUSE-SLE-SAP-12-SP1-2017-1882,SUSE-SLE-SERVER-12-2017-1882,SUSE-SLE-SERVER-12-SP1-2017-1882,SUSE-SLE-SERVER-12-SP2-2017-1882,SUSE-SLE-SERVER-12-SP3-2017-1882 SKIP SUSE-RU-2017:3049-1 as slessp4-timezone-13346 is not security or has no CVEs. patches: sdksp4-timezone-13346,sleposp3-timezone-13346,slessp3-timezone-13346,slessp4-timezone-13346 SKIP SUSE-RU-2017:3055-1 as SUSE-SLE-Module-Public-Cloud-12-2017-1891 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-1891 SKIP SUSE-RU-2017:3058-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2017-1892 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2017-1892 SKIP SUSE-RU-2017:3061-1 as SUSE-SLE-Module-Web-Scripting-12-2017-1893 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2017-1893 SKIP SUSE-RU-2017:3063-1 as SUSE-SLE-Module-Legacy-12-2017-1890 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2017-1890 SKIP SUSE-RU-2017:3073-1 as SUSE-SLE-Module-Containers-12-2017-1898 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2017-1898 SKIP SUSE-RU-2017:3075-1 as SUSE-SLE-SERVER-12-SP3-2017-1897 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2017-1897,SUSE-SLE-SERVER-12-SP3-2017-1897 SKIP SUSE-RU-2017:3077-1 as SUSE-SLE-WE-12-SP3-2017-1896 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1896,SUSE-SLE-DESKTOP-12-SP3-2017-1896,SUSE-SLE-WE-12-SP2-2017-1896,SUSE-SLE-WE-12-SP3-2017-1896 SKIP SUSE-RU-2017:3079-1 as SUSE-OpenStack-Cloud-7-2017-1909 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1909 SKIP SUSE-RU-2017:3081-1 as SUSE-OpenStack-Cloud-7-2017-1907 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1907 SKIP SUSE-RU-2017:3082-1 as SUSE-OpenStack-Cloud-7-2017-1914 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1914 SKIP SUSE-RU-2017:3083-1 as SUSE-Storage-4-2017-1915 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1915,SUSE-Storage-4-2017-1915 SKIP SUSE-RU-2017:3085-1 as SUSE-Storage-4-2017-1908 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1908,SUSE-Storage-4-2017-1908 SKIP SUSE-RU-2017:3087-1 as SUSE-OpenStack-Cloud-7-2017-1906 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1906 SKIP SUSE-RU-2017:3088-1 as SUSE-OpenStack-Cloud-7-2017-1912 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1912 SKIP SUSE-RU-2017:3089-1 as SUSE-Storage-4-2017-1913 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1913,SUSE-Storage-4-2017-1913 SKIP SUSE-RU-2017:3091-1 as SUSE-Storage-4-2017-1910 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-1910,SUSE-Storage-4-2017-1910 SKIP SUSE-RU-2017:3093-1 as SUSE-SLE-SERVER-12-SP3-2017-1916 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1916,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1916,SUSE-SLE-DESKTOP-12-SP2-2017-1916,SUSE-SLE-DESKTOP-12-SP3-2017-1916,SUSE-SLE-RPI-12-SP2-2017-1916,SUSE-SLE-SDK-12-SP2-2017-1916,SUSE-SLE-SDK-12-SP3-2017-1916,SUSE-SLE-SERVER-12-SP2-2017-1916,SUSE-SLE-SERVER-12-SP3-2017-1916 SKIP SUSE-RU-2017:3102-1 as SUSE-SLE-SERVER-12-SP3-2017-1917 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1917,SUSE-OpenStack-Cloud-6-2017-1917,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1917,SUSE-SLE-DESKTOP-12-SP2-2017-1917,SUSE-SLE-DESKTOP-12-SP3-2017-1917,SUSE-SLE-Module-Toolchain-12-2017-1917,SUSE-SLE-RPI-12-SP2-2017-1917,SUSE-SLE-SAP-12-SP1-2017-1917,SUSE-SLE-SDK-12-SP2-2017-1917,SUSE-SLE-SDK-12-SP3-2017-1917,SUSE-SLE-SERVER-12-2017-1917,SUSE-SLE-SERVER-12-SP1-2017-1917,SUSE-SLE-SERVER-12-SP2-2017-1917,SUSE-SLE-SERVER-12-SP3-2017-1917 SKIP SUSE-RU-2017:3112-1 as slesappsp4-sle-ha-manuals_en-13353 is not security or has no CVEs. patches: slehasp4-sle-ha-manuals_en-13353,slesappsp4-sle-ha-manuals_en-13353 SKIP SUSE-RU-2017:3113-1 as SUSE-SLE-SERVER-12-SP2-2017-1923 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1923,SUSE-SLE-RPI-12-SP2-2017-1923,SUSE-SLE-SERVER-12-SP2-2017-1923 SKIP SUSE-RU-2017:3133-1 as SUSE-Storage-5-2017-1944 is not security or has no CVEs. patches: SUSE-Storage-5-2017-1944 SKIP SUSE-RU-2017:3161-1 as SUSE-SLE-SERVER-12-SP2-2017-1964 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1964,SUSE-SLE-SERVER-12-SP2-2017-1964 SKIP SUSE-RU-2017:3163-1 as SUSE-SLE-SERVER-12-SP3-2017-1966 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1966,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1966,SUSE-SLE-DESKTOP-12-SP2-2017-1966,SUSE-SLE-DESKTOP-12-SP3-2017-1966,SUSE-SLE-RPI-12-SP2-2017-1966,SUSE-SLE-SDK-12-SP2-2017-1966,SUSE-SLE-SDK-12-SP3-2017-1966,SUSE-SLE-SERVER-12-SP2-2017-1966,SUSE-SLE-SERVER-12-SP3-2017-1966 SKIP SUSE-RU-2017:3164-1 as SUSE-SLE-SERVER-12-SP3-2017-1965 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1965,SUSE-SLE-DESKTOP-12-SP3-2017-1965,SUSE-SLE-SDK-12-SP3-2017-1965,SUSE-SLE-SERVER-12-SP3-2017-1965 SKIP SUSE-RU-2017:3166-1 as SUSE-SLE-SERVER-12-SP3-2017-1969 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1969,SUSE-SLE-DESKTOP-12-SP3-2017-1969,SUSE-SLE-RPI-12-SP2-2017-1969,SUSE-SLE-SDK-12-SP2-2017-1969,SUSE-SLE-SDK-12-SP3-2017-1969,SUSE-SLE-SERVER-12-SP2-2017-1969,SUSE-SLE-SERVER-12-SP3-2017-1969 SKIP SUSE-RU-2017:3167-1 as SUSE-SLE-SERVER-12-SP3-2017-1968 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1968,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1968,SUSE-SLE-DESKTOP-12-SP2-2017-1968,SUSE-SLE-DESKTOP-12-SP3-2017-1968,SUSE-SLE-RPI-12-SP2-2017-1968,SUSE-SLE-SERVER-12-SP2-2017-1968,SUSE-SLE-SERVER-12-SP3-2017-1968 SKIP SUSE-RU-2017:3172-1 as SUSE-SLE-SERVER-12-SP3-2017-1974 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1974,SUSE-SLE-DESKTOP-12-SP3-2017-1974,SUSE-SLE-RPI-12-SP2-2017-1974,SUSE-SLE-SERVER-12-SP2-2017-1974,SUSE-SLE-SERVER-12-SP3-2017-1974 SKIP SUSE-RU-2017:3173-1 as slessp4-zip-13357 is not security or has no CVEs. patches: slessp4-zip-13357 SKIP SUSE-RU-2017:3175-1 as SUSE-SLE-SAP-12-SP2-2017-5764 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-5764 SKIP SUSE-RU-2017:3179-1 as slessp4-open-vm-tools-13359 is not security or has no CVEs. patches: slessp4-open-vm-tools-13359 SKIP SUSE-RU-2017:3181-1 as SUSE-SLE-SERVER-12-SP3-2017-1977 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1977,SUSE-SLE-RPI-12-SP2-2017-1977,SUSE-SLE-SAP-12-SP2-2017-1977,SUSE-SLE-SDK-12-SP2-2017-1977,SUSE-SLE-SDK-12-SP3-2017-1977,SUSE-SLE-SERVER-12-SP2-2017-1977,SUSE-SLE-SERVER-12-SP3-2017-1977 SKIP SUSE-RU-2017:3182-1 as SUSE-SLE-SERVER-12-SP3-2017-1979 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-1979,SUSE-SLE-DESKTOP-12-SP3-2017-1979,SUSE-SLE-SERVER-12-SP3-2017-1979 SKIP SUSE-RU-2017:3184-1 as SUSE-SLE-SERVER-12-SP2-2017-1980 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-1980,SUSE-SLE-SERVER-12-SP2-2017-1980 SKIP SUSE-RU-2017:3185-1 as SUSE-SLE-SAP-12-SP3-2017-1989 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2017-1989 SKIP SUSE-RU-2017:3186-1 as SUSE-SLE-SERVER-12-SP3-2017-1991 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1991 SKIP SUSE-RU-2017:3187-1 as SUSE-SLE-SAP-12-SP1-2017-1992 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2017-1992 SKIP SUSE-RU-2017:3188-1 as SUSE-SLE-SERVER-12-SP2-2017-1990 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2017-1990,SUSE-SLE-SERVER-12-SP2-2017-1990 SKIP SUSE-RU-2017:3189-1 as SUSE-SLE-SERVER-12-SP3-2017-1994 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-1994 SKIP SUSE-RU-2017:3190-1 as SUSE-Storage-5-2017-1993 is not security or has no CVEs. patches: SUSE-Storage-5-2017-1993 SKIP SUSE-RU-2017:3211-1 as slessp4-mcelog-13365 is not security or has no CVEs. patches: slessp4-mcelog-13365 SKIP SUSE-RU-2017:3227-1 as SUSE-SLE-HA-12-SP3-2017-2008 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2017-2008,SUSE-SLE-HA-12-SP3-2017-2008 SKIP SUSE-RU-2017:3246-1 as SUSE-SLE-SERVER-12-SP3-2017-2021 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2021,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2021,SUSE-SLE-DESKTOP-12-SP2-2017-2021,SUSE-SLE-DESKTOP-12-SP3-2017-2021,SUSE-SLE-RPI-12-SP2-2017-2021,SUSE-SLE-SDK-12-SP2-2017-2021,SUSE-SLE-SDK-12-SP3-2017-2021,SUSE-SLE-SERVER-12-SP2-2017-2021,SUSE-SLE-SERVER-12-SP3-2017-2021 SKIP SUSE-RU-2017:3247-1 as SUSE-SLE-Module-Public-Cloud-12-2017-2026 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-2026 SKIP SUSE-RU-2017:3248-1 as SUSE-SLE-Module-Public-Cloud-12-2017-2025 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2017-2025 SKIP SUSE-RU-2017:3250-1 as slestso13-openssl-13373 is not security or has no CVEs. patches: sdksp4-openssl-13373,slessp4-openssl-13373,slestso13-openssl-13373 SKIP SUSE-RU-2017:3251-1 as SUSE-SLE-SERVER-12-SP3-2017-2027 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2017-2027 SKIP SUSE-RU-2017:3252-1 as SUSE-SLE-SAP-12-SP3-2017-2022 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2022,SUSE-SLE-DESKTOP-12-SP3-2017-2022,SUSE-SLE-Module-Legacy-12-2017-2022,SUSE-SLE-SAP-12-SP1-2017-2022,SUSE-SLE-SAP-12-SP2-2017-2022,SUSE-SLE-SAP-12-SP3-2017-2022 SKIP SUSE-RU-2017:3262-1 as slessp4-libmspack-13374 is not security or has no CVEs. patches: sdksp4-libmspack-13374,slessp4-libmspack-13374 SKIP SUSE-RU-2017:3263-1 as SUSE-SLE-SERVER-12-SP3-2017-2032 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2032,SUSE-SLE-DESKTOP-12-SP3-2017-2032,SUSE-SLE-RPI-12-SP2-2017-2032,SUSE-SLE-SERVER-12-SP2-2017-2032,SUSE-SLE-SERVER-12-SP3-2017-2032 SKIP SUSE-RU-2017:3264-1 as SUSE-SLE-SERVER-12-SP3-2017-2031 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2031,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2031,SUSE-SLE-DESKTOP-12-SP2-2017-2031,SUSE-SLE-DESKTOP-12-SP3-2017-2031,SUSE-SLE-RPI-12-SP2-2017-2031,SUSE-SLE-SERVER-12-SP2-2017-2031,SUSE-SLE-SERVER-12-SP3-2017-2031 SKIP SUSE-RU-2017:3266-1 as SUSE-SLE-WE-12-SP3-2017-2035 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-2035,SUSE-SLE-SDK-12-SP3-2017-2035,SUSE-SLE-WE-12-SP3-2017-2035 SKIP SUSE-RU-2017:3280-1 as SUSE-SLE-WE-12-SP3-2017-2036 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2036,SUSE-SLE-DESKTOP-12-SP3-2017-2036,SUSE-SLE-SDK-12-SP3-2017-2036,SUSE-SLE-SERVER-12-SP3-2017-2036,SUSE-SLE-WE-12-SP3-2017-2036 SKIP SUSE-RU-2017:3281-1 as SUSE-SLE-SERVER-12-SP3-2017-2042 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2042,SUSE-SLE-DESKTOP-12-SP3-2017-2042,SUSE-SLE-RPI-12-SP2-2017-2042,SUSE-SLE-SDK-12-SP2-2017-2042,SUSE-SLE-SDK-12-SP3-2017-2042,SUSE-SLE-SERVER-12-SP2-2017-2042,SUSE-SLE-SERVER-12-SP3-2017-2042 SKIP SUSE-RU-2017:3282-1 as SUSE-SLE-SDK-12-SP3-2017-2043 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2017-2043,SUSE-SLE-SDK-12-SP3-2017-2043 SKIP SUSE-RU-2017:3283-1 as SUSE-SLE-WE-12-SP2-2017-2041 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2041,SUSE-SLE-DESKTOP-12-SP2-2017-2041,SUSE-SLE-RPI-12-SP2-2017-2041,SUSE-SLE-SDK-12-SP2-2017-2041,SUSE-SLE-SERVER-12-SP2-2017-2041,SUSE-SLE-WE-12-SP2-2017-2041 SKIP SUSE-RU-2017:3294-1 as SUSE-SLE-Live-Patching-12-2017-2045 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2017-2045 SKIP SUSE-RU-2017:3298-1 as SUSE-SLE-SERVER-12-SP3-2017-2044 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2044,SUSE-OpenStack-Cloud-6-2017-2044,SUSE-SLE-DESKTOP-12-SP2-2017-2044,SUSE-SLE-DESKTOP-12-SP3-2017-2044,SUSE-SLE-RPI-12-SP2-2017-2044,SUSE-SLE-SAP-12-SP1-2017-2044,SUSE-SLE-SERVER-12-2017-2044,SUSE-SLE-SERVER-12-SP1-2017-2044,SUSE-SLE-SERVER-12-SP2-2017-2044,SUSE-SLE-SERVER-12-SP3-2017-2044 SKIP SUSE-RU-2017:3333-1 as SUSE-SLE-SERVER-12-SP3-2017-2088 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-2088,SUSE-SLE-SDK-12-SP3-2017-2088,SUSE-SLE-SERVER-12-SP3-2017-2088 ERROR: notice SUSE-RU-2017:3339-1 has no valid patches out of: SUSE-CAASP-ALL-2017-2089 SKIP SUSE-RU-2017:3341-1 as SUSE-SLE-SERVER-12-SP3-2017-2094 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2017-2094,SUSE-SLE-SERVER-12-SP3-2017-2094 SKIP SUSE-RU-2017:3342-1 as SUSE-SLE-SERVER-12-SP3-2017-2095 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2095,SUSE-SLE-DESKTOP-12-SP3-2017-2095,SUSE-SLE-RPI-12-SP2-2017-2095,SUSE-SLE-SDK-12-SP2-2017-2095,SUSE-SLE-SDK-12-SP3-2017-2095,SUSE-SLE-SERVER-12-SP2-2017-2095,SUSE-SLE-SERVER-12-SP3-2017-2095 ERROR: notice SUSE-RU-2017:3360-1 has no valid patches out of: SUSE-CAASP-ALL-2017-2099 SKIP SUSE-RU-2017:3361-1 as SUSE-SLE-SERVER-12-SP3-2017-2100 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2100,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2100,SUSE-SLE-DESKTOP-12-SP2-2017-2100,SUSE-SLE-DESKTOP-12-SP3-2017-2100,SUSE-SLE-RPI-12-SP2-2017-2100,SUSE-SLE-SERVER-12-SP2-2017-2100,SUSE-SLE-SERVER-12-SP3-2017-2100 SKIP SUSE-RU-2017:3371-1 as SUSE-SLE-SERVER-12-2017-2105 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2017-2105 SKIP SUSE-RU-2017:3374-1 as SUSE-SLE-SERVER-12-SP1-2017-2107 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-2107,SUSE-SLE-SAP-12-SP1-2017-2107,SUSE-SLE-SERVER-12-SP1-2017-2107 SKIP SUSE-RU-2017:3375-1 as SUSE-SLE-SERVER-12-SP1-2017-2106 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-2106,SUSE-SLE-SAP-12-SP1-2017-2106,SUSE-SLE-SERVER-12-SP1-2017-2106 SKIP SUSE-RU-2017:3376-1 as SUSE-SLE-SAP-12-SP3-2017-2108 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2017-2108,SUSE-SLE-SAP-12-SP3-2017-2108 SKIP SUSE-RU-2017:3377-1 as SUSE-SLE-SAP-12-SP3-2017-2109 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2017-2109 SKIP SUSE-RU-2017:3379-1 as SUSE-SUSE-Manager-Server-3.1-2017-2113 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2017-2113 SKIP SUSE-RU-2017:3382-1 as SUSE-SUSE-Manager-Server-3.0-2017-2118 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-2118,SUSE-SUSE-Manager-Server-3.0-2017-2118 SKIP SUSE-RU-2017:3383-1 as SUSE-SUSE-Manager-Server-3.1-2017-2110 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2017-2110,SUSE-SUSE-Manager-Server-3.1-2017-2110 SKIP SUSE-RU-2017:3384-1 as slesctsp4-clienttools-201711-13379 is not security or has no CVEs. patches: slesctsp3-clienttools-201711-13379,slesctsp4-clienttools-201711-13379 SKIP SUSE-RU-2017:3385-1 as SUSE-SUSE-Manager-Proxy-3.1-2017-2113 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2017-2113 SKIP SUSE-RU-2017:3386-1 as SUSE-SLE-Manager-Tools-12-2017-2112 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-2112 SKIP SUSE-RU-2017:3387-1 as SUSE-Storage-5-2017-2117 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2017-2117,SUSE-SUSE-Manager-Proxy-3.0-2017-2117,SUSE-SUSE-Manager-Proxy-3.1-2017-2117,SUSE-SUSE-Manager-Server-3.0-2017-2117,SUSE-SUSE-Manager-Server-3.1-2017-2117,SUSE-Storage-5-2017-2117 SKIP SUSE-RU-2017:3397-1 as SUSE-SLE-SERVER-12-SP2-2017-2128 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2128,SUSE-SLE-RPI-12-SP2-2017-2128,SUSE-SLE-SDK-12-SP2-2017-2128,SUSE-SLE-SERVER-12-SP2-2017-2128 SKIP SUSE-RU-2017:3399-1 as SUSE-OpenStack-Cloud-7-2017-2131 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-2131 SKIP SUSE-RU-2017:3400-1 as SUSE-OpenStack-Cloud-7-2017-2135 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-2135 SKIP SUSE-RU-2017:3401-1 as SUSE-Storage-4-2017-2130 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-2130,SUSE-Storage-4-2017-2130 SKIP SUSE-RU-2017:3402-1 as SUSE-OpenStack-Cloud-7-2017-2133 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-2133 SKIP SUSE-RU-2017:3403-1 as SUSE-SLE-SERVER-12-SP2-2017-2138 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2138,SUSE-SLE-RPI-12-SP2-2017-2138,SUSE-SLE-SERVER-12-SP2-2017-2138 SKIP SUSE-RU-2017:3404-1 as SUSE-SLE-WE-12-SP2-2017-2140 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2140,SUSE-SLE-RPI-12-SP2-2017-2140,SUSE-SLE-SDK-12-SP2-2017-2140,SUSE-SLE-SERVER-12-SP2-2017-2140,SUSE-SLE-WE-12-SP2-2017-2140 SKIP SUSE-RU-2017:3405-1 as SUSE-OpenStack-Cloud-7-2017-2132 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-2132 SKIP SUSE-RU-2017:3406-1 as SUSE-SLE-SERVER-12-SP2-2017-2139 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2139,SUSE-SLE-DESKTOP-12-SP2-2017-2139,SUSE-SLE-RPI-12-SP2-2017-2139,SUSE-SLE-SDK-12-SP2-2017-2139,SUSE-SLE-SERVER-12-SP2-2017-2139 SKIP SUSE-RU-2017:3407-1 as SUSE-SLE-SERVER-12-SP3-2017-2137 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2137,SUSE-SLE-DESKTOP-12-SP3-2017-2137,SUSE-SLE-SDK-12-SP3-2017-2137,SUSE-SLE-SERVER-12-SP3-2017-2137 SKIP SUSE-RU-2017:3409-1 as SUSE-OpenStack-Cloud-7-2017-2134 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2017-2134 SKIP SUSE-RU-2017:3412-1 as SUSE-SLE-SERVER-12-SP3-2017-2144 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2144,SUSE-SLE-DESKTOP-12-SP3-2017-2144,SUSE-SLE-SERVER-12-SP3-2017-2144 SKIP SUSE-RU-2017:3413-1 as SUSE-SLE-SERVER-12-SP2-2017-2143 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-2143,SUSE-SLE-DESKTOP-12-SP2-2017-2143,SUSE-SLE-RPI-12-SP2-2017-2143,SUSE-SLE-SERVER-12-SP2-2017-2143 SKIP SUSE-RU-2017:3423-1 as SUSE-SLE-SERVER-12-SP3-2017-2145 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2017-2145,SUSE-SLE-DESKTOP-12-SP3-2017-2145,SUSE-SLE-RPI-12-SP2-2017-2145,SUSE-SLE-SDK-12-SP2-2017-2145,SUSE-SLE-SDK-12-SP3-2017-2145,SUSE-SLE-SERVER-12-SP2-2017-2145,SUSE-SLE-SERVER-12-SP3-2017-2145 SKIP SUSE-RU-2017:3437-1 as SUSE-Storage-3-2017-2148 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2017-2148,SUSE-Storage-3-2017-2148 SKIP SUSE-RU-2017:3438-1 as SUSE-SLE-SERVER-12-SP3-2017-2149 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2017-2149,SUSE-SLE-DESKTOP-12-SP3-2017-2149,SUSE-SLE-SERVER-12-SP3-2017-2149 SKIP SUSE-RU-2017:3439-1 as SUSE-SLE-SERVER-12-SP3-2017-2150 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-2017-2150,SUSE-SLE-SERVER-12-SP3-2017-2150 SKIP SUSE-RU-2017:3443-1 as SUSE-SLE-Module-Toolchain-12-2017-2156 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2017-2156 SKIP SUSE-RU-2017:3444-1 as SUSE-Storage-5-2017-2158 is not security or has no CVEs. patches: SUSE-Storage-5-2017-2158 SKIP SUSE-RU-2017:3445-1 as SUSE-SLE-WE-12-SP3-2017-2157 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2017-2157,SUSE-SLE-WE-12-SP3-2017-2157 SKIP SUSE-RU-2017:3446-1 as pubclsp3-google-compute-engine-13388 is not security or has no CVEs. patches: pubclsp3-google-compute-engine-13388 SKIP SUSE-RU-2018:0004-1 as SUSE-SLE-SERVER-12-SP3-2018-4 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-4,SUSE-SLE-DESKTOP-12-SP3-2018-4,SUSE-SLE-SDK-12-SP3-2018-4,SUSE-SLE-SERVER-12-SP3-2018-4 SKIP SUSE-RU-2018:0014-1 as SUSE-SLE-WE-12-SP3-2018-17 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-17,SUSE-SLE-DESKTOP-12-SP2-2018-17,SUSE-SLE-DESKTOP-12-SP3-2018-17,SUSE-SLE-RPI-12-SP2-2018-17,SUSE-SLE-SAP-12-SP1-2018-17,SUSE-SLE-SDK-12-SP2-2018-17,SUSE-SLE-SDK-12-SP3-2018-17,SUSE-SLE-SERVER-12-2018-17,SUSE-SLE-SERVER-12-SP1-2018-17,SUSE-SLE-SERVER-12-SP2-2018-17,SUSE-SLE-SERVER-12-SP3-2018-17,SUSE-SLE-WE-12-SP2-2018-17,SUSE-SLE-WE-12-SP3-2018-17 SKIP SUSE-RU-2018:0021-1 as SUSE-SLE-SERVER-12-SP2-2018-21 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-21,SUSE-SLE-DESKTOP-12-SP2-2018-21,SUSE-SLE-RPI-12-SP2-2018-21,SUSE-SLE-SDK-12-SP2-2018-21,SUSE-SLE-SERVER-12-SP2-2018-21 SKIP SUSE-RU-2018:0024-1 as SUSE-SLE-SERVER-12-SP3-2018-22 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-22,SUSE-OpenStack-Cloud-6-2018-22,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-22,SUSE-SLE-RPI-12-SP2-2018-22,SUSE-SLE-SAP-12-SP1-2018-22,SUSE-SLE-SERVER-12-2018-22,SUSE-SLE-SERVER-12-SP1-2018-22,SUSE-SLE-SERVER-12-SP2-2018-22,SUSE-SLE-SERVER-12-SP3-2018-22 SKIP SUSE-RU-2018:0034-1 as SUSE-SLE-SERVER-12-SP2-2018-25 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-25,SUSE-SLE-DESKTOP-12-SP2-2018-25,SUSE-SLE-RPI-12-SP2-2018-25,SUSE-SLE-SDK-12-SP2-2018-25,SUSE-SLE-SERVER-12-SP2-2018-25 SKIP SUSE-RU-2018:0038-1 as SUSE-OpenStack-Cloud-7-2018-29 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-29 SKIP SUSE-RU-2018:0045-1 as SUSE-SLE-Module-Public-Cloud-12-2018-35 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-35 SKIP SUSE-RU-2018:0050-1 as SUSE-SLE-SERVER-12-SP3-2018-38 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-38,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-38,SUSE-SLE-DESKTOP-12-SP2-2018-38,SUSE-SLE-DESKTOP-12-SP3-2018-38,SUSE-SLE-RPI-12-SP2-2018-38,SUSE-SLE-SDK-12-SP2-2018-38,SUSE-SLE-SDK-12-SP3-2018-38,SUSE-SLE-SERVER-12-SP2-2018-38,SUSE-SLE-SERVER-12-SP3-2018-38 SKIP SUSE-RU-2018:0078-1 as SUSE-SLE-Module-Containers-12-2018-62 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-62,SUSE-SLE-Module-Containers-12-2018-62 SKIP SUSE-RU-2018:0080-1 as SUSE-SLE-SERVER-12-SP3-2018-66 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-66,SUSE-SLE-DESKTOP-12-SP3-2018-66,SUSE-SLE-RPI-12-SP2-2018-66,SUSE-SLE-SDK-12-SP2-2018-66,SUSE-SLE-SDK-12-SP3-2018-66,SUSE-SLE-SERVER-12-SP2-2018-66,SUSE-SLE-SERVER-12-SP3-2018-66 SKIP SUSE-RU-2018:0102-1 as SUSE-SLE-SERVER-12-SP3-2018-74 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-74,SUSE-SLE-DESKTOP-12-SP3-2018-74,SUSE-SLE-RPI-12-SP2-2018-74,SUSE-SLE-SERVER-12-SP2-2018-74,SUSE-SLE-SERVER-12-SP3-2018-74 SKIP SUSE-RU-2018:0103-1 as SUSE-SLE-SERVER-12-SP3-2018-73 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-73 SKIP SUSE-RU-2018:0104-1 as SUSE-SLE-Live-Patching-12-SP3-2018-69 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-69,SUSE-SLE-Live-Patching-12-SP3-2018-69 SKIP SUSE-RU-2018:0105-1 as SUSE-SLE-Live-Patching-12-SP3-2018-70 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-70,SUSE-SLE-Live-Patching-12-SP3-2018-70 SKIP SUSE-RU-2018:0106-1 as slessp4-xfsprogs-13412 is not security or has no CVEs. patches: sdksp4-xfsprogs-13412,slessp4-xfsprogs-13412 SKIP SUSE-RU-2018:0107-1 as SUSE-SLE-SERVER-12-SP3-2018-72 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-72,SUSE-SLE-DESKTOP-12-SP3-2018-72,SUSE-SLE-RPI-12-SP2-2018-72,SUSE-SLE-SDK-12-SP2-2018-72,SUSE-SLE-SDK-12-SP3-2018-72,SUSE-SLE-SERVER-12-SP2-2018-72,SUSE-SLE-SERVER-12-SP3-2018-72 ERROR: notice SUSE-RU-2018:0110-1 has no valid patches out of: SUSE-CAASP-ALL-2018-77 SKIP SUSE-RU-2018:0111-1 as SUSE-SLE-SERVER-12-SP3-2018-78 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-78 SKIP SUSE-RU-2018:0116-1 as slessp4-lilo-13415 is not security or has no CVEs. patches: slessp4-lilo-13415 SKIP SUSE-RU-2018:0121-1 as SUSE-SLE-SERVER-12-SP3-2018-90 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-90,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-90,SUSE-SLE-DESKTOP-12-SP2-2018-90,SUSE-SLE-DESKTOP-12-SP3-2018-90,SUSE-SLE-HA-12-SP2-2018-90,SUSE-SLE-HA-12-SP3-2018-90,SUSE-SLE-RPI-12-SP2-2018-90,SUSE-SLE-SDK-12-SP2-2018-90,SUSE-SLE-SDK-12-SP3-2018-90,SUSE-SLE-SERVER-12-SP2-2018-90,SUSE-SLE-SERVER-12-SP3-2018-90 SKIP SUSE-RU-2018:0124-1 as slessp4-libvirt-cim-13419 is not security or has no CVEs. patches: slessp4-libvirt-cim-13419 SKIP SUSE-RU-2018:0133-1 as SUSE-SLE-SERVER-12-SP2-2018-98 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-2018-98 SKIP SUSE-RU-2018:0134-1 as SUSE-SLE-SERVER-12-SP3-2018-99 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-99 SKIP SUSE-RU-2018:0136-1 as SUSE-SLE-SDK-12-SP3-2018-101 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-101 SKIP SUSE-RU-2018:0137-1 as slessp4-yast2-fcoe-client-13423 is not security or has no CVEs. patches: slessp4-yast2-fcoe-client-13423 SKIP SUSE-RU-2018:0138-1 as SUSE-SLE-SERVER-12-SP1-2018-102 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-102,SUSE-SLE-SAP-12-SP1-2018-102,SUSE-SLE-SERVER-12-SP1-2018-102 SKIP SUSE-RU-2018:0139-1 as SUSE-Storage-5-2018-105 is not security or has no CVEs. patches: SUSE-Storage-5-2018-105 SKIP SUSE-RU-2018:0141-1 as slessp4-microcode_ctl-13425 is not security or has no CVEs. patches: sleposp3-microcode_ctl-13425,slessp3-microcode_ctl-13425,slessp4-microcode_ctl-13425 SKIP SUSE-RU-2018:0142-1 as SUSE-SLE-SERVER-12-SP3-2018-111 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-111 SKIP SUSE-RU-2018:0143-1 as SUSE-SLE-SERVER-12-SP2-2018-112 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-112,SUSE-SLE-RPI-12-SP2-2018-112,SUSE-SLE-SERVER-12-SP2-2018-112 SKIP SUSE-RU-2018:0144-1 as SUSE-SLE-SERVER-12-SP2-2018-110 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-110,SUSE-SLE-SERVER-12-SP2-2018-110 SKIP SUSE-RU-2018:0145-1 as SUSE-SLE-SERVER-12-SP3-2018-109 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-109,SUSE-SLE-DESKTOP-12-SP3-2018-109,SUSE-SLE-RPI-12-SP2-2018-109,SUSE-SLE-SERVER-12-SP2-2018-109,SUSE-SLE-SERVER-12-SP3-2018-109 SKIP SUSE-RU-2018:0146-1 as SUSE-SLE-WE-12-SP3-2018-108 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-108,SUSE-SLE-DESKTOP-12-SP3-2018-108,SUSE-SLE-RPI-12-SP2-2018-108,SUSE-SLE-SDK-12-SP2-2018-108,SUSE-SLE-SDK-12-SP3-2018-108,SUSE-SLE-SERVER-12-SP2-2018-108,SUSE-SLE-SERVER-12-SP3-2018-108,SUSE-SLE-WE-12-SP2-2018-108,SUSE-SLE-WE-12-SP3-2018-108 SKIP SUSE-RU-2018:0169-1 as SUSE-SLE-WE-12-SP3-2018-113 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-113,SUSE-SLE-DESKTOP-12-SP3-2018-113,SUSE-SLE-Module-Adv-Systems-Management-12-2018-113,SUSE-SLE-WE-12-SP3-2018-113 SKIP SUSE-RU-2018:0175-1 as SUSE-SLE-SERVER-12-SP3-2018-119 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-119 SKIP SUSE-RU-2018:0176-1 as SUSE-SLE-SERVER-12-SP3-2018-120 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-120,SUSE-SLE-DESKTOP-12-SP3-2018-120,SUSE-SLE-RPI-12-SP2-2018-120,SUSE-SLE-SERVER-12-SP2-2018-120,SUSE-SLE-SERVER-12-SP3-2018-120 SKIP SUSE-RU-2018:0177-1 as SUSE-SLE-SERVER-12-SP3-2018-125 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-125,SUSE-SLE-SERVER-12-SP3-2018-125 SKIP SUSE-RU-2018:0182-1 as SUSE-SLE-SERVER-12-SP3-2018-131 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-131,SUSE-SLE-SERVER-12-SP2-2018-131,SUSE-SLE-SERVER-12-SP3-2018-131 SKIP SUSE-RU-2018:0183-1 as SUSE-SLE-SERVER-12-SP3-2018-130 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-130,SUSE-SLE-DESKTOP-12-SP3-2018-130,SUSE-SLE-SERVER-12-SP3-2018-130 SKIP SUSE-RU-2018:0184-1 as SUSE-SLE-SERVER-12-SP3-2018-132 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-132,SUSE-SLE-DESKTOP-12-SP3-2018-132,SUSE-SLE-SERVER-12-SP3-2018-132 SKIP SUSE-RU-2018:0192-1 as SUSE-SLE-SERVER-12-SP3-2018-137 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-137,SUSE-SLE-SERVER-12-SP2-2018-137,SUSE-SLE-SERVER-12-SP3-2018-137 SKIP SUSE-RU-2018:0196-1 as SUSE-Storage-4-2018-140 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-140,SUSE-Storage-4-2018-140 SKIP SUSE-RU-2018:0198-1 as SUSE-Storage-4-2018-141 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-141,SUSE-Storage-4-2018-141 SKIP SUSE-RU-2018:0199-1 as SUSE-Storage-4-2018-142 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-142,SUSE-Storage-4-2018-142 SKIP SUSE-RU-2018:0212-1 as SUSE-SLE-SERVER-12-SP3-2018-146 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-146,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-146,SUSE-SLE-DESKTOP-12-SP2-2018-146,SUSE-SLE-DESKTOP-12-SP3-2018-146,SUSE-SLE-RPI-12-SP2-2018-146,SUSE-SLE-SDK-12-SP2-2018-146,SUSE-SLE-SDK-12-SP3-2018-146,SUSE-SLE-SERVER-12-SP2-2018-146,SUSE-SLE-SERVER-12-SP3-2018-146 SKIP SUSE-RU-2018:0215-1 as slessp4-openldap2-13437 is not security or has no CVEs. patches: sdksp4-openldap2-13437,secsp3-openldap2-13437,slessp4-openldap2-13437 SKIP SUSE-RU-2018:0234-1 as SUSE-SLE-SERVER-12-SP3-2018-154 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-154 SKIP SUSE-RU-2018:0264-1 as SUSE-SLE-SERVER-12-SP3-2018-184 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-184,SUSE-SLE-DESKTOP-12-SP2-2018-184,SUSE-SLE-DESKTOP-12-SP3-2018-184,SUSE-SLE-RPI-12-SP2-2018-184,SUSE-SLE-SDK-12-SP2-2018-184,SUSE-SLE-SDK-12-SP3-2018-184,SUSE-SLE-SERVER-12-SP2-2018-184,SUSE-SLE-SERVER-12-SP3-2018-184 SKIP SUSE-RU-2018:0283-1 as SUSE-SLE-SERVER-12-SP3-2018-207 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-207,SUSE-SLE-DESKTOP-12-SP3-2018-207,SUSE-SLE-SDK-12-SP3-2018-207,SUSE-SLE-SERVER-12-SP3-2018-207 SKIP SUSE-RU-2018:0286-1 as SUSE-OpenStack-Cloud-7-2018-211 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-211 SKIP SUSE-RU-2018:0287-1 as SUSE-SLE-SERVER-12-SP3-2018-208 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-208,SUSE-SLE-RPI-12-SP2-2018-208,SUSE-SLE-SERVER-12-SP2-2018-208,SUSE-SLE-SERVER-12-SP3-2018-208 SKIP SUSE-RU-2018:0288-1 as SUSE-SUSE-Manager-Server-3.0-2018-205 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-205,SUSE-SUSE-Manager-Server-3.0-2018-205 SKIP SUSE-RU-2018:0289-1 as SUSE-SLE-SERVER-12-SP2-2018-210 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-210,SUSE-SLE-RPI-12-SP2-2018-210,SUSE-SLE-SERVER-12-SP2-2018-210 ERROR: notice SUSE-RU-2018:0290-1 has no valid patches out of: SUSE-CAASP-ALL-2018-206 SKIP SUSE-RU-2018:0292-1 as SUSE-SUSE-Manager-Proxy-3.0-2018-204 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-204 SKIP SUSE-RU-2018:0302-1 as SUSE-SLE-SERVER-12-SP3-2018-222 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-222,SUSE-SLE-DESKTOP-12-SP2-2018-222,SUSE-SLE-DESKTOP-12-SP3-2018-222,SUSE-SLE-RPI-12-SP2-2018-222,SUSE-SLE-SERVER-12-SP2-2018-222,SUSE-SLE-SERVER-12-SP3-2018-222 SKIP SUSE-RU-2018:0304-1 as slessp4-apache2-mod_nss-13452 is not security or has no CVEs. patches: slessp4-apache2-mod_nss-13452 SKIP SUSE-RU-2018:0305-1 as SUSE-Storage-5-2018-227 is not security or has no CVEs. patches: SUSE-Storage-5-2018-227 SKIP SUSE-RU-2018:0306-1 as SUSE-Storage-5-2018-228 is not security or has no CVEs. patches: SUSE-Storage-5-2018-228 SKIP SUSE-RU-2018:0330-1 as SUSE-SLE-SERVER-12-SP3-2018-233 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-233,SUSE-SLE-SERVER-12-SP3-2018-233 SKIP SUSE-RU-2018:0331-1 as SUSE-SLE-SERVER-12-SP3-2018-235 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-235,SUSE-SLE-SERVER-12-SP3-2018-235 SKIP SUSE-RU-2018:0333-1 as SUSE-SLE-SERVER-12-SP3-2018-231 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-231,SUSE-SLE-DESKTOP-12-SP2-2018-231,SUSE-SLE-DESKTOP-12-SP3-2018-231,SUSE-SLE-RPI-12-SP2-2018-231,SUSE-SLE-SERVER-12-SP2-2018-231,SUSE-SLE-SERVER-12-SP3-2018-231 SKIP SUSE-RU-2018:0335-1 as SUSE-SLE-SERVER-12-SP2-2018-232 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-232,SUSE-SLE-RPI-12-SP2-2018-232,SUSE-SLE-SERVER-12-SP2-2018-232 SKIP SUSE-RU-2018:0348-1 as SUSE-SLE-SERVER-12-SP3-2018-243 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-243,SUSE-OpenStack-Cloud-6-2018-243,SUSE-SLE-DESKTOP-12-SP2-2018-243,SUSE-SLE-DESKTOP-12-SP3-2018-243,SUSE-SLE-RPI-12-SP2-2018-243,SUSE-SLE-SAP-12-SP1-2018-243,SUSE-SLE-SDK-12-SP2-2018-243,SUSE-SLE-SDK-12-SP3-2018-243,SUSE-SLE-SERVER-12-SP2-2018-243,SUSE-SLE-SERVER-12-SP3-2018-243 SKIP SUSE-RU-2018:0353-1 as SUSE-SLE-SERVER-12-SP1-2018-251 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-251,SUSE-SLE-SAP-12-SP1-2018-251,SUSE-SLE-SERVER-12-SP1-2018-251 SKIP SUSE-RU-2018:0354-1 as SUSE-SLE-SERVER-12-SP3-2018-250 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-250,SUSE-OpenStack-Cloud-6-2018-250,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-250,SUSE-SLE-DESKTOP-12-SP2-2018-250,SUSE-SLE-DESKTOP-12-SP3-2018-250,SUSE-SLE-RPI-12-SP2-2018-250,SUSE-SLE-SAP-12-SP1-2018-250,SUSE-SLE-SERVER-12-2018-250,SUSE-SLE-SERVER-12-SP1-2018-250,SUSE-SLE-SERVER-12-SP2-2018-250,SUSE-SLE-SERVER-12-SP3-2018-250 SKIP SUSE-RU-2018:0355-1 as SUSE-SLE-WE-12-SP3-2018-249 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-249,SUSE-SLE-SDK-12-SP3-2018-249,SUSE-SLE-SERVER-12-SP3-2018-249,SUSE-SLE-WE-12-SP3-2018-249 SKIP SUSE-RU-2018:0356-1 as SUSE-SLE-SERVER-12-SP3-2018-248 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-248 SKIP SUSE-RU-2018:0357-1 as SUSE-SLE-WE-12-SP3-2018-252 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-252,SUSE-SLE-DESKTOP-12-SP3-2018-252,SUSE-SLE-SDK-12-SP2-2018-252,SUSE-SLE-SDK-12-SP3-2018-252,SUSE-SLE-WE-12-SP2-2018-252,SUSE-SLE-WE-12-SP3-2018-252 SKIP SUSE-RU-2018:0363-1 as SUSE-SLE-WE-12-SP3-2018-257 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-257,SUSE-SLE-DESKTOP-12-SP3-2018-257,SUSE-SLE-SDK-12-SP2-2018-257,SUSE-SLE-SDK-12-SP3-2018-257,SUSE-SLE-WE-12-SP2-2018-257,SUSE-SLE-WE-12-SP3-2018-257 SKIP SUSE-RU-2018:0365-1 as SUSE-SLE-SERVER-12-SP3-2018-259 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-259,SUSE-SLE-DESKTOP-12-SP3-2018-259,SUSE-SLE-RPI-12-SP2-2018-259,SUSE-SLE-SDK-12-SP2-2018-259,SUSE-SLE-SDK-12-SP3-2018-259,SUSE-SLE-SERVER-12-SP2-2018-259,SUSE-SLE-SERVER-12-SP3-2018-259 SKIP SUSE-RU-2018:0371-1 as SUSE-SLE-SERVER-12-SP3-2018-260 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-260,SUSE-SLE-DESKTOP-12-SP3-2018-260,SUSE-SLE-RPI-12-SP2-2018-260,SUSE-SLE-SDK-12-SP2-2018-260,SUSE-SLE-SDK-12-SP3-2018-260,SUSE-SLE-SERVER-12-SP2-2018-260,SUSE-SLE-SERVER-12-SP3-2018-260 SKIP SUSE-RU-2018:0375-1 as SUSE-SLE-SERVER-12-SP3-2018-265 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-265,SUSE-OpenStack-Cloud-6-2018-265,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-265,SUSE-SLE-DESKTOP-12-SP2-2018-265,SUSE-SLE-DESKTOP-12-SP3-2018-265,SUSE-SLE-RPI-12-SP2-2018-265,SUSE-SLE-SAP-12-SP1-2018-265,SUSE-SLE-SERVER-12-2018-265,SUSE-SLE-SERVER-12-SP1-2018-265,SUSE-SLE-SERVER-12-SP2-2018-265,SUSE-SLE-SERVER-12-SP3-2018-265 SKIP SUSE-RU-2018:0376-1 as SUSE-SLE-SERVER-12-SP3-2018-264 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-264,SUSE-SLE-SERVER-12-SP3-2018-264 SKIP SUSE-RU-2018:0377-1 as SUSE-SLE-SERVER-12-SP2-2018-266 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-266,SUSE-SLE-DESKTOP-12-SP2-2018-266,SUSE-SLE-RPI-12-SP2-2018-266,SUSE-SLE-SERVER-12-SP2-2018-266 SKIP SUSE-RU-2018:0378-1 as slessp4-openssl-certs-13457 is not security or has no CVEs. patches: sleposp3-openssl-certs-13457,slessp3-openssl-certs-13457,slessp4-openssl-certs-13457 SKIP SUSE-RU-2018:0380-1 as SUSE-SLE-Module-Public-Cloud-12-2018-268 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-268 SKIP SUSE-RU-2018:0382-1 as SUSE-SLE-SERVER-12-SP3-2018-269 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-269,SUSE-SLE-SERVER-12-SP3-2018-269 SKIP SUSE-RU-2018:0387-1 as SUSE-Storage-4-2018-274 is not security or has no CVEs. patches: SUSE-Storage-4-2018-274 SKIP SUSE-RU-2018:0410-1 as SUSE-SLE-SERVER-12-SP2-2018-280 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-280,SUSE-SLE-SERVER-12-SP2-2018-280 SKIP SUSE-RU-2018:0411-1 as slessp4-open-vm-tools-13460 is not security or has no CVEs. patches: slessp4-open-vm-tools-13460 SKIP SUSE-RU-2018:0412-1 as SUSE-SLE-SERVER-12-SP3-2018-279 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-279,SUSE-SLE-DESKTOP-12-SP3-2018-279,SUSE-SLE-SERVER-12-SP3-2018-279 SKIP SUSE-RU-2018:0415-1 as SUSE-SLE-SAP-12-SP2-2018-283 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-283 SKIP SUSE-RU-2018:0417-1 as SUSE-SLE-SERVER-12-SP3-2018-282 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-282 SKIP SUSE-RU-2018:0425-1 as SUSE-OpenStack-Cloud-7-2018-290 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-290 SKIP SUSE-RU-2018:0426-1 as SUSE-SLE-WE-12-SP3-2018-291 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-291,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-291,SUSE-SLE-DESKTOP-12-SP2-2018-291,SUSE-SLE-DESKTOP-12-SP3-2018-291,SUSE-SLE-RPI-12-SP2-2018-291,SUSE-SLE-SDK-12-SP2-2018-291,SUSE-SLE-SDK-12-SP3-2018-291,SUSE-SLE-SERVER-12-SP2-2018-291,SUSE-SLE-SERVER-12-SP3-2018-291,SUSE-SLE-WE-12-SP2-2018-291,SUSE-SLE-WE-12-SP3-2018-291 SKIP SUSE-RU-2018:0427-1 as SUSE-OpenStack-Cloud-7-2018-293 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-293 SKIP SUSE-RU-2018:0430-1 as SUSE-SLE-SERVER-12-SP3-2018-294 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-294,SUSE-SLE-DESKTOP-12-SP2-2018-294,SUSE-SLE-DESKTOP-12-SP3-2018-294,SUSE-SLE-SAP-12-SP1-2018-294,SUSE-SLE-SERVER-12-2018-294,SUSE-SLE-SERVER-12-SP1-2018-294,SUSE-SLE-SERVER-12-SP2-2018-294,SUSE-SLE-SERVER-12-SP3-2018-294 SKIP SUSE-RU-2018:0432-1 as SUSE-SLE-SERVER-12-SP2-2018-297 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-297,SUSE-SLE-SERVER-12-SP2-2018-297 SKIP SUSE-RU-2018:0435-1 as SUSE-SLE-SAP-12-SP3-2018-300 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-300 SKIP SUSE-RU-2018:0439-1 as SUSE-SLE-HA-12-SP3-2018-303 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-303 SKIP SUSE-RU-2018:0445-1 as SUSE-SLE-SERVER-12-SP1-2018-307 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-307,SUSE-SLE-SAP-12-SP1-2018-307,SUSE-SLE-SERVER-12-SP1-2018-307 SKIP SUSE-RU-2018:0450-1 as slessp4-gcc43-13469 is not security or has no CVEs. patches: sdksp4-gcc43-13469,slessp4-gcc43-13469 SKIP SUSE-RU-2018:0452-1 as SUSE-SLE-Live-Patching-12-SP3-2018-312 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-312,SUSE-SLE-Live-Patching-12-SP3-2018-312 SKIP SUSE-RU-2018:0463-1 as SUSE-SLE-Module-Public-Cloud-12-2018-320 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-320 SKIP SUSE-RU-2018:0495-1 as SUSE-Storage-4-2018-330 is not security or has no CVEs. patches: SUSE-Storage-4-2018-330 SKIP SUSE-RU-2018:0508-1 as SUSE-SLE-SDK-12-SP3-2018-335 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2018-335,SUSE-SLE-SDK-12-SP3-2018-335 SKIP SUSE-RU-2018:0511-1 as SUSE-SLE-Module-Public-Cloud-12-2018-341 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-341,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-341,SUSE-SLE-Module-Public-Cloud-12-2018-341 SKIP SUSE-RU-2018:0512-1 as slessp4-timezone-13480 is not security or has no CVEs. patches: sdksp4-timezone-13480,sleposp3-timezone-13480,slessp3-timezone-13480,slessp4-timezone-13480 SKIP SUSE-RU-2018:0513-1 as SUSE-Storage-3-2018-342 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-342,SUSE-Storage-3-2018-342 SKIP SUSE-RU-2018:0514-1 as SUSE-OpenStack-Cloud-6-2018-343 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-343 SKIP SUSE-RU-2018:0515-1 as pubclsp3-google-compute-engine-13479 is not security or has no CVEs. patches: pubclsp3-google-compute-engine-13479 SKIP SUSE-RU-2018:0516-1 as SUSE-SLE-Module-Public-Cloud-12-2018-339 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-339 ERROR: notice SUSE-RU-2018:0526-1 has no valid patches out of: SUSE-CAASP-ALL-2018-347 SKIP SUSE-RU-2018:0531-1 as slessp4-grub2-13484 is not security or has no CVEs. patches: slessp4-grub2-13484 ERROR: notice SUSE-RU-2018:0533-1 has no valid patches out of: SUSE-CAASP-ALL-2018-352 SKIP SUSE-RU-2018:0545-1 as SUSE-SLE-WE-12-SP3-2018-354 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-354,SUSE-SLE-DESKTOP-12-SP3-2018-354,SUSE-SLE-HA-12-SP3-2018-354,SUSE-SLE-Live-Patching-12-SP3-2018-354,SUSE-SLE-SDK-12-SP3-2018-354,SUSE-SLE-SERVER-12-SP3-2018-354,SUSE-SLE-WE-12-SP3-2018-354 SKIP SUSE-RU-2018:0547-1 as SUSE-SLE-SERVER-12-SP3-2018-356 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-356,SUSE-SLE-SDK-12-SP2-2018-356,SUSE-SLE-SDK-12-SP3-2018-356,SUSE-SLE-SERVER-12-SP2-2018-356,SUSE-SLE-SERVER-12-SP3-2018-356 SKIP SUSE-RU-2018:0549-1 as SUSE-SUSE-Manager-Proxy-3.1-2018-361 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-361 SKIP SUSE-RU-2018:0549-2 as SUSE-SUSE-Manager-Proxy-3.1-2018-361 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-361 SKIP SUSE-RU-2018:0550-1 as SUSE-SUSE-Manager-Server-3.1-2018-362 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-362,SUSE-SUSE-Manager-Server-3.1-2018-362 SKIP SUSE-RU-2018:0551-1 as SUSE-SUSE-Manager-Server-3.1-2018-359 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-359,SUSE-SUSE-Manager-Proxy-3.0-2018-359,SUSE-SUSE-Manager-Proxy-3.1-2018-359,SUSE-SUSE-Manager-Server-3.0-2018-359,SUSE-SUSE-Manager-Server-3.1-2018-359 SKIP SUSE-RU-2018:0553-1 as slesctsp4-client-tools-201801-13486 is not security or has no CVEs. patches: slesctsp3-client-tools-201801-13486,slesctsp4-client-tools-201801-13486 SKIP SUSE-RU-2018:0554-1 as slesctsp4-salt-13488 is not security or has no CVEs. patches: slesctsp3-salt-13488,slesctsp4-salt-13488 SKIP SUSE-RU-2018:0556-1 as SUSE-SLE-WE-12-SP2-2018-368 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-368,SUSE-SLE-DESKTOP-12-SP2-2018-368,SUSE-SLE-HA-12-SP2-2018-368,SUSE-SLE-Live-Patching-12-2018-368,SUSE-SLE-RPI-12-SP2-2018-368,SUSE-SLE-SDK-12-SP2-2018-368,SUSE-SLE-SERVER-12-SP2-2018-368,SUSE-SLE-WE-12-SP2-2018-368 SKIP SUSE-RU-2018:0557-1 as SUSE-SLE-SERVER-12-2018-369 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-369,SUSE-SLE-SERVER-12-2018-369 SKIP SUSE-RU-2018:0558-1 as slessp4-libica-2_1_0-13493 is not security or has no CVEs. patches: slessp4-libica-2_1_0-13493 SKIP SUSE-RU-2018:0559-1 as slessp4-libica2-13492 is not security or has no CVEs. patches: sdksp4-libica2-13492,slessp4-libica2-13492 SKIP SUSE-RU-2018:0563-1 as SUSE-Storage-4-2018-372 is not security or has no CVEs. patches: SUSE-Storage-4-2018-372 SKIP SUSE-RU-2018:0564-1 as SUSE-SLE-SERVER-12-SP2-2018-374 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-374,SUSE-SLE-DESKTOP-12-SP2-2018-374,SUSE-SLE-RPI-12-SP2-2018-374,SUSE-SLE-SERVER-12-SP2-2018-374 SKIP SUSE-RU-2018:0566-1 as SUSE-SLE-SERVER-12-SP3-2018-375 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-375,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-375,SUSE-SLE-DESKTOP-12-SP2-2018-375,SUSE-SLE-DESKTOP-12-SP3-2018-375,SUSE-SLE-RPI-12-SP2-2018-375,SUSE-SLE-SERVER-12-SP2-2018-375,SUSE-SLE-SERVER-12-SP3-2018-375 SKIP SUSE-RU-2018:0567-1 as SUSE-Storage-5-2018-377 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-377,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-377,SUSE-SLE-Manager-Tools-12-2018-377,SUSE-SLE-Module-Adv-Systems-Management-12-2018-377,SUSE-SLE-POS-12-SP2-2018-377,SUSE-SUSE-Manager-Proxy-3.0-2018-377,SUSE-SUSE-Manager-Proxy-3.1-2018-377,SUSE-SUSE-Manager-Server-3.0-2018-377,SUSE-SUSE-Manager-Server-3.1-2018-377,SUSE-Storage-3-2018-377,SUSE-Storage-4-2018-377,SUSE-Storage-5-2018-377 SKIP SUSE-RU-2018:0580-1 as SUSE-Storage-5-2018-381 is not security or has no CVEs. patches: SUSE-Storage-5-2018-381 SKIP SUSE-RU-2018:0583-1 as SUSE-SLE-SERVER-12-SP3-2018-384 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2018-384,SUSE-SLE-SDK-12-SP3-2018-384,SUSE-SLE-SERVER-12-SP2-2018-384,SUSE-SLE-SERVER-12-SP3-2018-384 SKIP SUSE-RU-2018:0610-1 as SUSE-SLE-SERVER-12-SP2-2018-418 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-418,SUSE-SLE-RPI-12-SP2-2018-418,SUSE-SLE-SERVER-12-SP2-2018-418 SKIP SUSE-RU-2018:0611-1 as SUSE-SLE-WE-12-SP3-2018-416 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-416,SUSE-SLE-DESKTOP-12-SP3-2018-416,SUSE-SLE-RPI-12-SP2-2018-416,SUSE-SLE-SERVER-12-SP2-2018-416,SUSE-SLE-SERVER-12-SP3-2018-416,SUSE-SLE-WE-12-SP2-2018-416,SUSE-SLE-WE-12-SP3-2018-416 SKIP SUSE-RU-2018:0612-1 as SUSE-SLE-SERVER-12-SP3-2018-417 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-417,SUSE-SLE-DESKTOP-12-SP2-2018-417,SUSE-SLE-DESKTOP-12-SP3-2018-417,SUSE-SLE-RPI-12-SP2-2018-417,SUSE-SLE-SERVER-12-SP2-2018-417,SUSE-SLE-SERVER-12-SP3-2018-417 SKIP SUSE-RU-2018:0613-1 as SUSE-SLE-SERVER-12-SP3-2018-419 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-419,SUSE-SLE-DESKTOP-12-SP3-2018-419,SUSE-SLE-SERVER-12-SP3-2018-419 SKIP SUSE-RU-2018:0633-1 as SUSE-SLE-SERVER-12-SP3-2018-426 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-426,SUSE-SLE-SDK-12-SP3-2018-426,SUSE-SLE-SERVER-12-SP3-2018-426 SKIP SUSE-RU-2018:0634-1 as SUSE-SLE-SERVER-12-SP3-2018-425 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-425,SUSE-SLE-SERVER-12-SP3-2018-425 SKIP SUSE-RU-2018:0635-1 as SUSE-SLE-SERVER-12-SP2-2018-427 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-427,SUSE-SLE-DESKTOP-12-SP2-2018-427,SUSE-SLE-RPI-12-SP2-2018-427,SUSE-SLE-SDK-12-SP2-2018-427,SUSE-SLE-SERVER-12-SP2-2018-427 SKIP SUSE-RU-2018:0640-1 as SUSE-SLE-SERVER-12-SP2-2018-433 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-433,SUSE-SLE-RPI-12-SP2-2018-433,SUSE-SLE-SERVER-12-SP2-2018-433 SKIP SUSE-RU-2018:0641-1 as SUSE-SLE-HA-12-SP3-2018-432 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-432 SKIP SUSE-RU-2018:0654-1 as SUSE-Storage-4-2018-442 is not security or has no CVEs. patches: SUSE-Storage-4-2018-442 SKIP SUSE-RU-2018:0669-1 as secsp3-openssl1-13506 is not security or has no CVEs. patches: secsp3-openssl1-13506 SKIP SUSE-RU-2018:0670-1 as slestso13-openssl-13507 is not security or has no CVEs. patches: sdksp4-openssl-13507,sleposp3-openssl-13507,slessp3-openssl-13507,slessp4-openssl-13507,slestso13-openssl-13507 SKIP SUSE-RU-2018:0682-1 as SUSE-SLE-WE-12-SP3-2018-462 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-462,SUSE-SLE-DESKTOP-12-SP3-2018-462,SUSE-SLE-SERVER-12-SP2-2018-462,SUSE-SLE-SERVER-12-SP3-2018-462,SUSE-SLE-WE-12-SP2-2018-462,SUSE-SLE-WE-12-SP3-2018-462 SKIP SUSE-RU-2018:0683-1 as SUSE-SLE-SERVER-12-SP3-2018-466 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-466,SUSE-SLE-SERVER-12-SP2-2018-466,SUSE-SLE-SERVER-12-SP3-2018-466 SKIP SUSE-RU-2018:0685-1 as SUSE-SLE-SERVER-12-SP3-2018-465 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-465,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-465,SUSE-SLE-DESKTOP-12-SP2-2018-465,SUSE-SLE-DESKTOP-12-SP3-2018-465,SUSE-SLE-RPI-12-SP2-2018-465,SUSE-SLE-SDK-12-SP2-2018-465,SUSE-SLE-SDK-12-SP3-2018-465,SUSE-SLE-SERVER-12-SP2-2018-465,SUSE-SLE-SERVER-12-SP3-2018-465 SKIP SUSE-RU-2018:0686-1 as SUSE-SLE-SERVER-12-SP3-2018-467 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-467,SUSE-SLE-SERVER-12-SP2-2018-467,SUSE-SLE-SERVER-12-SP3-2018-467 SKIP SUSE-RU-2018:0687-1 as SUSE-SLE-SERVER-12-SP3-2018-469 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-469 SKIP SUSE-RU-2018:0689-1 as SUSE-SLE-SERVER-12-SP2-2018-468 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-468,SUSE-SLE-RPI-12-SP2-2018-468,SUSE-SLE-SERVER-12-SP2-2018-468 SKIP SUSE-RU-2018:0690-1 as SUSE-SLE-SERVER-12-SP3-2018-472 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-472,SUSE-SLE-DESKTOP-12-SP3-2018-472,SUSE-SLE-SDK-12-SP3-2018-472,SUSE-SLE-SERVER-12-SP3-2018-472 SKIP SUSE-RU-2018:0691-1 as SUSE-SLE-SERVER-12-SP2-2018-471 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-471,SUSE-SLE-DESKTOP-12-SP2-2018-471,SUSE-SLE-RPI-12-SP2-2018-471,SUSE-SLE-SDK-12-SP2-2018-471,SUSE-SLE-SERVER-12-SP2-2018-471 SKIP SUSE-RU-2018:0692-1 as SUSE-SLE-SERVER-12-SP3-2018-470 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-470 SKIP SUSE-RU-2018:0693-1 as slessp4-java-1_7_1-ibm-13512 is not security or has no CVEs. patches: sdksp4-java-1_7_1-ibm-13512,slessp4-java-1_7_1-ibm-13512 SKIP SUSE-RU-2018:0695-1 as SUSE-SLE-SERVER-12-SP3-2018-474 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2018-474,SUSE-SLE-SDK-12-SP3-2018-474,SUSE-SLE-SERVER-12-SP2-2018-474,SUSE-SLE-SERVER-12-SP3-2018-474 SKIP SUSE-RU-2018:0706-1 as SUSE-SUSE-Manager-Server-3.0-2018-482 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-482,SUSE-SUSE-Manager-Server-3.0-2018-482 SKIP SUSE-RU-2018:0707-1 as SUSE-SLE-SERVER-12-SP3-2018-483 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-483,SUSE-SLE-SAP-12-SP1-2018-483,SUSE-SLE-SDK-12-SP2-2018-483,SUSE-SLE-SDK-12-SP3-2018-483,SUSE-SLE-SERVER-12-SP1-2018-483,SUSE-SLE-SERVER-12-SP2-2018-483,SUSE-SLE-SERVER-12-SP3-2018-483 SKIP SUSE-RU-2018:0712-1 as slessp3-java-1_7_0-ibm-13516 is not security or has no CVEs. patches: sleposp3-java-1_7_0-ibm-13516,slessp3-java-1_7_0-ibm-13516 SKIP SUSE-RU-2018:0714-1 as SUSE-SUSE-Manager-Server-3.0-2018-491 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-491,SUSE-SUSE-Manager-Server-3.0-2018-491 SKIP SUSE-RU-2018:0716-1 as SUSE-SLE-SDK-12-SP3-2018-485 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-485 SKIP SUSE-RU-2018:0718-1 as SUSE-SUSE-Manager-Server-3.1-2018-486 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-486,SUSE-SUSE-Manager-Server-3.1-2018-486 SKIP SUSE-RU-2018:0719-1 as SUSE-SUSE-Manager-Proxy-3.0-2018-492 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-492 SKIP SUSE-RU-2018:0721-1 as SUSE-SUSE-Manager-Server-3.0-2018-492 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2018-492 SKIP SUSE-RU-2018:0723-1 as SUSE-SLE-SDK-12-SP2-2018-493 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP2-2018-493 SKIP SUSE-RU-2018:0739-1 as SUSE-SLE-Live-Patching-12-SP3-2018-494 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-494,SUSE-SLE-Live-Patching-12-SP3-2018-494 SKIP SUSE-RU-2018:0740-1 as slessp3-java-1_7_0-ibm-13519 is not security or has no CVEs. patches: sleposp3-java-1_7_0-ibm-13519,slessp3-java-1_7_0-ibm-13519 SKIP SUSE-RU-2018:0741-1 as SUSE-SLE-SERVER-12-SP3-2018-497 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-497,SUSE-SLE-SAP-12-SP1-2018-497,SUSE-SLE-SDK-12-SP2-2018-497,SUSE-SLE-SDK-12-SP3-2018-497,SUSE-SLE-SERVER-12-SP1-2018-497,SUSE-SLE-SERVER-12-SP2-2018-497,SUSE-SLE-SERVER-12-SP3-2018-497 SKIP SUSE-RU-2018:0742-1 as slessp4-java-1_7_1-ibm-13518 is not security or has no CVEs. patches: sdksp4-java-1_7_1-ibm-13518,slessp4-java-1_7_1-ibm-13518 SKIP SUSE-RU-2018:0744-1 as SUSE-SLE-SERVER-12-SP3-2018-500 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-500,SUSE-SLE-SERVER-12-SP3-2018-500 SKIP SUSE-RU-2018:0746-1 as SUSE-Storage-5-2018-502 is not security or has no CVEs. patches: SUSE-Storage-5-2018-502 SKIP SUSE-RU-2018:0747-1 as SUSE-SLE-SERVER-12-SP3-2018-503 is not security or has no CVEs. patches: SUSE-CAASP-ALL-2018-503,SUSE-SLE-DESKTOP-12-SP3-2018-503,SUSE-SLE-SERVER-12-SP3-2018-503 ERROR: notice SUSE-RU-2018:0749-1 has no valid patches out of: SUSE-CAASP-ALL-2018-504 SKIP SUSE-RU-2018:0753-1 as SUSE-SLE-SERVER-12-SP3-2018-511 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-511 SKIP SUSE-RU-2018:0758-1 as SUSE-SLE-SERVER-12-SP3-2018-515 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-515,SUSE-SLE-SAP-12-SP1-2018-515,SUSE-SLE-SDK-12-SP2-2018-515,SUSE-SLE-SDK-12-SP3-2018-515,SUSE-SLE-SERVER-12-SP1-2018-515,SUSE-SLE-SERVER-12-SP2-2018-515,SUSE-SLE-SERVER-12-SP3-2018-515 SKIP SUSE-RU-2018:0759-1 as SUSE-SLE-SERVER-12-SP3-2018-514 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-514,SUSE-SLE-SAP-12-SP1-2018-514,SUSE-SLE-SDK-12-SP2-2018-514,SUSE-SLE-SDK-12-SP3-2018-514,SUSE-SLE-SERVER-12-2018-514,SUSE-SLE-SERVER-12-SP1-2018-514,SUSE-SLE-SERVER-12-SP2-2018-514,SUSE-SLE-SERVER-12-SP3-2018-514 SKIP SUSE-RU-2018:0760-1 as slessp4-java-1_7_1-ibm-13524 is not security or has no CVEs. patches: sdksp4-java-1_7_1-ibm-13524,slessp4-java-1_7_1-ibm-13524 SKIP SUSE-RU-2018:0761-1 as slessp3-java-1_7_0-ibm-13523 is not security or has no CVEs. patches: sleposp3-java-1_7_0-ibm-13523,slessp3-java-1_7_0-ibm-13523 SKIP SUSE-RU-2018:0775-1 as SUSE-SLE-SERVER-12-2018-526 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-526 SKIP SUSE-RU-2018:0776-1 as SUSE-SLE-SERVER-12-SP2-2018-527 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-527,SUSE-SLE-RPI-12-SP2-2018-527,SUSE-SLE-SERVER-12-SP2-2018-527 SKIP SUSE-RU-2018:0777-1 as SUSE-SLE-SERVER-12-SP3-2018-528 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-528 SKIP SUSE-RU-2018:0788-1 as SUSE-OpenStack-Cloud-7-2018-537 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-537 SKIP SUSE-RU-2018:0789-1 as SUSE-Storage-4-2018-538 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-538,SUSE-Storage-4-2018-538 SKIP SUSE-RU-2018:0790-1 as slessp4-release-notes-sles-13531 is not security or has no CVEs. patches: slessp4-release-notes-sles-13531 SKIP SUSE-RU-2018:0820-1 as sdksp4-gcc48-13535 is not security or has no CVEs. patches: sdksp4-gcc48-13535 ERROR: notice SUSE-RU-2018:0833-1 has no valid patches out of: SUSE-SLE-Manager-Tools-12-BETA-2018-557 SKIP SUSE-RU-2018:0835-1 as slessp4-suse-build-key-13536 is not security or has no CVEs. patches: sleposp3-suse-build-key-13536,slessp3-suse-build-key-13536,slessp4-suse-build-key-13536 SKIP SUSE-RU-2018:0836-1 as SUSE-SLE-SERVER-12-SP3-2018-560 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-560,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-560,SUSE-SLE-DESKTOP-12-SP2-2018-560,SUSE-SLE-DESKTOP-12-SP3-2018-560,SUSE-SLE-RPI-12-SP2-2018-560,SUSE-SLE-SAP-12-SP1-2018-560,SUSE-SLE-SERVER-12-2018-560,SUSE-SLE-SERVER-12-SP1-2018-560,SUSE-SLE-SERVER-12-SP2-2018-560,SUSE-SLE-SERVER-12-SP3-2018-560 SKIP SUSE-RU-2018:0860-1 as SUSE-SLE-SERVER-12-SP3-2018-575 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-575,SUSE-SLE-DESKTOP-12-SP2-2018-575,SUSE-SLE-DESKTOP-12-SP3-2018-575,SUSE-SLE-RPI-12-SP2-2018-575,SUSE-SLE-SAP-12-SP1-2018-575,SUSE-SLE-SERVER-12-2018-575,SUSE-SLE-SERVER-12-SP1-2018-575,SUSE-SLE-SERVER-12-SP2-2018-575,SUSE-SLE-SERVER-12-SP3-2018-575 SKIP SUSE-RU-2018:0868-1 as SUSE-OpenStack-Cloud-7-2018-585 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-585 SKIP SUSE-RU-2018:0869-1 as SUSE-SLE-SERVER-12-SP3-2018-587 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-587,SUSE-SLE-SERVER-12-SP3-2018-587 SKIP SUSE-RU-2018:0870-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-584 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-584,SUSE-SLE-SERVER-12-SP3-2018-584,SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-584 SKIP SUSE-RU-2018:0871-1 as SUSE-SLE-SERVER-12-SP3-2018-586 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-586,SUSE-SLE-SDK-12-SP3-2018-586,SUSE-SLE-SERVER-12-SP3-2018-586 SKIP SUSE-RU-2018:0872-1 as SUSE-SLE-Module-Public-Cloud-12-2018-590 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-590,SUSE-SLE-Module-Public-Cloud-12-2018-590 SKIP SUSE-RU-2018:0895-1 as SUSE-SLE-SERVER-12-SP2-2018-598 is not security or has no CVEs. patches: SUSE-SLE-RPI-12-SP2-2018-598,SUSE-SLE-SDK-12-SP2-2018-598,SUSE-SLE-SERVER-12-SP2-2018-598 SKIP SUSE-RU-2018:0896-1 as SUSE-SLE-SERVER-12-SP3-2018-599 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-599 SKIP SUSE-RU-2018:0897-1 as SUSE-SLE-SERVER-12-SP3-2018-600 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-600,SUSE-SLE-SERVER-12-SP3-2018-600 SKIP SUSE-RU-2018:0904-1 as SUSE-SLE-SERVER-12-SP3-2018-606 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-606,SUSE-SLE-SERVER-12-SP3-2018-606 SKIP SUSE-RU-2018:0910-1 as SUSE-SLE-SAP-12-SP3-2018-613 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-613 SKIP SUSE-RU-2018:0911-1 as SUSE-SLE-SERVER-12-SP2-2018-614 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-614,SUSE-SLE-DESKTOP-12-SP2-2018-614,SUSE-SLE-RPI-12-SP2-2018-614,SUSE-SLE-SDK-12-SP2-2018-614,SUSE-SLE-SERVER-12-SP2-2018-614 SKIP SUSE-RU-2018:0915-1 as SUSE-SLE-SERVER-12-SP3-2018-616 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-616,SUSE-SLE-DESKTOP-12-SP3-2018-616,SUSE-SLE-RPI-12-SP2-2018-616,SUSE-SLE-SDK-12-SP2-2018-616,SUSE-SLE-SDK-12-SP3-2018-616,SUSE-SLE-SERVER-12-SP2-2018-616,SUSE-SLE-SERVER-12-SP3-2018-616 SKIP SUSE-RU-2018:0921-1 as SUSE-Storage-4-2018-617 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-617,SUSE-OpenStack-Cloud-7-2018-617,SUSE-SLE-DESKTOP-12-SP2-2018-617,SUSE-SLE-DESKTOP-12-SP3-2018-617,SUSE-SLE-SAP-12-SP1-2018-617,SUSE-SLE-SAP-12-SP2-2018-617,SUSE-SLE-SERVER-12-2018-617,SUSE-SLE-SERVER-12-SP1-2018-617,SUSE-SLE-SERVER-12-SP2-2018-617,SUSE-SLE-SERVER-12-SP3-2018-617,SUSE-Storage-4-2018-617 SKIP SUSE-RU-2018:0921-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-617 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-617 SKIP SUSE-RU-2018:0928-1 as SUSE-SLE-SERVER-12-SP2-2018-626 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP2-2018-626,SUSE-SLE-RPI-12-SP2-2018-626,SUSE-SLE-SERVER-12-SP2-2018-626 SKIP SUSE-RU-2018:0929-1 as SUSE-SLE-SERVER-12-SP3-2018-625 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-625,SUSE-SLE-SAP-12-SP3-2018-625,SUSE-SLE-SERVER-12-SP3-2018-625 SKIP SUSE-RU-2018:0931-1 as SUSE-SLE-SERVER-12-SP3-2018-627 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-627,SUSE-SLE-SERVER-12-SP3-2018-627 SKIP SUSE-RU-2018:0941-1 as SUSE-Storage-4-2018-633 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-633,SUSE-SLE-DESKTOP-12-SP2-2018-633,SUSE-SLE-RPI-12-SP2-2018-633,SUSE-SLE-SAP-12-SP2-2018-633,SUSE-SLE-SDK-12-SP2-2018-633,SUSE-SLE-SERVER-12-SP2-2018-633,SUSE-SLE-WE-12-SP2-2018-633,SUSE-Storage-4-2018-633 SKIP SUSE-RU-2018:0941-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-633 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-633 SKIP SUSE-RU-2018:0944-1 as SUSE-SLE-WE-12-SP3-2018-635 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-635,SUSE-SLE-SDK-12-SP3-2018-635,SUSE-SLE-WE-12-SP3-2018-635 SKIP SUSE-RU-2018:0945-1 as SUSE-SLE-Module-HPC-12-2018-637 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-637 SKIP SUSE-RU-2018:0946-1 as SUSE-SLE-SDK-12-SP3-2018-636 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-636 SKIP SUSE-RU-2018:0948-1 as SUSE-SLE-Module-HPC-12-2018-641 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-641 SKIP SUSE-RU-2018:0949-1 as slessp4-microcode_ctl-13561 is not security or has no CVEs. patches: sleposp3-microcode_ctl-13561,slessp3-microcode_ctl-13561,slessp4-microcode_ctl-13561 SKIP SUSE-RU-2018:0950-1 as SUSE-SUSE-Manager-Server-3.1-2018-642 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-642,SUSE-SUSE-Manager-Proxy-3.1-2018-642,SUSE-SUSE-Manager-Server-3.0-2018-642,SUSE-SUSE-Manager-Server-3.1-2018-642 SKIP SUSE-RU-2018:0951-1 as slessp4-sssd-13562 is not security or has no CVEs. patches: sdksp4-sssd-13562,slessp4-sssd-13562 SKIP SUSE-RU-2018:0954-1 as SUSE-SLE-Module-HPC-12-2018-646 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-646 SKIP SUSE-RU-2018:0957-1 as slessp4-timezone-13563 is not security or has no CVEs. patches: sdksp4-timezone-13563,sleposp3-timezone-13563,slessp3-timezone-13563,slessp4-timezone-13563 SKIP SUSE-RU-2018:0977-1 as SUSE-Storage-4-2018-656 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-656,SUSE-OpenStack-Cloud-7-2018-656,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-656,SUSE-SLE-DESKTOP-12-SP3-2018-656,SUSE-SLE-SAP-12-SP1-2018-656,SUSE-SLE-SAP-12-SP2-2018-656,SUSE-SLE-SERVER-12-2018-656,SUSE-SLE-SERVER-12-SP1-2018-656,SUSE-SLE-SERVER-12-SP2-2018-656,SUSE-SLE-SERVER-12-SP3-2018-656,SUSE-Storage-4-2018-656 SKIP SUSE-RU-2018:0977-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-656 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-656 SKIP SUSE-RU-2018:0982-1 as SUSE-SLE-Module-HPC-12-2018-662 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-662 SKIP SUSE-RU-2018:1046-1 as slessp4-xorg-x11-libxcb-13569 is not security or has no CVEs. patches: sdksp4-xorg-x11-libxcb-13569,slessp4-xorg-x11-libxcb-13569 SKIP SUSE-RU-2018:1063-1 as SUSE-SLE-SERVER-12-SP3-2018-720 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-720,SUSE-SLE-SERVER-12-SP3-2018-720 SKIP SUSE-RU-2018:1064-1 as SUSE-Storage-4-2018-723 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-723,SUSE-Storage-4-2018-723 SKIP SUSE-RU-2018:1068-1 as SUSE-OpenStack-Cloud-7-2018-722 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-722 SKIP SUSE-RU-2018:1069-1 as SUSE-SLE-Manager-Tools-12-2018-725 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-725 SKIP SUSE-RU-2018:1073-1 as SUSE-SLE-SERVER-12-SP3-2018-736 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-736,SUSE-SLE-SDK-12-SP3-2018-736,SUSE-SLE-SERVER-12-SP3-2018-736 SKIP SUSE-RU-2018:1078-1 as SUSE-SLE-WE-12-SP3-2018-737 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-737,SUSE-SLE-SDK-12-SP3-2018-737,SUSE-SLE-WE-12-SP3-2018-737 SKIP SUSE-RU-2018:1081-1 as SUSE-SLE-SERVER-12-SP3-2018-739 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-739,SUSE-SLE-SERVER-12-SP3-2018-739 SKIP SUSE-RU-2018:1083-1 as slessp4-bind-13575 is not security or has no CVEs. patches: sdksp4-bind-13575,slessp4-bind-13575 ERROR: notice SUSE-RU-2018:1086-1 has no valid patches out of: SUSE-SLE-Manager-Tools-12-BETA-2018-747 ERROR: notice SUSE-RU-2018:1087-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP3-2018-748,SUSE-SLE-SERVER-12-SP3-2018-748,SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-748 SKIP SUSE-RU-2018:1089-1 as SUSE-SLE-SERVER-12-SP3-2018-746 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-746,SUSE-SLE-SDK-12-SP3-2018-746,SUSE-SLE-SERVER-12-SP3-2018-746 SKIP SUSE-RU-2018:1091-1 as SUSE-SUSE-Manager-Server-3.1-2018-745 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-745,SUSE-SUSE-Manager-Proxy-3.0-2018-745,SUSE-SUSE-Manager-Proxy-3.1-2018-745,SUSE-SUSE-Manager-Server-3.0-2018-745,SUSE-SUSE-Manager-Server-3.1-2018-745 SKIP SUSE-RU-2018:1094-1 as SUSE-SLE-SERVER-12-SP3-2018-749 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-749,SUSE-SLE-SERVER-12-SP3-2018-749 SKIP SUSE-RU-2018:1094-2 as SUSE-Storage-4-2019-723 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2019-723,SUSE-SLE-SAP-12-SP2-2019-723,SUSE-SLE-SERVER-12-SP2-2019-723,SUSE-Storage-4-2019-723 SKIP SUSE-RU-2018:1099-1 as SUSE-OpenStack-Cloud-6-2018-751 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-751 SKIP SUSE-RU-2018:1105-1 as SUSE-SUSE-Manager-Proxy-3.0-2018-758 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-758,SUSE-SUSE-Manager-Proxy-3.0-2018-758 SKIP SUSE-RU-2018:1106-1 as slesctsp4-salt-13578 is not security or has no CVEs. patches: slesctsp3-salt-13578,slesctsp4-salt-13578 SKIP SUSE-RU-2018:1107-1 as SUSE-SUSE-Manager-Server-3.1-2018-765 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-765,SUSE-SUSE-Manager-Server-3.1-2018-765 SKIP SUSE-RU-2018:1108-1 as slesctsp4-client-tools-201804-13577 is not security or has no CVEs. patches: slesctsp3-client-tools-201804-13577,slesctsp4-client-tools-201804-13577 SKIP SUSE-RU-2018:1109-1 as SUSE-SLE-SERVER-12-SP3-2018-753 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-753 SKIP SUSE-RU-2018:1110-1 as SUSE-SUSE-Manager-Server-3.1-2018-764 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2018-764 SKIP SUSE-RU-2018:1111-1 as slessp4-zypp-plugin-spacewalk-13579 is not security or has no CVEs. patches: slesctsp3-zypp-plugin-spacewalk-13579,slesctsp4-zypp-plugin-spacewalk-13579,slessp4-zypp-plugin-spacewalk-13579 SKIP SUSE-RU-2018:1112-1 as SUSE-SLE-SERVER-12-SP3-2018-754 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-754,SUSE-SLE-SERVER-12-SP3-2018-754 SKIP SUSE-RU-2018:1113-1 as SUSE-Storage-5-2018-759 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-759,SUSE-SLE-Manager-Tools-12-2018-759,SUSE-SLE-Module-Adv-Systems-Management-12-2018-759,SUSE-SUSE-Manager-Proxy-3.0-2018-759,SUSE-SUSE-Manager-Proxy-3.1-2018-759,SUSE-SUSE-Manager-Server-3.0-2018-759,SUSE-SUSE-Manager-Server-3.1-2018-759,SUSE-Storage-4-2018-759,SUSE-Storage-5-2018-759 SKIP SUSE-RU-2018:1114-1 as SUSE-SUSE-Manager-Proxy-3.1-2018-764 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-764 SKIP SUSE-RU-2018:1115-1 as slesmtsp3-smt-13584 is not security or has no CVEs. patches: slesmtsp3-smt-13584 SKIP SUSE-RU-2018:1116-1 as SUSE-Storage-4-2018-769 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-769,SUSE-OpenStack-Cloud-7-2018-769,SUSE-SLE-DESKTOP-12-SP3-2018-769,SUSE-SLE-SAP-12-SP1-2018-769,SUSE-SLE-SAP-12-SP2-2018-769,SUSE-SLE-SDK-12-SP3-2018-769,SUSE-SLE-SERVER-12-2018-769,SUSE-SLE-SERVER-12-SP1-2018-769,SUSE-SLE-SERVER-12-SP2-2018-769,SUSE-SLE-SERVER-12-SP3-2018-769,SUSE-SLE-WE-12-SP3-2018-769,SUSE-Storage-4-2018-769 SKIP SUSE-RU-2018:1116-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-769 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-769 SKIP SUSE-RU-2018:1117-1 as slestso13-gcc43-13585 is not security or has no CVEs. patches: slestso13-gcc43-13585 SKIP SUSE-RU-2018:1124-1 as SUSE-SLE-SERVER-12-SP3-2018-770 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-770 SKIP SUSE-RU-2018:1127-1 as SUSE-SLE-SDK-12-SP3-2018-774 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2018-774,SUSE-SLE-SDK-12-SP3-2018-774 SKIP SUSE-RU-2018:1131-1 as SUSE-SLE-SERVER-12-SP3-2018-778 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-778 SKIP SUSE-RU-2018:1132-1 as SUSE-SLE-SERVER-12-SP3-2018-779 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-779,SUSE-SLE-DESKTOP-12-SP3-2018-779,SUSE-SLE-SDK-12-SP3-2018-779,SUSE-SLE-SERVER-12-SP3-2018-779 SKIP SUSE-RU-2018:1133-1 as slessp4-nfs-utils-13587 is not security or has no CVEs. patches: slessp4-nfs-utils-13587 ERROR: notice SUSE-RU-2018:1141-1 has no valid patches out of: SUSE-SLE-Manager-Tools-12-BETA-2018-781 ERROR: notice SUSE-RU-2018:1144-1 has no valid patches out of: SUSE-SLE-Manager-Tools-12-BETA-2018-792 SKIP SUSE-RU-2018:1152-1 as SUSE-SLE-SERVER-12-SP1-2018-795 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-795,SUSE-SLE-SAP-12-SP1-2018-795,SUSE-SLE-SERVER-12-SP1-2018-795 SKIP SUSE-RU-2018:1153-1 as SUSE-SLE-SDK-12-SP3-2018-796 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-796,SUSE-SLE-SDK-12-SP3-2018-796 SKIP SUSE-RU-2018:1155-1 as SUSE-Storage-4-2018-797 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-797,SUSE-OpenStack-Cloud-7-2018-797,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-797,SUSE-SLE-DESKTOP-12-SP3-2018-797,SUSE-SLE-Module-Toolchain-12-2018-797,SUSE-SLE-SAP-12-SP1-2018-797,SUSE-SLE-SAP-12-SP2-2018-797,SUSE-SLE-SDK-12-SP3-2018-797,SUSE-SLE-SERVER-12-2018-797,SUSE-SLE-SERVER-12-SP1-2018-797,SUSE-SLE-SERVER-12-SP2-2018-797,SUSE-SLE-SERVER-12-SP3-2018-797,SUSE-Storage-4-2018-797 SKIP SUSE-RU-2018:1155-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-797 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-797 SKIP SUSE-RU-2018:1157-1 as SUSE-SLE-SDK-12-SP3-2018-802 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-802 SKIP SUSE-RU-2018:1159-1 as SUSE-SLE-SERVER-12-SP3-2018-799 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-799 SKIP SUSE-RU-2018:1160-1 as SUSE-SLE-SAP-12-SP3-2018-800 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-800 SKIP SUSE-RU-2018:1170-1 as SUSE-SLE-Module-Public-Cloud-12-2018-808 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-808,SUSE-SLE-Manager-Tools-12-2018-808,SUSE-SLE-Module-Containers-12-2018-808,SUSE-SLE-Module-Public-Cloud-12-2018-808 SKIP SUSE-RU-2018:1185-1 as SUSE-SLE-SERVER-12-SP3-2018-830 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-830,SUSE-SLE-SERVER-12-SP3-2018-830 SKIP SUSE-RU-2018:1186-1 as SUSE-SLE-SERVER-12-SP3-2018-832 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-832,SUSE-SLE-SERVER-12-SP3-2018-832 SKIP SUSE-RU-2018:1187-1 as SUSE-SLE-SERVER-12-SP3-2018-829 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-829 SKIP SUSE-RU-2018:1189-1 as SUSE-SLE-SAP-12-SP3-2018-834 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-834 SKIP SUSE-RU-2018:1192-1 as SUSE-SLE-SERVER-12-SP1-2018-833 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-833,SUSE-SLE-SAP-12-SP1-2018-833,SUSE-SLE-SERVER-12-SP1-2018-833 SKIP SUSE-RU-2018:1193-1 as SUSE-SLE-SERVER-12-SP1-2018-831 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-831,SUSE-SLE-SAP-12-SP1-2018-831,SUSE-SLE-SERVER-12-SP1-2018-831 SKIP SUSE-RU-2018:1200-1 as SUSE-SLE-SERVER-12-SP3-2018-837 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-837,SUSE-SLE-SERVER-12-SP3-2018-837 SKIP SUSE-RU-2018:1201-1 as SUSE-SLE-SERVER-12-SP3-2018-838 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-838,SUSE-SLE-SDK-12-SP3-2018-838,SUSE-SLE-SERVER-12-SP3-2018-838 SKIP SUSE-RU-2018:1276-1 as slessp4-libvirt-13598 is not security or has no CVEs. patches: sdksp4-libvirt-13598,slessp4-libvirt-13598 SKIP SUSE-RU-2018:1277-1 as SUSE-Storage-4-2018-899 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-899,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-899,SUSE-SLE-SAP-12-SP2-2018-899,SUSE-SLE-SERVER-12-SP2-2018-899,SUSE-Storage-4-2018-899 SKIP SUSE-RU-2018:1277-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-899 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-899 SKIP SUSE-RU-2018:1278-1 as SUSE-SLE-SERVER-12-2018-900 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-900 SKIP SUSE-RU-2018:1279-1 as SUSE-SLE-WE-12-SP3-2018-902 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-902,SUSE-SLE-WE-12-SP3-2018-902 SKIP SUSE-RU-2018:1280-1 as SUSE-Storage-4-2018-901 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-901,SUSE-SLE-SAP-12-SP2-2018-901,SUSE-SLE-SERVER-12-SP2-2018-901,SUSE-Storage-4-2018-901 SKIP SUSE-RU-2018:1280-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-901 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-901 SKIP SUSE-RU-2018:1281-1 as SUSE-Storage-4-2018-903 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-903,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-903,SUSE-SLE-SAP-12-SP2-2018-903,SUSE-SLE-SERVER-12-SP2-2018-903,SUSE-Storage-4-2018-903 SKIP SUSE-RU-2018:1281-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-903 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-903 SKIP SUSE-RU-2018:1284-1 as SUSE-SLE-SERVER-12-SP3-2018-906 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-906,SUSE-SLE-DESKTOP-12-SP3-2018-906,SUSE-SLE-SDK-12-SP3-2018-906,SUSE-SLE-SERVER-12-SP3-2018-906 SKIP SUSE-RU-2018:1285-1 as SUSE-SLE-SAP-12-SP3-2018-905 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-905,SUSE-SLE-SAP-12-SP2-2018-905,SUSE-SLE-SAP-12-SP3-2018-905 SKIP SUSE-RU-2018:1286-1 as SUSE-SUSE-Manager-Server-3.0-2018-907 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-907,SUSE-SLE-Module-Adv-Systems-Management-12-2018-907,SUSE-SLE-Module-Public-Cloud-12-2018-907,SUSE-SUSE-Manager-Proxy-3.0-2018-907,SUSE-SUSE-Manager-Server-3.0-2018-907 SKIP SUSE-RU-2018:1287-1 as SUSE-Storage-4-2018-909 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-909,SUSE-OpenStack-Cloud-7-2018-909,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-909,SUSE-SLE-SAP-12-SP1-2018-909,SUSE-SLE-SAP-12-SP2-2018-909,SUSE-SLE-SERVER-12-2018-909,SUSE-SLE-SERVER-12-SP1-2018-909,SUSE-SLE-SERVER-12-SP2-2018-909,SUSE-Storage-4-2018-909 SKIP SUSE-RU-2018:1287-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-909 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-909 SKIP SUSE-RU-2018:1292-1 as SUSE-Storage-4-2018-911 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-911,SUSE-OpenStack-Cloud-7-2018-911,SUSE-SLE-DESKTOP-12-SP3-2018-911,SUSE-SLE-SAP-12-SP1-2018-911,SUSE-SLE-SAP-12-SP2-2018-911,SUSE-SLE-SERVER-12-2018-911,SUSE-SLE-SERVER-12-SP1-2018-911,SUSE-SLE-SERVER-12-SP2-2018-911,SUSE-SLE-SERVER-12-SP3-2018-911,SUSE-Storage-4-2018-911 SKIP SUSE-RU-2018:1292-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-911 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-911 SKIP SUSE-RU-2018:1293-1 as SUSE-SLE-SERVER-12-SP3-2018-910 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-910,SUSE-SLE-DESKTOP-12-SP3-2018-910,SUSE-SLE-SERVER-12-SP3-2018-910 SKIP SUSE-RU-2018:1298-1 as slessp4-timezone-13601 is not security or has no CVEs. patches: sdksp4-timezone-13601,slessp4-timezone-13601 SKIP SUSE-RU-2018:1302-1 as SUSE-SLE-SERVER-12-2018-922 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-922 SKIP SUSE-RU-2018:1303-1 as SUSE-SLE-SERVER-12-SP1-2018-924 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-6-2018-924,SUSE-SLE-SAP-12-SP1-2018-924,SUSE-SLE-SERVER-12-SP1-2018-924 SKIP SUSE-RU-2018:1304-1 as SUSE-SLE-SERVER-12-SP3-2018-923 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-923,SUSE-SLE-SERVER-12-SP3-2018-923 SKIP SUSE-RU-2018:1306-1 as SUSE-Storage-4-2018-927 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-927,SUSE-SLE-SAP-12-SP2-2018-927,SUSE-SLE-SERVER-12-SP2-2018-927,SUSE-Storage-4-2018-927 SKIP SUSE-RU-2018:1306-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-927 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-927 SKIP SUSE-RU-2018:1307-1 as SUSE-SLE-SERVER-12-2018-929 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-929 SKIP SUSE-RU-2018:1320-1 as SUSE-SLE-SAP-12-SP3-2018-931 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-931,SUSE-SLE-SAP-12-SP3-2018-931 SKIP SUSE-RU-2018:1325-1 as SUSE-SLE-SERVER-12-SP3-2018-932 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-932,SUSE-SLE-SERVER-12-SP3-2018-932 SKIP SUSE-RU-2018:1331-1 as slessp4-mdadm-13610 is not security or has no CVEs. patches: slessp4-mdadm-13610 SKIP SUSE-RU-2018:1370-1 as SUSE-OpenStack-Cloud-8-2018-960 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-960,SUSE-OpenStack-Cloud-8-2018-960 SKIP SUSE-RU-2018:1371-1 as SUSE-SLE-HA-12-SP3-2018-953 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-953 SKIP SUSE-RU-2018:1387-1 as SUSE-SLE-SERVER-12-SP3-2018-978 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-978,SUSE-SLE-DESKTOP-12-SP3-2018-978,SUSE-SLE-SDK-12-SP3-2018-978,SUSE-SLE-SERVER-12-SP3-2018-978 SKIP SUSE-RU-2018:1388-1 as SUSE-SLE-SERVER-12-SP3-2018-970 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-970,SUSE-SLE-SDK-12-SP3-2018-970,SUSE-SLE-SERVER-12-SP3-2018-970 SKIP SUSE-RU-2018:1390-1 as SUSE-SLE-SERVER-12-SP3-2018-974 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-974,SUSE-SLE-DESKTOP-12-SP3-2018-974,SUSE-SLE-SDK-12-SP3-2018-974,SUSE-SLE-SERVER-12-SP3-2018-974 SKIP SUSE-RU-2018:1391-1 as SUSE-SLE-SERVER-12-SP3-2018-975 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-975 SKIP SUSE-RU-2018:1394-1 as SUSE-Storage-4-2018-972 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-972,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-972,SUSE-SLE-SAP-12-SP2-2018-972,SUSE-SLE-SERVER-12-SP2-2018-972,SUSE-Storage-4-2018-972 SKIP SUSE-RU-2018:1394-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-972 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-972 SKIP SUSE-RU-2018:1396-1 as SUSE-SLE-Live-Patching-12-SP3-2018-973 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-973,SUSE-SLE-Live-Patching-12-SP3-2018-973 SKIP SUSE-RU-2018:1397-1 as SUSE-SLE-SERVER-12-SP3-2018-971 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-971,SUSE-SLE-SDK-12-SP3-2018-971,SUSE-SLE-SERVER-12-SP3-2018-971 SKIP SUSE-RU-2018:1443-1 as SUSE-Storage-5-2018-989 is not security or has no CVEs. patches: SUSE-Storage-5-2018-989 SKIP SUSE-RU-2018:1444-1 as SUSE-OpenStack-Cloud-7-2018-987 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-987 SKIP SUSE-RU-2018:1445-1 as SUSE-SLE-Module-Public-Cloud-12-2018-990 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-990 SKIP SUSE-RU-2018:1446-1 as SUSE-Storage-4-2018-986 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-986,SUSE-Storage-4-2018-986 SKIP SUSE-RU-2018:1457-1 as SUSE-SLE-SERVER-12-SP3-2018-999 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-999,SUSE-SLE-SERVER-12-SP3-2018-999 SKIP SUSE-RU-2018:1461-1 as SUSE-SLE-SERVER-12-SP3-2018-998 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-998,SUSE-SLE-DESKTOP-12-SP3-2018-998,SUSE-SLE-SERVER-12-SP3-2018-998 SKIP SUSE-RU-2018:1466-1 as SUSE-SLE-SERVER-12-SP3-2018-1004 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1004,SUSE-SLE-SERVER-12-SP3-2018-1004 SKIP SUSE-RU-2018:1467-1 as slessp4-nfs-utils-13629 is not security or has no CVEs. patches: slessp4-nfs-utils-13629 SKIP SUSE-RU-2018:1468-1 as SUSE-SLE-Module-Web-Scripting-12-2018-1002 is not security or has no CVEs. patches: SUSE-SLE-Module-Web-Scripting-12-2018-1002 SKIP SUSE-RU-2018:1469-1 as SUSE-SLE-SERVER-12-SP1-2018-1005 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1005,SUSE-SLE-SERVER-12-SP1-2018-1005 SKIP SUSE-RU-2018:1481-1 as SUSE-SLE-WE-12-SP3-2018-1011 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1011,SUSE-SLE-HA-12-SP3-2018-1011,SUSE-SLE-Live-Patching-12-SP3-2018-1011,SUSE-SLE-SDK-12-SP3-2018-1011,SUSE-SLE-SERVER-12-SP3-2018-1011,SUSE-SLE-WE-12-SP3-2018-1011 SKIP SUSE-RU-2018:1483-1 as slessp3-kernel-13636 is not security or has no CVEs. patches: sleposp3-kernel-13636,slessp3-kernel-13636,slexsp3-kernel-13636 SKIP SUSE-RU-2018:1488-1 as SUSE-OpenStack-Cloud-8-2018-1016 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1016,SUSE-OpenStack-Cloud-8-2018-1016 SKIP SUSE-RU-2018:1499-1 as SUSE-SLE-SAP-12-SP3-2018-1024 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-1024 SKIP SUSE-RU-2018:1500-1 as SUSE-SLE-SERVER-12-SP3-2018-1025 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1025,SUSE-SLE-SERVER-12-SP3-2018-1025 SKIP SUSE-RU-2018:1501-1 as SUSE-SLE-SAP-12-SP2-2018-1023 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-1023 SKIP SUSE-RU-2018:1504-1 as SUSE-SLE-SERVER-12-SP3-2018-1028 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1028,SUSE-SLE-DESKTOP-12-SP3-2018-1028,SUSE-SLE-SDK-12-SP3-2018-1028,SUSE-SLE-SERVER-12-SP3-2018-1028 SKIP SUSE-RU-2018:1515-1 as SUSE-SLE-SDK-12-SP3-2018-1030 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-1030 SKIP SUSE-RU-2018:1527-1 as SUSE-SLE-HA-12-SP3-2018-1033 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1033 SKIP SUSE-RU-2018:1542-1 as SUSE-Storage-4-2018-1029 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1029,SUSE-SLE-SAP-12-SP2-2018-1029,SUSE-SLE-SAP-INSTALLER-12-SP2-2018-1029,SUSE-SLE-SERVER-12-SP2-2018-1029,SUSE-Storage-4-2018-1029 SKIP SUSE-RU-2018:1542-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1029 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1029 SKIP SUSE-RU-2018:1544-1 as SUSE-SLE-HA-12-SP3-2018-1031 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1031 SKIP SUSE-RU-2018:1547-1 as slessp4-sysvinit-13640 is not security or has no CVEs. patches: slessp4-sysvinit-13640 SKIP SUSE-RU-2018:1552-1 as SUSE-SLE-SERVER-12-SP3-2018-1076 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1076,SUSE-SLE-SERVER-12-SP3-2018-1076 SKIP SUSE-RU-2018:1568-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1084 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1084 SKIP SUSE-RU-2018:1569-1 as SUSE-SLE-SERVER-12-SP3-2018-1085 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1085,SUSE-SLE-SERVER-12-SP3-2018-1085 SKIP SUSE-RU-2018:1572-1 as SUSE-Storage-4-2018-1086 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1086,SUSE-SLE-SAP-12-SP2-2018-1086,SUSE-SLE-SERVER-12-SP2-2018-1086,SUSE-Storage-4-2018-1086 SKIP SUSE-RU-2018:1572-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1086 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1086 SKIP SUSE-RU-2018:1573-1 as slessp4-patch-13643 is not security or has no CVEs. patches: sleposp3-patch-13643,slessp3-patch-13643,slessp4-patch-13643 SKIP SUSE-RU-2018:1574-1 as SUSE-Storage-4-2018-1082 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1082,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1082,SUSE-SLE-DESKTOP-12-SP3-2018-1082,SUSE-SLE-SAP-12-SP1-2018-1082,SUSE-SLE-SAP-12-SP2-2018-1082,SUSE-SLE-SDK-12-SP3-2018-1082,SUSE-SLE-SERVER-12-2018-1082,SUSE-SLE-SERVER-12-SP1-2018-1082,SUSE-SLE-SERVER-12-SP2-2018-1082,SUSE-SLE-SERVER-12-SP3-2018-1082,SUSE-Storage-4-2018-1082 SKIP SUSE-RU-2018:1574-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1082 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1082 SKIP SUSE-RU-2018:1575-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1091 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1091,SUSE-SLE-Module-Public-Cloud-12-2018-1091 SKIP SUSE-RU-2018:1578-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1093 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1093 ERROR: notice SUSE-RU-2018:1581-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-786 ERROR: notice SUSE-RU-2018:1583-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-784 ERROR: notice SUSE-RU-2018:1584-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-783 ERROR: notice SUSE-RU-2018:1585-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-785 ERROR: notice SUSE-RU-2018:1586-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-788 ERROR: notice SUSE-RU-2018:1587-1 has no valid patches out of: SUSE-SLE-Module-Basesystem-15-2018-787 SKIP SUSE-RU-2018:1610-1 as SUSE-SLE-POS-12-SP2-2018-1098 is not security or has no CVEs. patches: SUSE-SLE-POS-12-SP2-2018-1098 SKIP SUSE-RU-2018:1646-1 as SUSE-SLE-HA-12-SP2-2018-1113 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-1113 SKIP SUSE-RU-2018:1647-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1112 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1112 SKIP SUSE-RU-2018:1649-1 as SUSE-Storage-4-2018-1116 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1116,SUSE-SLE-DESKTOP-12-SP3-2018-1116,SUSE-SLE-SAP-12-SP1-2018-1116,SUSE-SLE-SAP-12-SP2-2018-1116,SUSE-SLE-SERVER-12-2018-1116,SUSE-SLE-SERVER-12-SP1-2018-1116,SUSE-SLE-SERVER-12-SP2-2018-1116,SUSE-SLE-SERVER-12-SP3-2018-1116,SUSE-Storage-4-2018-1116 SKIP SUSE-RU-2018:1649-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1116 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1116 SKIP SUSE-RU-2018:1650-1 as SUSE-SLE-SERVER-12-SP3-2018-1117 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1117,SUSE-SLE-SERVER-12-SP3-2018-1117 SKIP SUSE-RU-2018:1651-1 as SUSE-SLE-WE-12-SP3-2018-1115 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1115,SUSE-SLE-SDK-12-SP3-2018-1115,SUSE-SLE-WE-12-SP3-2018-1115 SKIP SUSE-RU-2018:1653-1 as SUSE-Storage-4-2018-1118 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1118,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1118,SUSE-SLE-SAP-12-SP2-2018-1118,SUSE-SLE-SERVER-12-SP2-2018-1118,SUSE-Storage-4-2018-1118 SKIP SUSE-RU-2018:1653-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1118 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1118 SKIP SUSE-RU-2018:1654-1 as SUSE-SLE-SERVER-12-SP1-2018-1119 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1119,SUSE-SLE-SERVER-12-SP1-2018-1119 SKIP SUSE-RU-2018:1655-1 as SUSE-SUSE-Manager-Proxy-3.0-2018-1122 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-1122 SKIP SUSE-RU-2018:1656-1 as SUSE-SUSE-Manager-Server-3.0-2018-1123 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2018-1123 SKIP SUSE-RU-2018:1657-1 as SUSE-SLE-Module-Containers-12-2018-1124 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-1124 SKIP SUSE-RU-2018:1693-1 as SUSE-Storage-5-2018-1137 is not security or has no CVEs. patches: SUSE-Storage-5-2018-1137 SKIP SUSE-RU-2018:1700-1 as SUSE-SLE-SAP-12-SP1-2018-1143 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1143 SKIP SUSE-RU-2018:1711-1 as SUSE-SLE-SERVER-12-SP3-2018-1147 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1147 SKIP SUSE-RU-2018:1712-1 as SUSE-SLE-HA-12-SP2-2018-1146 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-1146 SKIP SUSE-RU-2018:1713-1 as SUSE-SLE-SERVER-12-SP3-2018-1145 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1145,SUSE-SLE-DESKTOP-12-SP3-2018-1145,SUSE-SLE-SDK-12-SP3-2018-1145,SUSE-SLE-SERVER-12-SP3-2018-1145 SKIP SUSE-RU-2018:1714-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1149 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1149 SKIP SUSE-RU-2018:1715-1 as SUSE-SLE-SERVER-12-SP3-2018-1144 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1144,SUSE-SLE-SERVER-12-SP3-2018-1144 SKIP SUSE-RU-2018:1716-1 as SUSE-SLE-HA-12-SP3-2018-1148 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1148 SKIP SUSE-RU-2018:1729-1 as SUSE-SLE-SERVER-12-SP3-2018-1153 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1153,SUSE-SLE-DESKTOP-12-SP3-2018-1153,SUSE-SLE-SDK-12-SP3-2018-1153,SUSE-SLE-SERVER-12-SP3-2018-1153 SKIP SUSE-RU-2018:1730-1 as SUSE-SLE-SERVER-12-SP3-2018-1154 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1154 SKIP SUSE-RU-2018:1731-1 as SUSE-SLE-HA-12-SP3-2018-1151 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1151 SKIP SUSE-RU-2018:1732-1 as SUSE-SLE-SERVER-12-SP3-2018-1152 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1152,SUSE-SLE-SDK-12-SP3-2018-1152,SUSE-SLE-SERVER-12-SP3-2018-1152 SKIP SUSE-RU-2018:1735-1 as SUSE-Storage-4-2018-1155 is not security or has no CVEs. patches: SUSE-Storage-4-2018-1155 SKIP SUSE-RU-2018:1739-1 as SUSE-SUSE-Manager-Server-3.0-2018-1167 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.0-2018-1167 SKIP SUSE-RU-2018:1740-1 as SUSE-SUSE-Manager-Server-3.1-2018-1158 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-1158,SUSE-SUSE-Manager-Proxy-3.0-2018-1158,SUSE-SUSE-Manager-Proxy-3.1-2018-1158,SUSE-SUSE-Manager-Server-3.0-2018-1158,SUSE-SUSE-Manager-Server-3.1-2018-1158 SKIP SUSE-RU-2018:1742-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1178 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1178,SUSE-OpenStack-Cloud-8-2018-1178,SUSE-OpenStack-Cloud-Crowbar-8-2018-1178 SKIP SUSE-RU-2018:1747-1 as SUSE-SUSE-Manager-Server-3.0-2018-1164 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-1164,SUSE-SUSE-Manager-Server-3.0-2018-1164 SKIP SUSE-RU-2018:1748-1 as SUSE-SUSE-Manager-Server-3.1-2018-1165 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1165,SUSE-SUSE-Manager-Server-3.1-2018-1165 SKIP SUSE-RU-2018:1749-1 as SUSE-OpenStack-Cloud-7-2018-1179 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1179 SKIP SUSE-RU-2018:1752-1 as SUSE-SLE-SERVER-12-SP3-2018-1156 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1156,SUSE-SLE-DESKTOP-12-SP3-2018-1156,SUSE-SLE-SDK-12-SP3-2018-1156,SUSE-SLE-SERVER-12-SP3-2018-1156 SKIP SUSE-RU-2018:1753-1 as slesctsp4-salt-201805-13658 is not security or has no CVEs. patches: slesctsp3-salt-201805-13658,slesctsp4-salt-201805-13658 SKIP SUSE-RU-2018:1754-1 as slesctsp4-client-tools-201805-13662 is not security or has no CVEs. patches: slesctsp3-client-tools-201805-13662,slesctsp4-client-tools-201805-13662 SKIP SUSE-RU-2018:1755-1 as SUSE-SLE-Manager-Tools-12-2018-1168 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-1168 SKIP SUSE-RU-2018:1756-1 as SUSE-SUSE-Manager-Proxy-3.0-2018-1167 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.0-2018-1167 SKIP SUSE-RU-2018:1758-1 as SUSE-SUSE-Manager-Proxy-3.1-2018-1174 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1174 SKIP SUSE-RU-2018:1763-1 as SUSE-SLE-WE-12-SP3-2018-1186 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1186,SUSE-SLE-SDK-12-SP3-2018-1186,SUSE-SLE-WE-12-SP3-2018-1186 SKIP SUSE-RU-2018:1766-1 as SUSE-Storage-5-2018-1191 is not security or has no CVEs. patches: SUSE-Storage-5-2018-1191 SKIP SUSE-RU-2018:1769-1 as SUSE-Storage-4-2018-1193 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1193,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1193,SUSE-SLE-DESKTOP-12-SP3-2018-1193,SUSE-SLE-SAP-12-SP1-2018-1193,SUSE-SLE-SAP-12-SP2-2018-1193,SUSE-SLE-SDK-12-SP3-2018-1193,SUSE-SLE-SERVER-12-2018-1193,SUSE-SLE-SERVER-12-SP1-2018-1193,SUSE-SLE-SERVER-12-SP2-2018-1193,SUSE-SLE-SERVER-12-SP3-2018-1193,SUSE-Storage-4-2018-1193 SKIP SUSE-RU-2018:1769-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1193 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1193 SKIP SUSE-RU-2018:1775-1 as slessp4-openwsman-13668 is not security or has no CVEs. patches: sdksp4-openwsman-13668,sleposp3-openwsman-13668,slessp3-openwsman-13668,slessp4-openwsman-13668 SKIP SUSE-RU-2018:1776-1 as SUSE-SLE-SERVER-12-SP3-2018-1195 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1195,SUSE-SLE-SERVER-12-SP3-2018-1195 SKIP SUSE-RU-2018:1779-1 as SUSE-SLE-SERVER-12-SP3-2018-1200 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1200,SUSE-SLE-SERVER-12-SP3-2018-1200 SKIP SUSE-RU-2018:1780-1 as SUSE-SLE-SERVER-12-SP3-2018-1201 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1201 SKIP SUSE-RU-2018:1782-1 as slessp4-xorg-x11-libX11-13670 is not security or has no CVEs. patches: sdksp4-xorg-x11-libX11-13670,slessp4-xorg-x11-libX11-13670 SKIP SUSE-RU-2018:1785-1 as SUSE-SLE-SERVER-12-SP1-2018-1207 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1207,SUSE-SLE-SERVER-12-SP1-2018-1207 SKIP SUSE-RU-2018:1787-1 as slehasp4-ctdb-13674 is not security or has no CVEs. patches: sdksp4-ctdb-13674,slehasp4-ctdb-13674 SKIP SUSE-RU-2018:1788-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1215 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1215,SUSE-OpenStack-Cloud-8-2018-1215,SUSE-OpenStack-Cloud-Crowbar-8-2018-1215 SKIP SUSE-RU-2018:1789-1 as SUSE-Storage-4-2018-1209 is not security or has no CVEs. patches: SUSE-Storage-4-2018-1209 SKIP SUSE-RU-2018:1790-1 as slessp4-s390-tools-13673 is not security or has no CVEs. patches: slessp4-s390-tools-13673 SKIP SUSE-RU-2018:1791-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1210 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1210 SKIP SUSE-RU-2018:1792-1 as SUSE-SLE-SAP-12-SP3-2018-1212 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-1212 SKIP SUSE-RU-2018:1812-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1216 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1216,SUSE-OpenStack-Cloud-8-2018-1216,SUSE-OpenStack-Cloud-Crowbar-8-2018-1216 SKIP SUSE-RU-2018:1813-1 as SUSE-Storage-4-2018-1218 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1218,SUSE-SLE-DESKTOP-12-SP3-2018-1218,SUSE-SLE-SAP-12-SP2-2018-1218,SUSE-SLE-SERVER-12-SP2-2018-1218,SUSE-SLE-SERVER-12-SP3-2018-1218,SUSE-SLE-WE-12-SP3-2018-1218,SUSE-Storage-4-2018-1218 SKIP SUSE-RU-2018:1813-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1218 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1218 SKIP SUSE-RU-2018:1817-1 as SUSE-SLE-WE-12-SP3-2018-1225 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1225,SUSE-SLE-SDK-12-SP3-2018-1225,SUSE-SLE-SERVER-12-SP3-2018-1225,SUSE-SLE-WE-12-SP3-2018-1225 SKIP SUSE-RU-2018:1818-1 as SUSE-SLE-SERVER-12-SP3-2018-1226 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-1226,SUSE-SLE-SERVER-12-SP3-2018-1226 SKIP SUSE-RU-2018:1819-1 as slessp4-kdump-13677 is not security or has no CVEs. patches: slessp4-kdump-13677 SKIP SUSE-RU-2018:1824-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1231 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1231,SUSE-OpenStack-Cloud-8-2018-1231,SUSE-OpenStack-Cloud-Crowbar-8-2018-1231 SKIP SUSE-RU-2018:1827-1 as SUSE-OpenStack-Cloud-8-2018-1232 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1232,SUSE-OpenStack-Cloud-8-2018-1232 SKIP SUSE-RU-2018:1829-1 as slessp4-yast2-ftp-server-13682 is not security or has no CVEs. patches: sdksp4-yast2-ftp-server-13682,slessp4-yast2-ftp-server-13682 SKIP SUSE-RU-2018:1837-1 as SUSE-SUSE-Manager-Server-3.1-2018-1243 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2018-1243 SKIP SUSE-RU-2018:1838-1 as SUSE-SLE-SERVER-12-SP3-2018-1244 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1244,SUSE-SLE-SERVER-12-SP3-2018-1244 SKIP SUSE-RU-2018:1852-1 as SUSE-Storage-4-2018-1252 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1252,SUSE-Storage-4-2018-1252 SKIP SUSE-RU-2018:1856-1 as slessp4-clamav-13687 is not security or has no CVEs. patches: sleposp3-clamav-13687,slessp3-clamav-13687,slessp4-clamav-13687 SKIP SUSE-RU-2018:1857-1 as SUSE-OpenStack-Cloud-7-2018-1254 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1254 SKIP SUSE-RU-2018:1863-1 as SUSE-SLE-SERVER-12-SP3-2018-1255 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1255 SKIP SUSE-RU-2018:1864-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1258 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Crowbar-8-2018-1258 SKIP SUSE-RU-2018:1865-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1257 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1257,SUSE-OpenStack-Cloud-8-2018-1257,SUSE-OpenStack-Cloud-Crowbar-8-2018-1257 SKIP SUSE-RU-2018:1866-1 as SUSE-SLE-Module-Basesystem-15-2018-1264 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1264 SKIP SUSE-RU-2018:1867-1 as SUSE-SLE-SERVER-12-SP3-2018-1259 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1259 SKIP SUSE-RU-2018:1868-1 as SUSE-Storage-4-2018-1261 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1261,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1261,SUSE-SLE-SAP-12-SP2-2018-1261,SUSE-SLE-SERVER-12-SP2-2018-1261,SUSE-Storage-4-2018-1261 SKIP SUSE-RU-2018:1868-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1261 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1261 SKIP SUSE-RU-2018:1869-1 as SUSE-SLE-SERVER-12-SP3-2018-1263 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1263,SUSE-SLE-SERVER-12-SP3-2018-1263 SKIP SUSE-RU-2018:1870-1 as SUSE-SLE-SERVER-12-SP3-2018-1260 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1260,SUSE-SLE-SERVER-12-SP3-2018-1260 SKIP SUSE-RU-2018:1871-1 as SUSE-Storage-4-2018-1262 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1262,SUSE-SLE-SAP-12-SP1-2018-1262,SUSE-SLE-SAP-12-SP2-2018-1262,SUSE-SLE-SERVER-12-2018-1262,SUSE-SLE-SERVER-12-SP1-2018-1262,SUSE-SLE-SERVER-12-SP2-2018-1262,SUSE-Storage-4-2018-1262 SKIP SUSE-RU-2018:1871-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1262 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1262 SKIP SUSE-RU-2018:1875-1 as SUSE-OpenStack-Cloud-8-2018-1270 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1270,SUSE-OpenStack-Cloud-8-2018-1270 SKIP SUSE-RU-2018:1876-1 as SUSE-SLE-SERVER-12-SP3-2018-1269 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1269,SUSE-SLE-SERVER-12-SP3-2018-1269 SKIP SUSE-RU-2018:1877-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1271 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1271,SUSE-OpenStack-Cloud-8-2018-1271,SUSE-OpenStack-Cloud-Crowbar-8-2018-1271 SKIP SUSE-RU-2018:1878-1 as SUSE-SLE-SAP-12-SP1-2018-1273 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1273 SKIP SUSE-RU-2018:1879-1 as SUSE-SLE-SAP-12-SP3-2018-1272 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-1272,SUSE-SLE-SAP-12-SP3-2018-1272 SKIP SUSE-RU-2018:1880-1 as slessp4-biosdevname-13688 is not security or has no CVEs. patches: slessp4-biosdevname-13688 SKIP SUSE-RU-2018:1881-1 as slessp4-fontconfig-13689 is not security or has no CVEs. patches: sdksp4-fontconfig-13689,slessp4-fontconfig-13689 SKIP SUSE-RU-2018:1891-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1285 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1285,SUSE-OpenStack-Cloud-8-2018-1285,SUSE-OpenStack-Cloud-Crowbar-8-2018-1285 SKIP SUSE-RU-2018:1903-1 as SUSE-SLE-SERVER-12-SP3-2018-1289 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1289,SUSE-SLE-SERVER-12-SP3-2018-1289 SKIP SUSE-RU-2018:1915-1 as SUSE-SLE-SERVER-12-SP3-2018-1290 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1290,SUSE-SLE-SERVER-12-SP3-2018-1290 SKIP SUSE-RU-2018:1919-1 as SUSE-OpenStack-Cloud-8-2018-1294 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1294,SUSE-OpenStack-Cloud-8-2018-1294 SKIP SUSE-RU-2018:1927-1 as SUSE-SLE-Module-Public-Cloud-15-2018-1307 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-15-2018-1307 SKIP SUSE-RU-2018:1928-1 as slessp4-gdm-13692 is not security or has no CVEs. patches: slessp4-gdm-13692 SKIP SUSE-RU-2018:1929-1 as SUSE-SUSE-Manager-Server-3.1-2018-1300 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2018-1300 SKIP SUSE-RU-2018:1929-2 as SUSE-SUSE-Manager-Server-3.1-2018-1300 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2018-1300 SKIP SUSE-RU-2018:1930-1 as pubclsp3-google-compute-engine-13691 is not security or has no CVEs. patches: pubclsp3-google-compute-engine-13691 SKIP SUSE-RU-2018:1931-1 as SUSE-SUSE-Manager-Server-3.1-2018-1301 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1301,SUSE-SUSE-Manager-Server-3.1-2018-1301 SKIP SUSE-RU-2018:1932-1 as SUSE-SLE-SERVER-12-SP3-2018-1304 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1304,SUSE-SLE-SDK-12-SP3-2018-1304,SUSE-SLE-SERVER-12-SP3-2018-1304 SKIP SUSE-RU-2018:1933-1 as SUSE-SUSE-Manager-Proxy-3.1-2018-1300 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1300 SKIP SUSE-RU-2018:1933-2 as SUSE-SUSE-Manager-Proxy-3.1-2018-1300 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1300 SKIP SUSE-RU-2018:1934-1 as SUSE-SLE-Module-Basesystem-15-2018-1303 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1303 SKIP SUSE-RU-2018:1941-1 as SUSE-SLE-WE-12-SP3-2018-1320 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1320,SUSE-SLE-SERVER-12-SP3-2018-1320,SUSE-SLE-WE-12-SP3-2018-1320 SKIP SUSE-RU-2018:1970-1 as SUSE-SLE-Module-Server-Applications-15-2018-1333 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1333,SUSE-SLE-Module-Server-Applications-15-2018-1333 SKIP SUSE-RU-2018:1973-1 as SUSE-SLE-Module-Basesystem-15-2018-1334 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1334 SKIP SUSE-RU-2018:1974-1 as SUSE-SLE-Module-Basesystem-15-2018-1332 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1332 SKIP SUSE-RU-2018:1975-1 as SUSE-SLE-Module-Basesystem-15-2018-1330 is not security or has no CVEs. patches: SUSE-SLE-INSTALLER-15-2018-1330,SUSE-SLE-Module-Basesystem-15-2018-1330 SKIP SUSE-RU-2018:1976-1 as SUSE-SLE-Module-Server-Applications-15-2018-1331 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-1331 SKIP SUSE-RU-2018:1978-1 as SUSE-SLE-Module-Public-Cloud-15-2018-1335 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-15-2018-1335 SKIP SUSE-RU-2018:1979-1 as SUSE-SLE-Module-Containers-12-2018-1336 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-1336 SKIP SUSE-RU-2018:1980-1 as SUSE-SLE-SERVER-12-SP3-2018-1337 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-1337,SUSE-SLE-SERVER-12-SP3-2018-1337 SKIP SUSE-RU-2018:1985-1 as SUSE-SLE-SERVER-12-SP3-2018-1344 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1344,SUSE-SLE-SERVER-12-SP3-2018-1344 SKIP SUSE-RU-2018:1986-1 as SUSE-SLE-Module-Basesystem-15-2018-1345 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1345 SKIP SUSE-RU-2018:1999-1 as SUSE-SLE-Module-HPC-15-2018-1361 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-1361 SKIP SUSE-RU-2018:2000-1 as SUSE-SLE-Module-Basesystem-15-2018-1362 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1362 SKIP SUSE-RU-2018:2002-1 as SUSE-SLE-SERVER-12-SP3-2018-1358 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1358,SUSE-SLE-SERVER-12-SP3-2018-1358 SKIP SUSE-RU-2018:2003-1 as SUSE-SLE-SERVER-12-SP3-2018-1359 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1359,SUSE-SLE-SERVER-12-SP3-2018-1359 SKIP SUSE-RU-2018:2004-1 as slestso13-dbus-1-13697 is not security or has no CVEs. patches: sdksp4-dbus-1-13697,slessp4-dbus-1-13697,slestso13-dbus-1-13697 SKIP SUSE-RU-2018:2007-1 as SUSE-SLE-SERVER-12-SP3-2018-1364 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1364,SUSE-SLE-SERVER-12-SP3-2018-1364 SKIP SUSE-RU-2018:2008-1 as SUSE-SLE-Module-HPC-15-2018-1366 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-1366 SKIP SUSE-RU-2018:2009-1 as SUSE-SLE-Module-HPC-15-2018-1365 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-1365 SKIP SUSE-RU-2018:2028-1 as SUSE-SLE-Module-Containers-12-2018-1367 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-1367 SKIP SUSE-RU-2018:2029-1 as SUSE-SLE-SERVER-12-SP3-2018-1369 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1369,SUSE-SLE-SERVER-12-SP3-2018-1369 SKIP SUSE-RU-2018:2030-1 as SUSE-SLE-Module-HPC-12-2018-1368 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-1368 SKIP SUSE-RU-2018:2031-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1370 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1370,SUSE-OpenStack-Cloud-8-2018-1370,SUSE-OpenStack-Cloud-Crowbar-8-2018-1370 SKIP SUSE-RU-2018:2050-1 as SUSE-SLE-Module-Basesystem-15-2018-1386 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1386 SKIP SUSE-RU-2018:2060-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2018-1390 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2018-1390 SKIP SUSE-RU-2018:2063-1 as SUSE-SLE-Module-Basesystem-15-2018-1392 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1392 SKIP SUSE-RU-2018:2077-1 as SUSE-SLE-Module-Basesystem-15-2018-1409 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1409 SKIP SUSE-RU-2018:2078-1 as SUSE-SLE-Module-SAP-Applications-15-2018-1411 is not security or has no CVEs. patches: SUSE-SLE-Module-SAP-Applications-15-2018-1411 SKIP SUSE-RU-2018:2079-1 as SUSE-SLE-SAP-12-SP3-2018-1410 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-1410 SKIP SUSE-RU-2018:2080-1 as SUSE-SLE-Module-Toolchain-12-2018-1412 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2018-1412 SKIP SUSE-RU-2018:2136-1 as slessp4-grub-13707 is not security or has no CVEs. patches: slessp4-grub-13707 SKIP SUSE-RU-2018:2137-1 as SUSE-SLE-Product-SLES-15-2018-1451 is not security or has no CVEs. patches: SUSE-SLE-Product-SLES-15-2018-1451 SKIP SUSE-RU-2018:2140-1 as SUSE-SLE-SERVER-12-SP3-2018-1450 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1450,SUSE-SLE-DESKTOP-12-SP3-2018-1450,SUSE-SLE-SDK-12-SP3-2018-1450,SUSE-SLE-SERVER-12-SP3-2018-1450 SKIP SUSE-RU-2018:2146-1 as SUSE-Storage-5-2018-1457 is not security or has no CVEs. patches: SUSE-Storage-5-2018-1457 SKIP SUSE-RU-2018:2147-1 as SUSE-SLE-SERVER-12-SP1-2018-1461 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1461,SUSE-SLE-SERVER-12-2018-1461,SUSE-SLE-SERVER-12-SP1-2018-1461 SKIP SUSE-RU-2018:2148-1 as SUSE-SLE-Module-Development-Tools-15-2018-1458 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1458,SUSE-SLE-Module-Development-Tools-15-2018-1458 SKIP SUSE-RU-2018:2149-1 as SUSE-SLE-Module-Basesystem-15-2018-1459 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1459 SKIP SUSE-RU-2018:2151-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1463 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-1463 SKIP SUSE-RU-2018:2160-1 as SUSE-SLE-SERVER-12-SP3-2018-1467 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1467,SUSE-SLE-SDK-12-SP3-2018-1467,SUSE-SLE-SERVER-12-SP3-2018-1467 SKIP SUSE-RU-2018:2161-1 as SUSE-SLE-Product-SLED-15-2018-1465 is not security or has no CVEs. patches: SUSE-SLE-Product-SLED-15-2018-1465 SKIP SUSE-RU-2018:2164-1 as SUSE-SLE-SERVER-12-SP3-2018-1466 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1466,SUSE-SLE-SERVER-12-SP3-2018-1466 SKIP SUSE-RU-2018:2168-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1472 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1472,SUSE-OpenStack-Cloud-8-2018-1472,SUSE-OpenStack-Cloud-Crowbar-8-2018-1472 SKIP SUSE-RU-2018:2169-1 as SUSE-OpenStack-Cloud-8-2018-1473 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1473,SUSE-OpenStack-Cloud-8-2018-1473 SKIP SUSE-RU-2018:2173-1 as SUSE-SLE-Module-Development-Tools-15-2018-1477 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-1477 SKIP SUSE-RU-2018:2175-1 as SUSE-SLE-Module-Basesystem-15-2018-1478 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1478 SKIP SUSE-RU-2018:2179-1 as SUSE-SLE-SERVER-12-SP3-2018-1483 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1483,SUSE-SLE-SERVER-12-SP3-2018-1483 SKIP SUSE-RU-2018:2182-1 as SUSE-SLE-Product-HA-15-2018-1488 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1488,SUSE-SLE-Product-HA-15-2018-1488 SKIP SUSE-RU-2018:2183-1 as SUSE-SLE-Module-Basesystem-15-2018-1486 is not security or has no CVEs. patches: SUSE-SLE-INSTALLER-15-2018-1486,SUSE-SLE-Module-Basesystem-15-2018-1486 SKIP SUSE-RU-2018:2186-1 as SUSE-SLE-Product-HPC-15-2018-1489 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-1489,SUSE-SLE-Product-HPC-15-2018-1489 SKIP SUSE-RU-2018:2190-1 as SUSE-Storage-4-2018-1485 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1485,SUSE-SLE-DESKTOP-12-SP3-2018-1485,SUSE-SLE-SAP-12-SP1-2018-1485,SUSE-SLE-SAP-12-SP2-2018-1485,SUSE-SLE-SERVER-12-2018-1485,SUSE-SLE-SERVER-12-SP1-2018-1485,SUSE-SLE-SERVER-12-SP2-2018-1485,SUSE-SLE-SERVER-12-SP3-2018-1485,SUSE-Storage-4-2018-1485 SKIP SUSE-RU-2018:2190-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1485 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1485 SKIP SUSE-RU-2018:2191-1 as SUSE-SLE-SERVER-12-SP3-2018-1487 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1487 SKIP SUSE-RU-2018:2192-1 as SUSE-Storage-5-2018-1493 is not security or has no CVEs. patches: SUSE-Storage-5-2018-1493 SKIP SUSE-RU-2018:2196-1 as SUSE-SLE-Product-HA-15-2018-1492 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-1492 SKIP SUSE-RU-2018:2197-1 as slessp4-kernel-13711 is not security or has no CVEs. patches: sdksp4-kernel-13711,slessp4-kernel-13711,slexsp3-kernel-13711 SKIP SUSE-RU-2018:2200-1 as slessp3-kernel-13712 is not security or has no CVEs. patches: sleposp3-kernel-13712,slessp3-kernel-13712,slexsp3-kernel-13712 SKIP SUSE-RU-2018:2216-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1499 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1499,SUSE-SLE-Module-Public-Cloud-12-2018-1499 SKIP SUSE-RU-2018:2224-1 as SUSE-SLE-SERVER-12-SP3-2018-1507 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1507 SKIP SUSE-RU-2018:2225-1 as SUSE-SLE-Module-HPC-12-2018-1506 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-1506 SKIP SUSE-RU-2018:2234-1 as SUSE-OpenStack-Cloud-8-2018-1513 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1513,SUSE-OpenStack-Cloud-8-2018-1513 SKIP SUSE-RU-2018:2244-1 as SUSE-SLE-Module-Server-Applications-15-2018-1516 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-1516 SKIP SUSE-RU-2018:2272-1 as SUSE-Storage-4-2018-1530 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1530,SUSE-SLE-DESKTOP-12-SP3-2018-1530,SUSE-SLE-SAP-12-SP1-2018-1530,SUSE-SLE-SAP-12-SP2-2018-1530,SUSE-SLE-SERVER-12-2018-1530,SUSE-SLE-SERVER-12-SP1-2018-1530,SUSE-SLE-SERVER-12-SP2-2018-1530,SUSE-SLE-SERVER-12-SP3-2018-1530,SUSE-Storage-4-2018-1530 SKIP SUSE-RU-2018:2272-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1530 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1530 SKIP SUSE-RU-2018:2273-1 as SUSE-SLE-Module-Development-Tools-15-2018-1533 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-1533 SKIP SUSE-RU-2018:2274-1 as SUSE-SLE-SERVER-12-SP3-2018-1534 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1534,SUSE-SLE-SERVER-12-SP3-2018-1534 SKIP SUSE-RU-2018:2276-1 as SUSE-SLE-Module-Basesystem-15-2018-1532 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1532 SKIP SUSE-RU-2018:2277-1 as SUSE-Storage-4-2018-1535 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1535,SUSE-SLE-SAP-12-SP2-2018-1535,SUSE-SLE-SERVER-12-SP2-2018-1535,SUSE-Storage-4-2018-1535 SKIP SUSE-RU-2018:2277-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1535 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1535 SKIP SUSE-RU-2018:2311-1 as SUSE-SLE-SERVER-12-SP3-2018-1550 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-1550,SUSE-SLE-SERVER-12-SP3-2018-1550 SKIP SUSE-RU-2018:2312-1 as SUSE-SLE-SERVER-12-SP3-2018-1549 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1549,SUSE-SLE-DESKTOP-12-SP3-2018-1549,SUSE-SLE-SDK-12-SP3-2018-1549,SUSE-SLE-SERVER-12-SP3-2018-1549 SKIP SUSE-RU-2018:2314-1 as SUSE-SLE-Product-WE-15-2018-1551 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1551,SUSE-SLE-Module-Desktop-Applications-15-2018-1551,SUSE-SLE-Product-WE-15-2018-1551 SKIP SUSE-RU-2018:2315-1 as SUSE-OpenStack-Cloud-8-2018-1552 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1552,SUSE-OpenStack-Cloud-8-2018-1552 SKIP SUSE-RU-2018:2324-1 as SUSE-OpenStack-Cloud-8-2018-1558 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1558,SUSE-OpenStack-Cloud-8-2018-1558 SKIP SUSE-RU-2018:2326-1 as SUSE-SLE-WE-12-SP3-2018-1562 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1562,SUSE-SLE-SERVER-12-SP3-2018-1562,SUSE-SLE-WE-12-SP3-2018-1562 SKIP SUSE-RU-2018:2370-1 as SUSE-SLE-Module-Development-Tools-15-2018-1602 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-1602 SKIP SUSE-RU-2018:2378-1 as SUSE-SLE-Module-Server-Applications-15-2018-1615 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1615,SUSE-SLE-Module-Server-Applications-15-2018-1615 SKIP SUSE-RU-2018:2379-1 as SUSE-SLE-Module-Basesystem-15-2018-1616 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1616 SKIP SUSE-RU-2018:2382-1 as SUSE-SLE-SERVER-12-SP3-2018-1632 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1632,SUSE-SLE-DESKTOP-12-SP3-2018-1632,SUSE-SLE-SDK-12-SP3-2018-1632,SUSE-SLE-SERVER-12-SP3-2018-1632 SKIP SUSE-RU-2018:2383-1 as slessp3-iscsitarget-13732 is not security or has no CVEs. patches: sleposp3-iscsitarget-13732,slessp3-iscsitarget-13732 SKIP SUSE-RU-2018:2392-1 as SUSE-SLE-SERVER-12-SP3-2018-1638 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1638,SUSE-SLE-SDK-12-SP3-2018-1638,SUSE-SLE-SERVER-12-SP3-2018-1638 SKIP SUSE-RU-2018:2393-1 as SUSE-SLE-SERVER-12-SP3-2018-1643 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1643,SUSE-SLE-DESKTOP-12-SP3-2018-1643,SUSE-SLE-SERVER-12-SP3-2018-1643 SKIP SUSE-RU-2018:2395-1 as slessp4-iscsitarget-13735 is not security or has no CVEs. patches: slertesp4-iscsitarget-13735,slessp4-iscsitarget-13735 SKIP SUSE-RU-2018:2415-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1666 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1666,SUSE-OpenStack-Cloud-8-2018-1666,SUSE-OpenStack-Cloud-Crowbar-8-2018-1666 SKIP SUSE-RU-2018:2456-1 as SUSE-SLE-Manager-Tools-15-2018-1712 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-15-2018-1712 SKIP SUSE-RU-2018:2457-1 as SUSE-SLE-Manager-Tools-12-2018-1707 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-1707 SKIP SUSE-RU-2018:2458-1 as SUSE-SUSE-Manager-Server-3.2-2018-1716 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1716,SUSE-SLE-Manager-Tools-12-2018-1716,SUSE-SLE-Module-Adv-Systems-Management-12-2018-1716,SUSE-SLE-POS-12-SP2-2018-1716,SUSE-SUSE-Manager-Proxy-3.0-2018-1716,SUSE-SUSE-Manager-Proxy-3.1-2018-1716,SUSE-SUSE-Manager-Proxy-3.2-2018-1716,SUSE-SUSE-Manager-Server-3.0-2018-1716,SUSE-SUSE-Manager-Server-3.1-2018-1716,SUSE-SUSE-Manager-Server-3.2-2018-1716 SKIP SUSE-RU-2018:2459-1 as slesctsp4-client-tools-201807-13744 is not security or has no CVEs. patches: slesctsp3-client-tools-201807-13744,slesctsp4-client-tools-201807-13744 SKIP SUSE-RU-2018:2460-1 as SUSE-SLE-Module-Basesystem-15-2018-1705 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1705 SKIP SUSE-RU-2018:2461-1 as slesctsp4-salt-13746 is not security or has no CVEs. patches: slesctsp3-salt-13746,slesctsp4-salt-13746 SKIP SUSE-RU-2018:2462-1 as SUSE-SLE-Module-Server-Applications-15-2018-1706 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1706,SUSE-SLE-Module-Server-Applications-15-2018-1706 SKIP SUSE-RU-2018:2463-1 as SUSE-SUSE-Manager-Server-3.2-2018-1713 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-1713 SKIP SUSE-RU-2018:2464-1 as SUSE-SUSE-Manager-Proxy-3.2-2018-1713 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-1713 SKIP SUSE-RU-2018:2466-1 as SUSE-SLE-SERVER-12-SP3-2018-1718 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1718,SUSE-SLE-SERVER-12-SP3-2018-1718 SKIP SUSE-RU-2018:2467-1 as SUSE-SLE-SERVER-12-SP3-2018-1728 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1728 SKIP SUSE-RU-2018:2471-1 as SUSE-SLE-Module-Server-Applications-15-2018-1729 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-1729 SKIP SUSE-RU-2018:2476-1 as SUSE-Storage-4-2018-1742 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1742,SUSE-SLE-SAP-12-SP2-2018-1742,SUSE-SLE-SERVER-12-SP2-2018-1742,SUSE-Storage-4-2018-1742 SKIP SUSE-RU-2018:2476-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1742 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1742 SKIP SUSE-RU-2018:2477-1 as SUSE-SLE-SERVER-12-SP3-2018-1741 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1741 SKIP SUSE-RU-2018:2484-1 as SUSE-SUSE-Manager-Server-3.2-2018-1747 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-1747,SUSE-SUSE-Manager-Server-3.2-2018-1747 SKIP SUSE-RU-2018:2491-1 as SUSE-SLE-Module-Basesystem-15-2018-1751 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1751 SKIP SUSE-RU-2018:2494-1 as SUSE-SLE-Module-Basesystem-15-2018-1761 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1761 SKIP SUSE-RU-2018:2495-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1755 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1755,SUSE-SLE-Module-Public-Cloud-12-2018-1755 SKIP SUSE-RU-2018:2496-1 as SUSE-SLE-SERVER-12-SP3-2018-1758 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1758 SKIP SUSE-RU-2018:2497-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-1759 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-1759 SKIP SUSE-RU-2018:2498-1 as SUSE-SLE-Module-Basesystem-15-2018-1754 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1754 SKIP SUSE-RU-2018:2499-1 as SUSE-Storage-5-2018-1757 is not security or has no CVEs. patches: SUSE-Storage-5-2018-1757 SKIP SUSE-RU-2018:2501-1 as SUSE-SLE-Module-Basesystem-15-2018-1760 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1760 SKIP SUSE-RU-2018:2529-1 as SUSE-SLE-SERVER-12-SP3-2018-1764 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1764,SUSE-SLE-SERVER-12-SP3-2018-1764 SKIP SUSE-RU-2018:2531-1 as SUSE-Storage-4-2018-1763 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1763,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1763,SUSE-SLE-DESKTOP-12-SP3-2018-1763,SUSE-SLE-SAP-12-SP1-2018-1763,SUSE-SLE-SAP-12-SP2-2018-1763,SUSE-SLE-SERVER-12-2018-1763,SUSE-SLE-SERVER-12-SP1-2018-1763,SUSE-SLE-SERVER-12-SP2-2018-1763,SUSE-SLE-SERVER-12-SP3-2018-1763,SUSE-Storage-4-2018-1763 SKIP SUSE-RU-2018:2531-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1763 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1763 SKIP SUSE-RU-2018:2537-1 as SUSE-SLE-SERVER-12-SP3-2018-1777 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1777,SUSE-SLE-SDK-12-SP3-2018-1777,SUSE-SLE-SERVER-12-SP3-2018-1777 SKIP SUSE-RU-2018:2540-1 as SUSE-SLE-SERVER-12-SP1-2018-1773 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1773,SUSE-SLE-SERVER-12-2018-1773,SUSE-SLE-SERVER-12-SP1-2018-1773 SKIP SUSE-RU-2018:2541-1 as SUSE-SLE-Module-Basesystem-15-2018-1775 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1775 SKIP SUSE-RU-2018:2542-1 as SUSE-Storage-4-2018-1774 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1774,SUSE-SLE-DESKTOP-12-SP3-2018-1774,SUSE-SLE-SAP-12-SP2-2018-1774,SUSE-SLE-SDK-12-SP3-2018-1774,SUSE-SLE-SERVER-12-SP2-2018-1774,SUSE-SLE-SERVER-12-SP3-2018-1774,SUSE-Storage-4-2018-1774 SKIP SUSE-RU-2018:2542-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1774 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1774 SKIP SUSE-RU-2018:2543-1 as slessp4-s390-tools-13754 is not security or has no CVEs. patches: slessp4-s390-tools-13754 SKIP SUSE-RU-2018:2544-1 as SUSE-SLE-HA-12-SP3-2018-1779 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1779 SKIP SUSE-RU-2018:2546-1 as SUSE-SLE-Module-Containers-12-2018-1778 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-1778 SKIP SUSE-RU-2018:2547-1 as SUSE-SLE-Module-SAP-Applications-15-2018-1782 is not security or has no CVEs. patches: SUSE-SLE-Module-SAP-Applications-15-2018-1782 SKIP SUSE-RU-2018:2548-1 as slesappsp4-SAPHanaSR-13756 is not security or has no CVEs. patches: slesappsp4-SAPHanaSR-13756 SKIP SUSE-RU-2018:2549-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1785 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1785,SUSE-OpenStack-Cloud-8-2018-1785,SUSE-OpenStack-Cloud-Crowbar-8-2018-1785 SKIP SUSE-RU-2018:2568-1 as SUSE-SLE-Module-Basesystem-15-2018-1802 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1802 SKIP SUSE-RU-2018:2571-1 as SUSE-SLE-Module-Containers-15-2018-1804 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-15-2018-1804 SKIP SUSE-RU-2018:2572-1 as SUSE-Storage-4-2018-1811 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1811,SUSE-Storage-4-2018-1811 SKIP SUSE-RU-2018:2573-1 as SUSE-Storage-4-2018-1812 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1812,SUSE-Storage-4-2018-1812 SKIP SUSE-RU-2018:2575-1 as SUSE-SLE-SERVER-12-SP3-2018-1815 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1815 SKIP SUSE-RU-2018:2579-1 as SUSE-OpenStack-Cloud-8-2018-1805 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1805,SUSE-OpenStack-Cloud-8-2018-1805 SKIP SUSE-RU-2018:2580-1 as SUSE-OpenStack-Cloud-7-2018-1809 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1809 SKIP SUSE-RU-2018:2581-1 as SUSE-OpenStack-Cloud-7-2018-1810 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1810 SKIP SUSE-RU-2018:2582-1 as SUSE-OpenStack-Cloud-7-2018-1813 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1813 SKIP SUSE-RU-2018:2585-1 as SUSE-SLE-HA-12-SP2-2018-1820 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-1820 SKIP SUSE-RU-2018:2604-1 as SUSE-SLE-SERVER-12-SP3-2018-1830 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-1830,SUSE-SLE-SERVER-12-SP3-2018-1830 SKIP SUSE-RU-2018:2605-1 as SUSE-SLE-Module-Server-Applications-15-2018-1829 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-1829 SKIP SUSE-RU-2018:2607-1 as SUSE-SUSE-Manager-Proxy-3.1-2018-1831 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-1831 SKIP SUSE-RU-2018:2609-1 as SUSE-SUSE-Manager-Server-3.1-2018-1831 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2018-1831 SKIP SUSE-RU-2018:2620-1 as SUSE-Storage-4-2018-1834 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1834,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1834,SUSE-SLE-DESKTOP-12-SP3-2018-1834,SUSE-SLE-SAP-12-SP2-2018-1834,SUSE-SLE-SDK-12-SP3-2018-1834,SUSE-SLE-SERVER-12-SP2-2018-1834,SUSE-SLE-SERVER-12-SP3-2018-1834,SUSE-Storage-4-2018-1834 SKIP SUSE-RU-2018:2620-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1834 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1834 SKIP SUSE-RU-2018:2621-1 as SUSE-SLE-Module-Public-Cloud-12-2018-1836 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1836,SUSE-OpenStack-Cloud-7-2018-1836,SUSE-OpenStack-Cloud-8-2018-1836,SUSE-OpenStack-Cloud-Crowbar-8-2018-1836,SUSE-SLE-Module-Public-Cloud-12-2018-1836 SKIP SUSE-RU-2018:2622-1 as SUSE-SLE-SAP-12-SP2-2018-1835 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-1835 SKIP SUSE-RU-2018:2624-1 as SUSE-SLE-Module-Development-Tools-15-2018-1837 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1837,SUSE-SLE-Module-Development-Tools-15-2018-1837 SKIP SUSE-RU-2018:2625-1 as slessp4-openssl-certs-13768 is not security or has no CVEs. patches: sleposp3-openssl-certs-13768,slessp3-openssl-certs-13768,slessp4-openssl-certs-13768 SKIP SUSE-RU-2018:2626-1 as SUSE-SLE-Module-Basesystem-15-2018-1839 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1839 SKIP SUSE-RU-2018:2633-1 as SUSE-SLE-Module-Server-Applications-15-2018-1846 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1846,SUSE-SLE-Module-Server-Applications-15-2018-1846 SKIP SUSE-RU-2018:2634-1 as SUSE-SLE-SERVER-12-SP3-2018-1847 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1847,SUSE-SLE-SERVER-12-SP3-2018-1847 SKIP SUSE-RU-2018:2635-1 as SUSE-SLE-Module-HPC-15-2018-1845 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-1845 SKIP SUSE-RU-2018:2636-1 as SUSE-Storage-4-2018-1848 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1848,SUSE-SLE-SAP-12-SP1-2018-1848,SUSE-SLE-SAP-12-SP2-2018-1848,SUSE-SLE-SERVER-12-2018-1848,SUSE-SLE-SERVER-12-SP1-2018-1848,SUSE-SLE-SERVER-12-SP2-2018-1848,SUSE-Storage-4-2018-1848 SKIP SUSE-RU-2018:2636-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1848 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1848 SKIP SUSE-RU-2018:2638-1 as SUSE-SLE-Module-Legacy-12-2018-1850 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2018-1850 SKIP SUSE-RU-2018:2646-1 as SUSE-SLE-Product-HA-15-2018-1855 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-1855 SKIP SUSE-RU-2018:2651-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-1857 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-1857 SKIP SUSE-RU-2018:2652-1 as SUSE-SLE-Module-Server-Applications-15-2018-1860 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-1860 SKIP SUSE-RU-2018:2653-1 as SUSE-OpenStack-Cloud-8-2018-1859 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1859,SUSE-OpenStack-Cloud-8-2018-1859 SKIP SUSE-RU-2018:2675-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-1861 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1861,SUSE-SLE-Module-Desktop-Applications-15-2018-1861 SKIP SUSE-RU-2018:2680-1 as SUSE-SLE-SERVER-12-SP3-2018-1867 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-1867 SKIP SUSE-RU-2018:2687-1 as SUSE-SLE-Module-Legacy-15-2018-1878 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-15-2018-1878 SKIP SUSE-RU-2018:2691-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-1882 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1882,SUSE-SLE-Module-Desktop-Applications-15-2018-1882 SKIP SUSE-RU-2018:2692-1 as SUSE-SLE-SDK-12-SP3-2018-1881 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1881,SUSE-SLE-SDK-12-SP3-2018-1881 SKIP SUSE-RU-2018:2697-1 as SUSE-SLE-Manager-Tools-15-2018-1887 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-15-2018-1887 SKIP SUSE-RU-2018:2698-1 as slessp4-xorg-x11-libxcb-13775 is not security or has no CVEs. patches: sdksp4-xorg-x11-libxcb-13775,sleposp3-xorg-x11-libxcb-13775,slessp3-xorg-x11-libxcb-13775,slessp4-xorg-x11-libxcb-13775 SKIP SUSE-RU-2018:2700-1 as SUSE-SLE-Module-HPC-12-2018-1891 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-1891 SKIP SUSE-RU-2018:2701-1 as SUSE-SLE-HA-12-SP2-2018-1894 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-1894 SKIP SUSE-RU-2018:2702-1 as SUSE-SLE-SERVER-12-SP1-2018-1893 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1893,SUSE-SLE-SERVER-12-2018-1893,SUSE-SLE-SERVER-12-SP1-2018-1893 SKIP SUSE-RU-2018:2705-1 as SUSE-SLE-Module-Basesystem-15-2018-1892 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1892 SKIP SUSE-RU-2018:2706-1 as SUSE-SLE-Module-HPC-15-2018-1898 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-1898 SKIP SUSE-RU-2018:2707-1 as SUSE-SLE-Module-Public-Cloud-15-2018-1897 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-15-2018-1897 SKIP SUSE-RU-2018:2708-1 as SUSE-SLE-WE-12-SP3-2018-1899 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1899,SUSE-SLE-SDK-12-SP3-2018-1899,SUSE-SLE-SERVER-12-SP3-2018-1899,SUSE-SLE-WE-12-SP3-2018-1899 SKIP SUSE-RU-2018:2713-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-1901 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-1901 SKIP SUSE-RU-2018:2718-1 as SUSE-SLE-SERVER-12-SP3-2018-1907 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1907,SUSE-SLE-SDK-12-SP3-2018-1907,SUSE-SLE-SERVER-12-SP3-2018-1907 SKIP SUSE-RU-2018:2743-1 as SUSE-SLE-Module-Public-Cloud-15-2018-1911 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-15-2018-1911 SKIP SUSE-RU-2018:2746-1 as SUSE-SLE-SDK-12-SP3-2018-1910 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-1910 SKIP SUSE-RU-2018:2747-1 as slessp4-python-13778 is not security or has no CVEs. patches: sdksp4-python-13778,sleposp3-python-13778,slessp3-python-13778,slessp4-python-13778 SKIP SUSE-RU-2018:2748-1 as SUSE-SLE-SDK-12-SP3-2018-1917 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1917,SUSE-SLE-SDK-12-SP3-2018-1917 SKIP SUSE-RU-2018:2750-1 as SUSE-SLE-Module-Development-Tools-15-2018-1919 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-1919 SKIP SUSE-RU-2018:2751-1 as SUSE-SLE-SERVER-12-SP3-2018-1920 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1920,SUSE-SLE-SERVER-12-SP3-2018-1920 SKIP SUSE-RU-2018:2755-1 as SUSE-SLE-HA-12-SP3-2018-1922 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1922 SKIP SUSE-RU-2018:2756-1 as SUSE-SLE-Module-Development-Tools-15-2018-1926 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-1926 SKIP SUSE-RU-2018:2757-1 as SUSE-SLE-HA-12-SP2-2018-1923 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-1923 SKIP SUSE-RU-2018:2758-1 as SUSE-Storage-4-2018-1927 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1927,SUSE-SLE-DESKTOP-12-SP3-2018-1927,SUSE-SLE-SAP-12-SP2-2018-1927,SUSE-SLE-SERVER-12-SP2-2018-1927,SUSE-SLE-SERVER-12-SP3-2018-1927,SUSE-Storage-4-2018-1927 SKIP SUSE-RU-2018:2758-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1927 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1927 SKIP SUSE-RU-2018:2759-1 as SUSE-SLE-Product-WE-15-2018-1925 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-1925,SUSE-SLE-Product-WE-15-2018-1925 SKIP SUSE-RU-2018:2760-1 as SUSE-Storage-4-2018-1924 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1924,SUSE-SLE-DESKTOP-12-SP3-2018-1924,SUSE-SLE-SAP-12-SP2-2018-1924,SUSE-SLE-SERVER-12-SP2-2018-1924,SUSE-SLE-SERVER-12-SP3-2018-1924,SUSE-Storage-4-2018-1924 SKIP SUSE-RU-2018:2760-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1924 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1924 SKIP SUSE-RU-2018:2766-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1935 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1935,SUSE-OpenStack-Cloud-8-2018-1935,SUSE-OpenStack-Cloud-Crowbar-8-2018-1935 SKIP SUSE-RU-2018:2768-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1936 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Crowbar-8-2018-1936 SKIP SUSE-RU-2018:2769-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1934 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1934,SUSE-OpenStack-Cloud-8-2018-1934,SUSE-OpenStack-Cloud-Crowbar-8-2018-1934 SKIP SUSE-RU-2018:2770-1 as SUSE-SLE-HA-12-SP3-2018-1938 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-1938 SKIP SUSE-RU-2018:2772-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-1937 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Crowbar-8-2018-1937 SKIP SUSE-RU-2018:2773-1 as SUSE-SLE-Module-Server-Applications-15-2018-1933 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-1933 SKIP SUSE-RU-2018:2782-1 as SUSE-SLE-Module-Basesystem-15-2018-1949 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1949 SKIP SUSE-RU-2018:2783-1 as SUSE-SLE-SERVER-12-SP1-2018-1948 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-1948,SUSE-SLE-SERVER-12-2018-1948,SUSE-SLE-SERVER-12-SP1-2018-1948 SKIP SUSE-RU-2018:2784-1 as SUSE-Storage-4-2018-1947 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1947,SUSE-SLE-DESKTOP-12-SP3-2018-1947,SUSE-SLE-SAP-12-SP2-2018-1947,SUSE-SLE-SERVER-12-SP2-2018-1947,SUSE-SLE-SERVER-12-SP3-2018-1947,SUSE-Storage-4-2018-1947 SKIP SUSE-RU-2018:2784-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1947 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1947 SKIP SUSE-RU-2018:2786-1 as SUSE-Storage-5-2018-1946 is not security or has no CVEs. patches: SUSE-Storage-4-2018-1946,SUSE-Storage-5-2018-1946 SKIP SUSE-RU-2018:2788-1 as slehasp4-openais-13780 is not security or has no CVEs. patches: slehasp4-openais-13780 SKIP SUSE-RU-2018:2792-1 as SUSE-SLE-Module-Basesystem-15-2018-1962 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1962 SKIP SUSE-RU-2018:2795-1 as SUSE-Storage-5-2018-1966 is not security or has no CVEs. patches: SUSE-Storage-5-2018-1966 SKIP SUSE-RU-2018:2821-1 as SUSE-SLE-Product-HA-15-2018-1974 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-1974 SKIP SUSE-RU-2018:2823-1 as SUSE-SLE-Live-Patching-12-SP3-2018-1984 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-1984,SUSE-SLE-Live-Patching-12-SP3-2018-1984 SKIP SUSE-RU-2018:2824-1 as SUSE-Storage-4-2018-1982 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-1982,SUSE-SLE-DESKTOP-12-SP3-2018-1982,SUSE-SLE-SAP-12-SP1-2018-1982,SUSE-SLE-SAP-12-SP2-2018-1982,SUSE-SLE-SERVER-12-2018-1982,SUSE-SLE-SERVER-12-SP1-2018-1982,SUSE-SLE-SERVER-12-SP2-2018-1982,SUSE-SLE-SERVER-12-SP3-2018-1982,SUSE-Storage-4-2018-1982 SKIP SUSE-RU-2018:2824-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-1982 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-1982 SKIP SUSE-RU-2018:2826-1 as SUSE-SLE-Product-WE-15-2018-1978 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1978,SUSE-SLE-Product-WE-15-2018-1978 SKIP SUSE-RU-2018:2828-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-1972 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-1972 SKIP SUSE-RU-2018:2829-1 as SUSE-SLE-WE-12-SP3-2018-1979 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1979,SUSE-SLE-WE-12-SP3-2018-1979 SKIP SUSE-RU-2018:2830-1 as SUSE-SLE-SERVER-12-SP3-2018-1985 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1985,SUSE-SLE-DESKTOP-12-SP3-2018-1985,SUSE-SLE-SDK-12-SP3-2018-1985,SUSE-SLE-SERVER-12-SP3-2018-1985 SKIP SUSE-RU-2018:2831-1 as SUSE-OpenStack-Cloud-8-2018-1975 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-1975,SUSE-OpenStack-Cloud-8-2018-1975 SKIP SUSE-RU-2018:2832-1 as SUSE-SLE-SERVER-12-SP3-2018-1976 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-1976,SUSE-SLE-SDK-12-SP3-2018-1976,SUSE-SLE-SERVER-12-SP3-2018-1976 SKIP SUSE-RU-2018:2844-1 as SUSE-SLE-SERVER-12-SP3-2018-1996 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-1996,SUSE-SLE-SAP-12-SP3-2018-1996,SUSE-SLE-SERVER-12-SP3-2018-1996 SKIP SUSE-RU-2018:2845-1 as SUSE-SLE-Module-Basesystem-15-2018-1997 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1997 SKIP SUSE-RU-2018:2846-1 as SUSE-SLE-Module-Basesystem-15-2018-1998 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1998 SKIP SUSE-RU-2018:2847-1 as SUSE-SLE-Module-Basesystem-15-2018-2000 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2000 SKIP SUSE-RU-2018:2848-1 as SUSE-SLE-Module-Development-Tools-15-2018-1999 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-1999,SUSE-SLE-Module-Development-Tools-15-2018-1999 SKIP SUSE-RU-2018:2857-1 as SUSE-SLE-Module-Basesystem-15-2018-2003 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2003 SKIP SUSE-RU-2018:2865-1 as SUSE-SLE-Module-Basesystem-15-2018-2020 is not security or has no CVEs. patches: SUSE-SLE-INSTALLER-15-2018-2020,SUSE-SLE-Module-Basesystem-15-2018-2020 SKIP SUSE-RU-2018:2867-1 as SUSE-SLE-Manager-Tools-15-2018-2022 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-15-2018-2022 SKIP SUSE-RU-2018:2868-1 as slesctsp4-client-tools-201809-13791 is not security or has no CVEs. patches: slesctsp3-client-tools-201809-13791,slesctsp4-client-tools-201809-13791 SKIP SUSE-RU-2018:2869-1 as slesctsp4-salt-13790 is not security or has no CVEs. patches: slesctsp3-salt-13790,slesctsp4-salt-13790 SKIP SUSE-RU-2018:2870-1 as SUSE-SUSE-Manager-Proxy-3.2-2018-2032 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-2032 SKIP SUSE-RU-2018:2871-1 as SUSE-SUSE-Manager-Server-3.2-2018-2029 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2029,SUSE-SUSE-Manager-Proxy-3.0-2018-2029,SUSE-SUSE-Manager-Proxy-3.1-2018-2029,SUSE-SUSE-Manager-Proxy-3.2-2018-2029,SUSE-SUSE-Manager-Server-3.0-2018-2029,SUSE-SUSE-Manager-Server-3.1-2018-2029,SUSE-SUSE-Manager-Server-3.2-2018-2029 SKIP SUSE-RU-2018:2873-1 as SUSE-SUSE-Manager-Server-3.2-2018-2025 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-2025,SUSE-SUSE-Manager-Server-3.2-2018-2025 SKIP SUSE-RU-2018:2874-1 as SUSE-SUSE-Manager-Server-3.2-2018-2032 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-2032 SKIP SUSE-RU-2018:2875-1 as SUSE-SUSE-Manager-Server-3.2-2018-2023 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2023,SUSE-SLE-Module-Adv-Systems-Management-12-2018-2023,SUSE-SLE-POS-12-SP2-2018-2023,SUSE-SUSE-Manager-Proxy-3.0-2018-2023,SUSE-SUSE-Manager-Proxy-3.1-2018-2023,SUSE-SUSE-Manager-Proxy-3.2-2018-2023,SUSE-SUSE-Manager-Server-3.0-2018-2023,SUSE-SUSE-Manager-Server-3.1-2018-2023,SUSE-SUSE-Manager-Server-3.2-2018-2023 SKIP SUSE-RU-2018:2876-1 as SUSE-Storage-5-2018-2034 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2034 SKIP SUSE-RU-2018:2877-1 as SUSE-Storage-5-2018-2033 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2033 SKIP SUSE-RU-2018:2878-1 as SUSE-Storage-5-2018-2037 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2037 SKIP SUSE-RU-2018:2882-1 as SUSE-SLE-Module-Basesystem-15-2018-2044 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2044 SKIP SUSE-RU-2018:2884-1 as SUSE-SLE-Module-Server-Applications-15-2018-2043 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2043,SUSE-SLE-Module-Server-Applications-15-2018-2043 SKIP SUSE-RU-2018:2886-1 as SUSE-SLE-WE-12-SP3-2018-2038 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2038,SUSE-SLE-SDK-12-SP3-2018-2038,SUSE-SLE-SERVER-12-SP3-2018-2038,SUSE-SLE-WE-12-SP3-2018-2038 SKIP SUSE-RU-2018:2892-1 as SUSE-SLE-Module-Basesystem-15-2018-2049 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2049 SKIP SUSE-RU-2018:2893-1 as SUSE-SLE-SERVER-12-SP3-2018-2048 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2048 SKIP SUSE-RU-2018:2896-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2050 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2050,SUSE-SLE-Module-Desktop-Applications-15-2018-2050 SKIP SUSE-RU-2018:2900-1 as SUSE-SLE-Module-Legacy-15-2018-2055 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2055,SUSE-SLE-Module-Development-Tools-15-2018-2055,SUSE-SLE-Module-Legacy-15-2018-2055 SKIP SUSE-RU-2018:2903-1 as SUSE-SLE-SAP-12-SP1-2018-2061 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-2061 SKIP SUSE-RU-2018:2906-1 as SUSE-SLE-Module-SAP-Applications-15-2018-2060 is not security or has no CVEs. patches: SUSE-SLE-Module-SAP-Applications-15-2018-2060 SKIP SUSE-RU-2018:2909-1 as SUSE-SLE-Module-Basesystem-15-2018-2067 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2067 SKIP SUSE-RU-2018:2910-1 as SUSE-SLE-SERVER-12-SP3-2018-2064 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2064,SUSE-SLE-SERVER-12-SP3-2018-2064 SKIP SUSE-RU-2018:2916-1 as slessp4-powerpc-utils-13800 is not security or has no CVEs. patches: slessp4-powerpc-utils-13800 SKIP SUSE-RU-2018:2919-1 as SUSE-SLE-Module-Server-Applications-15-2018-2065 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2065,SUSE-SLE-Module-Server-Applications-15-2018-2065 SKIP SUSE-RU-2018:2932-1 as SUSE-SLE-Module-Basesystem-15-2018-2068 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2068 SKIP SUSE-RU-2018:2936-1 as SUSE-SLE-Module-Server-Applications-15-2018-2077 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2077 SKIP SUSE-RU-2018:2937-1 as SUSE-SLE-SERVER-12-SP3-2018-2079 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2079,SUSE-SLE-SERVER-12-SP3-2018-2079 SKIP SUSE-RU-2018:2939-1 as SUSE-SLE-Module-Server-Applications-15-2018-2078 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2078 SKIP SUSE-RU-2018:2946-1 as SUSE-Storage-5-2018-2080 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2080 SKIP SUSE-RU-2018:2959-1 as SUSE-SLE-Module-Basesystem-15-2018-2084 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2084 SKIP SUSE-RU-2018:2969-1 as SUSE-SLE-SERVER-12-SP3-2018-2113 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2113 SKIP SUSE-RU-2018:2970-1 as SUSE-Storage-5-2018-2112 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2112 SKIP SUSE-RU-2018:2971-1 as SUSE-Storage-5-2018-2111 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2111 SKIP SUSE-RU-2018:2972-1 as SUSE-SLE-Module-Development-Tools-15-2018-2114 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2114 SKIP SUSE-RU-2018:2974-1 as SUSE-Storage-5-2018-2115 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2115,SUSE-SLE-SDK-12-SP3-2018-2115,SUSE-SLE-SERVER-12-SP3-2018-2115,SUSE-Storage-5-2018-2115 SKIP SUSE-RU-2018:2982-1 as SUSE-SLE-WE-12-SP3-2018-2126 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2126,SUSE-SLE-SERVER-12-SP3-2018-2126,SUSE-SLE-WE-12-SP3-2018-2126 SKIP SUSE-RU-2018:2983-1 as SUSE-SLE-HA-12-SP3-2018-2128 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-2128 SKIP SUSE-RU-2018:2984-1 as SUSE-SLE-Product-HA-15-2018-2123 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-2123 SKIP SUSE-RU-2018:2985-1 as SUSE-SLE-SERVER-12-SP3-2018-2125 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2125,SUSE-SLE-SERVER-12-SP3-2018-2125 SKIP SUSE-RU-2018:2986-1 as SUSE-SLE-Module-Basesystem-15-2018-2124 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2124 SKIP SUSE-RU-2018:2987-1 as SUSE-SLE-Product-HA-15-2018-2127 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-2127 SKIP SUSE-RU-2018:2988-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2129 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2129,SUSE-SLE-Module-Desktop-Applications-15-2018-2129 SKIP SUSE-RU-2018:2989-1 as slessp4-kernel-source-13802 is not security or has no CVEs. patches: sdksp4-kernel-source-13802,slessp4-kernel-source-13802,slexsp3-kernel-source-13802 SKIP SUSE-RU-2018:2990-1 as SUSE-SLE-SERVER-12-SP3-2018-2131 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2131,SUSE-SLE-SDK-12-SP3-2018-2131,SUSE-SLE-SERVER-12-SP3-2018-2131 SKIP SUSE-RU-2018:2992-1 as SUSE-SLE-Live-Patching-12-SP3-2018-2134 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-2134,SUSE-SLE-Live-Patching-12-SP3-2018-2134 SKIP SUSE-RU-2018:3006-1 as SUSE-SLE-Module-Basesystem-15-2018-2143 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2143 SKIP SUSE-RU-2018:3007-1 as SUSE-SLE-Module-Basesystem-15-2018-2142 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2142 SKIP SUSE-RU-2018:3008-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2137 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2137 SKIP SUSE-RU-2018:3009-1 as SUSE-SLE-Module-Basesystem-15-2018-2138 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2138 SKIP SUSE-RU-2018:3010-1 as SUSE-SLE-SERVER-12-SP1-2018-2139 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-2139,SUSE-SLE-SERVER-12-SP1-2018-2139 SKIP SUSE-RU-2018:3019-1 as SUSE-Storage-4-2018-2150 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2150,SUSE-Storage-4-2018-2150 SKIP SUSE-RU-2018:3020-1 as SUSE-OpenStack-Cloud-7-2018-2151 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2151 SKIP SUSE-RU-2018:3023-1 as SUSE-SLE-Module-Basesystem-15-2018-2157 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2157 SKIP SUSE-RU-2018:3024-1 as SUSE-SLE-Module-Basesystem-15-2018-2156 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2156 SKIP SUSE-RU-2018:3025-1 as SUSE-SLE-Module-Basesystem-15-2018-2158 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2158 SKIP SUSE-RU-2018:3026-1 as SUSE-SLE-Module-Server-Applications-15-2018-2159 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-2159,SUSE-SLE-Module-Server-Applications-15-2018-2159 SKIP SUSE-RU-2018:3027-1 as SUSE-SLE-SERVER-12-SP3-2018-2160 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2160,SUSE-SLE-SERVER-12-SP3-2018-2160 SKIP SUSE-RU-2018:3028-1 as SUSE-Storage-4-2018-2162 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2162,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2162,SUSE-SLE-DESKTOP-12-SP3-2018-2162,SUSE-SLE-SAP-12-SP2-2018-2162,SUSE-SLE-SDK-12-SP3-2018-2162,SUSE-SLE-SERVER-12-SP2-2018-2162,SUSE-SLE-SERVER-12-SP3-2018-2162,SUSE-Storage-4-2018-2162 SKIP SUSE-RU-2018:3028-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-2162 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-2162 SKIP SUSE-RU-2018:3030-1 as SUSE-SLE-SERVER-12-SP3-2018-2154 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2154,SUSE-SLE-SDK-12-SP3-2018-2154,SUSE-SLE-SERVER-12-SP3-2018-2154 SKIP SUSE-RU-2018:3031-1 as SUSE-SLE-Module-Basesystem-15-2018-2155 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2155 SKIP SUSE-RU-2018:3065-1 as SUSE-SLE-Module-Basesystem-15-2018-2166 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2166 SKIP SUSE-RU-2018:3067-1 as SUSE-SLE-Product-WE-15-2018-2167 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2167,SUSE-SLE-Product-WE-15-2018-2167 SKIP SUSE-RU-2018:3069-1 as SUSE-SLE-Module-Development-Tools-15-2018-2170 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2170,SUSE-SLE-Module-Development-Tools-15-2018-2170 SKIP SUSE-RU-2018:3075-1 as SUSE-SLE-HA-12-SP3-2018-2179 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-2179 SKIP SUSE-RU-2018:3076-1 as SUSE-SLE-SERVER-12-SP3-2018-2180 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2180,SUSE-SLE-SERVER-12-SP3-2018-2180 SKIP SUSE-RU-2018:3078-1 as SUSE-SLE-SERVER-12-SP3-2018-2178 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2178,SUSE-SLE-SERVER-12-SP3-2018-2178 SKIP SUSE-RU-2018:3079-1 as SUSE-SLE-Module-Basesystem-15-2018-2177 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2177 SKIP SUSE-RU-2018:3085-1 as SUSE-SLE-SERVER-12-SP3-2018-2189 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2189,SUSE-SLE-SDK-12-SP3-2018-2189,SUSE-SLE-SERVER-12-SP3-2018-2189 SKIP SUSE-RU-2018:3086-1 as slessp4-sssd-13811 is not security or has no CVEs. patches: sdksp4-sssd-13811,secsp3-sssd-13811,slessp4-sssd-13811 SKIP SUSE-RU-2018:3089-1 as SUSE-SLE-Module-Basesystem-15-2018-2191 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2191 SKIP SUSE-RU-2018:3090-1 as SUSE-SLE-Module-Containers-12-2018-2190 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-2190 SKIP SUSE-RU-2018:3091-1 as SUSE-SLE-Module-Basesystem-15-2018-2193 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2193 SKIP SUSE-RU-2018:3093-1 as SUSE-SLE-Module-Basesystem-15-2018-2192 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2192 SKIP SUSE-RU-2018:3096-1 as SUSE-Storage-4-2018-2196 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2196,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2196,SUSE-SLE-DESKTOP-12-SP3-2018-2196,SUSE-SLE-Module-Toolchain-12-2018-2196,SUSE-SLE-SAP-12-SP1-2018-2196,SUSE-SLE-SAP-12-SP2-2018-2196,SUSE-SLE-SDK-12-SP3-2018-2196,SUSE-SLE-SERVER-12-2018-2196,SUSE-SLE-SERVER-12-SP1-2018-2196,SUSE-SLE-SERVER-12-SP2-2018-2196,SUSE-SLE-SERVER-12-SP3-2018-2196,SUSE-Storage-4-2018-2196 SKIP SUSE-RU-2018:3096-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-2196 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP2-BCL-2018-2196 SKIP SUSE-RU-2018:3097-1 as SUSE-SLE-Module-HPC-15-2018-2197 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-2197 ERROR: notice SUSE-RU-2018:3097-2 has no valid patches out of: SUSE-SLE-Module-Development-Tools-OBS-15-2019-944 SKIP SUSE-RU-2018:3098-1 as SUSE-SLE-HA-12-SP3-2018-2199 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-2199 SKIP SUSE-RU-2018:3099-1 as SUSE-SLE-HA-12-SP3-2018-2198 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-2198 SKIP SUSE-RU-2018:3111-1 as SUSE-SLE-Module-Basesystem-15-2018-2207 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2207 SKIP SUSE-RU-2018:3112-1 as SUSE-SLE-SERVER-12-SP3-2018-2208 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2208,SUSE-SLE-SERVER-12-SP3-2018-2208 SKIP SUSE-RU-2018:3114-1 as SUSE-SLE-SERVER-12-SP3-2018-2212 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2212,SUSE-SLE-SERVER-12-SP3-2018-2212 SKIP SUSE-RU-2018:3115-1 as SUSE-SLE-Module-Basesystem-15-2018-2209 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2209 SKIP SUSE-RU-2018:3116-1 as SUSE-SLE-WE-12-SP3-2018-2203 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2203,SUSE-SLE-HA-12-SP3-2018-2203,SUSE-SLE-SDK-12-SP3-2018-2203,SUSE-SLE-SERVER-12-SP3-2018-2203,SUSE-SLE-WE-12-SP3-2018-2203 SKIP SUSE-RU-2018:3117-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2206 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2206,SUSE-SLE-Module-Desktop-Applications-15-2018-2206 SKIP SUSE-RU-2018:3120-1 as SUSE-SLE-Live-Patching-12-SP3-2018-2203 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-SP3-2018-2203 SKIP SUSE-RU-2018:3123-1 as SUSE-SLE-WE-12-SP3-2018-2215 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2215,SUSE-SLE-SDK-12-SP3-2018-2215,SUSE-SLE-WE-12-SP3-2018-2215 SKIP SUSE-RU-2018:3124-1 as SUSE-SLE-SERVER-12-SP3-2018-2216 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2216,SUSE-SLE-SDK-12-SP3-2018-2216,SUSE-SLE-SERVER-12-SP3-2018-2216 SKIP SUSE-RU-2018:3125-1 as SUSE-SLE-WE-12-SP3-2018-2217 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2217,SUSE-SLE-DESKTOP-12-SP3-2018-2217,SUSE-SLE-SDK-12-SP3-2018-2217,SUSE-SLE-SERVER-12-SP3-2018-2217,SUSE-SLE-WE-12-SP3-2018-2217 SKIP SUSE-RU-2018:3126-1 as SUSE-Storage-5-2018-2214 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2214 SKIP SUSE-RU-2018:3127-1 as SUSE-SLE-SAP-12-SP3-2018-2222 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-2222,SUSE-SLE-SAP-12-SP2-2018-2222,SUSE-SLE-SAP-12-SP3-2018-2222 SKIP SUSE-RU-2018:3128-1 as SUSE-SLE-Module-Server-Applications-15-2018-2220 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2220 SKIP SUSE-RU-2018:3129-1 as slessp4-ebtables-13814 is not security or has no CVEs. patches: slessp4-ebtables-13814 SKIP SUSE-RU-2018:3130-1 as slesappsp4-sap-suse-cluster-connector-13815 is not security or has no CVEs. patches: slesappsp4-sap-suse-cluster-connector-13815 SKIP SUSE-RU-2018:3133-1 as SUSE-SLE-SERVER-12-SP3-2018-2219 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2219,SUSE-SLE-SERVER-12-SP3-2018-2219 SKIP SUSE-RU-2018:3144-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-2226 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-2226,SUSE-OpenStack-Cloud-8-2018-2226,SUSE-OpenStack-Cloud-Crowbar-8-2018-2226 SKIP SUSE-RU-2018:3145-1 as SUSE-SLE-Module-SAP-Applications-15-2018-2227 is not security or has no CVEs. patches: SUSE-SLE-Module-SAP-Applications-15-2018-2227 SKIP SUSE-RU-2018:3148-1 as SUSE-SLE-SERVER-12-SP3-2018-2231 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2231,SUSE-SLE-SDK-12-SP3-2018-2231,SUSE-SLE-SERVER-12-SP3-2018-2231 SKIP SUSE-RU-2018:3149-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2229 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2229,SUSE-SLE-Module-Desktop-Applications-15-2018-2229 SKIP SUSE-RU-2018:3151-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2228 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2228 SKIP SUSE-RU-2018:3153-1 as SUSE-SLE-Live-Patching-12-2018-2234 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-2018-2234 SKIP SUSE-RU-2018:3154-1 as SUSE-SLE-Module-Development-Tools-15-2018-2233 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2233 SKIP SUSE-RU-2018:3155-1 as SUSE-SLE-SERVER-12-SP3-2018-2235 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2235,SUSE-SLE-SERVER-12-SP3-2018-2235 SKIP SUSE-RU-2018:3160-1 as SUSE-SLE-Module-Server-Applications-15-2018-2238 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2238 SKIP SUSE-RU-2018:3163-1 as slessp4-acct-13819 is not security or has no CVEs. patches: slessp4-acct-13819 SKIP SUSE-RU-2018:3165-1 as SUSE-SLE-Module-Basesystem-15-2018-2247 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2247 SKIP SUSE-RU-2018:3166-1 as SUSE-SLE-HA-12-SP3-2018-2249 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2018-2249,SUSE-SLE-HA-12-SP2-2018-2249,SUSE-SLE-HA-12-SP3-2018-2249 SKIP SUSE-RU-2018:3167-1 as SUSE-SLE-Product-HA-15-2018-2246 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-2246 SKIP SUSE-RU-2018:3168-1 as SUSE-SLE-SERVER-12-SP3-2018-2248 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2248,SUSE-SLE-SERVER-12-SP3-2018-2248 SKIP SUSE-RU-2018:3169-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2245 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2245,SUSE-SLE-Module-Desktop-Applications-15-2018-2245 SKIP SUSE-RU-2018:3192-1 as SUSE-SLE-SERVER-12-SP3-2018-2291 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2291 SKIP SUSE-RU-2018:3193-1 as SUSE-SLE-Module-Basesystem-15-2018-2289 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2289 SKIP SUSE-RU-2018:3194-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2292 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2292 SKIP SUSE-RU-2018:3195-1 as SUSE-Storage-4-2018-2288 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2288,SUSE-SLE-SAP-12-SP2-2018-2288,SUSE-SLE-SERVER-12-SP2-2018-2288,SUSE-SLE-SERVER-12-SP3-2018-2288,SUSE-Storage-4-2018-2288 SKIP SUSE-RU-2018:3196-1 as SUSE-SLE-Module-Basesystem-15-2018-2293 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2293 SKIP SUSE-RU-2018:3197-1 as SUSE-SLE-SAP-12-SP3-2018-2290 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-2290 SKIP SUSE-RU-2018:3198-1 as SUSE-SLE-SERVER-12-SP3-2018-2295 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2295,SUSE-SLE-SERVER-12-SP3-2018-2295 SKIP SUSE-RU-2018:3199-1 as SUSE-SLE-Module-Development-Tools-15-2018-2294 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2294 SKIP SUSE-RU-2018:3201-1 as SUSE-SLE-SERVER-12-SP3-2018-2296 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2296,SUSE-SLE-SDK-12-SP3-2018-2296,SUSE-SLE-SERVER-12-SP3-2018-2296 SKIP SUSE-RU-2018:3221-1 as SUSE-SLE-SERVER-12-SP3-2018-2306 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2306,SUSE-SLE-SERVER-12-SP3-2018-2306 SKIP SUSE-RU-2018:3222-1 as SUSE-SLE-SERVER-12-SP1-2018-2305 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2018-2305 SKIP SUSE-RU-2018:3222-2 as SUSE-SLE-SAP-12-SP1-2019-1082 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2019-1082 SKIP SUSE-RU-2018:3224-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2303 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2303,SUSE-SLE-Module-Desktop-Applications-15-2018-2303 SKIP SUSE-RU-2018:3226-1 as SUSE-Storage-4-2018-2304 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2304,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2304,SUSE-SLE-SAP-12-SP2-2018-2304,SUSE-SLE-SERVER-12-SP2-2018-2304,SUSE-Storage-4-2018-2304 SKIP SUSE-RU-2018:3228-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2307 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2307,SUSE-SLE-Module-Desktop-Applications-15-2018-2307 SKIP SUSE-RU-2018:3239-1 as SUSE-SLE-SERVER-12-SP1-2018-2318 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-2318,SUSE-SLE-SERVER-12-2018-2318,SUSE-SLE-SERVER-12-SP1-2018-2318 SKIP SUSE-RU-2018:3241-1 as SUSE-SLE-Module-Development-Tools-15-2018-2337 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2337 SKIP SUSE-RU-2018:3242-1 as SUSE-SLE-Module-Basesystem-15-2018-2334 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2334 SKIP SUSE-RU-2018:3243-1 as SUSE-SLE-SERVER-12-SP3-2018-2331 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2331,SUSE-SLE-SDK-12-SP3-2018-2331,SUSE-SLE-SERVER-12-SP3-2018-2331 SKIP SUSE-RU-2018:3244-1 as SUSE-SLE-Manager-Tools-12-2018-2329 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2329 SKIP SUSE-RU-2018:3246-1 as SUSE-SUSE-Manager-Proxy-3.2-2018-2323 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-2323 SKIP SUSE-RU-2018:3248-1 as SUSE-SLE-Product-HA-15-2018-2338 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-2338 SKIP SUSE-RU-2018:3252-1 as SUSE-SLE-Manager-Tools-15-2018-2326 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-15-2018-2326 SKIP SUSE-RU-2018:3254-1 as SUSE-SUSE-Manager-Server-3.2-2018-2321 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-2321,SUSE-SUSE-Manager-Server-3.2-2018-2321 SKIP SUSE-RU-2018:3255-1 as SUSE-SUSE-Manager-Server-3.2-2018-2323 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.2-2018-2323 SKIP SUSE-RU-2018:3256-1 as SUSE-SLE-SERVER-12-SP3-2018-2324 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2324,SUSE-SLE-SERVER-12-SP3-2018-2324 SKIP SUSE-RU-2018:3259-1 as slesctsp4-client-tools-201810-13823 is not security or has no CVEs. patches: slesctsp3-client-tools-201810-13823,slesctsp4-client-tools-201810-13823 SKIP SUSE-RU-2018:3262-1 as SUSE-SLE-Module-Basesystem-15-2018-2343 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2343 SKIP SUSE-RU-2018:3263-1 as SUSE-SLE-SERVER-12-SP3-2018-2341 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2341,SUSE-SLE-DESKTOP-12-SP3-2018-2341,SUSE-SLE-SDK-12-SP3-2018-2341,SUSE-SLE-SERVER-12-SP3-2018-2341 SKIP SUSE-RU-2018:3264-1 as SUSE-SLE-SERVER-12-SP3-2018-2342 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2342,SUSE-SLE-SDK-12-SP3-2018-2342,SUSE-SLE-SERVER-12-SP3-2018-2342 SKIP SUSE-RU-2018:3266-1 as slesctsp4-salt-201810-13826 is not security or has no CVEs. patches: slesctsp3-salt-201810-13826,slesctsp4-salt-201810-13826 SKIP SUSE-RU-2018:3267-1 as SUSE-SLE-Module-Server-Applications-15-2018-2345 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2345,SUSE-SLE-Module-Server-Applications-15-2018-2345 SKIP SUSE-RU-2018:3270-1 as SUSE-SLE-HA-12-SP2-2018-2349 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-2349 SKIP SUSE-RU-2018:3271-1 as SUSE-SLE-Product-HA-15-2018-2348 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-2348 SKIP SUSE-RU-2018:3274-1 as SUSE-SLE-Module-Server-Applications-15-2018-2344 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2344,SUSE-SLE-Module-Server-Applications-15-2018-2344 SKIP SUSE-RU-2018:3275-1 as SUSE-SLE-Module-Basesystem-15-2018-2351 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2351 SKIP SUSE-RU-2018:3276-1 as SUSE-SLE-Module-Basesystem-15-2018-2347 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2347 SKIP SUSE-RU-2018:3279-1 as SUSE-SLE-Module-Basesystem-15-2018-2346 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2346 SKIP SUSE-RU-2018:3280-1 as SUSE-SLE-SERVER-12-SP3-2018-2366 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2366,SUSE-SLE-SERVER-12-SP3-2018-2366 SKIP SUSE-RU-2018:3281-1 as SUSE-SLE-Module-Development-Tools-15-2018-2370 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2370,SUSE-SLE-Module-Development-Tools-15-2018-2370 SKIP SUSE-RU-2018:3283-1 as SUSE-SLE-Module-Server-Applications-15-2018-2368 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-15-2018-2368,SUSE-SLE-Module-Server-Applications-15-2018-2368 SKIP SUSE-RU-2018:3284-1 as SUSE-SLE-SERVER-12-SP3-2018-2367 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2367 SKIP SUSE-RU-2018:3285-1 as SUSE-SLE-SERVER-12-SP3-2018-2369 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2369,SUSE-SLE-SDK-12-SP3-2018-2369,SUSE-SLE-SERVER-12-SP3-2018-2369 SKIP SUSE-RU-2018:3288-1 as SUSE-Storage-4-2018-2371 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2371,SUSE-SLE-DESKTOP-12-SP3-2018-2371,SUSE-SLE-SAP-12-SP2-2018-2371,SUSE-SLE-SERVER-12-SP2-2018-2371,SUSE-SLE-SERVER-12-SP3-2018-2371,SUSE-SLE-WE-12-SP3-2018-2371,SUSE-Storage-4-2018-2371 SKIP SUSE-RU-2018:3291-1 as SUSE-SLE-SERVER-12-SP3-2018-2376 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2376,SUSE-SLE-SERVER-12-SP3-2018-2376 SKIP SUSE-RU-2018:3307-1 as SUSE-SLE-Module-Basesystem-15-2018-2389 is not security or has no CVEs. patches: SUSE-SLE-INSTALLER-15-2018-2389,SUSE-SLE-Module-Basesystem-15-2018-2389 SKIP SUSE-RU-2018:3308-1 as SUSE-SLE-SERVER-12-SP3-2018-2383 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2383,SUSE-SLE-SERVER-12-SP3-2018-2383 SKIP SUSE-RU-2018:3309-1 as SUSE-SLE-SERVER-12-SP3-2018-2388 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2388,SUSE-SLE-SERVER-12-SP3-2018-2388 SKIP SUSE-RU-2018:3310-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2386 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2386 SKIP SUSE-RU-2018:3312-1 as SUSE-SLE-Module-Server-Applications-15-2018-2387 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2387,SUSE-SLE-Module-Server-Applications-15-2018-2387 SKIP SUSE-RU-2018:3317-1 as SUSE-SUSE-Manager-Server-3.2-2018-2379 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2379,SUSE-SLE-Module-Adv-Systems-Management-12-2018-2379,SUSE-SLE-POS-12-SP2-2018-2379,SUSE-SUSE-Manager-Proxy-3.0-2018-2379,SUSE-SUSE-Manager-Proxy-3.1-2018-2379,SUSE-SUSE-Manager-Proxy-3.2-2018-2379,SUSE-SUSE-Manager-Server-3.0-2018-2379,SUSE-SUSE-Manager-Server-3.1-2018-2379,SUSE-SUSE-Manager-Server-3.2-2018-2379 SKIP SUSE-RU-2018:3320-1 as SUSE-SLE-Module-Legacy-15-2018-2384 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-15-2018-2384 SKIP SUSE-RU-2018:3321-1 as SUSE-SLE-SERVER-12-SP3-2018-2385 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2385 SKIP SUSE-RU-2018:3322-1 as SUSE-SLE-Module-Basesystem-15-2018-2382 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2382 SKIP SUSE-RU-2018:3329-1 as SUSE-SLE-Module-Basesystem-15-2018-2395 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2395 SKIP SUSE-RU-2018:3334-1 as SUSE-SLE-Module-Server-Applications-15-2018-2414 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2414 SKIP SUSE-RU-2018:3335-1 as SUSE-SLE-Live-Patching-12-SP3-2018-2405 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-SP3-2018-2405 SKIP SUSE-RU-2018:3336-1 as SUSE-SLE-Module-Server-Applications-15-2018-2417 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2417 SKIP SUSE-RU-2018:3337-1 as SUSE-Storage-5-2018-2401 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2401 SKIP SUSE-RU-2018:3338-1 as SUSE-SLE-SERVER-12-SP3-2018-2407 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2407 SKIP SUSE-RU-2018:3339-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2415 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2415 SKIP SUSE-RU-2018:3340-1 as SUSE-SLE-SERVER-12-SP3-2018-2413 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2413,SUSE-SLE-SERVER-12-SP3-2018-2413 SKIP SUSE-RU-2018:3341-1 as SUSE-SLE-Module-Basesystem-15-2018-2412 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2412 SKIP SUSE-RU-2018:3344-1 as SUSE-SLE-WE-12-SP3-2018-2405 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2405,SUSE-SLE-HA-12-SP3-2018-2405,SUSE-SLE-SDK-12-SP3-2018-2405,SUSE-SLE-SERVER-12-SP3-2018-2405,SUSE-SLE-WE-12-SP3-2018-2405 SKIP SUSE-RU-2018:3345-1 as SUSE-SLE-Module-Basesystem-15-2018-2411 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2411 SKIP SUSE-RU-2018:3346-1 as SUSE-SLE-Module-Basesystem-15-2018-2409 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2409 SKIP SUSE-RU-2018:3347-1 as SUSE-Storage-4-2018-2406 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2406,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2406,SUSE-SLE-SAP-12-SP2-2018-2406,SUSE-SLE-SERVER-12-SP2-2018-2406,SUSE-Storage-4-2018-2406 SKIP SUSE-RU-2018:3347-2 as SUSE-SLE-SERVER-12-SP2-BCL-2018-2406 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-2406,SUSE-SLE-SERVER-12-SP2-BCL-2018-2406 SKIP SUSE-RU-2018:3349-1 as SUSE-SLE-Product-WE-15-2018-2418 is not security or has no CVEs. patches: SUSE-SLE-Product-WE-15-2018-2418 SKIP SUSE-RU-2018:3350-1 as SUSE-SLE-Module-HPC-12-2018-2410 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-2410 SKIP SUSE-RU-2018:3353-1 as SUSE-SLE-Module-Basesystem-15-2018-2419 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2419 SKIP SUSE-RU-2018:3354-1 as SUSE-SLE-SERVER-12-SP3-2018-2408 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2408,SUSE-SLE-SERVER-12-SP3-2018-2408 SKIP SUSE-RU-2018:3355-1 as SUSE-SLE-Module-Basesystem-15-2018-2416 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2416 SKIP SUSE-RU-2018:3374-1 as SUSE-SLE-SERVER-12-SP3-2018-2423 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2423,SUSE-SLE-SDK-12-SP3-2018-2423,SUSE-SLE-SERVER-12-SP3-2018-2423 SKIP SUSE-RU-2018:3378-1 as SUSE-SLE-SERVER-12-SP3-2018-2422 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2422,SUSE-SLE-SERVER-12-SP3-2018-2422 SKIP SUSE-RU-2018:3380-1 as SUSE-SLE-SERVER-12-SP3-2018-2424 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2424 SKIP SUSE-RU-2018:3382-1 as SUSE-SLE-WE-12-SP3-2018-2426 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2426,SUSE-SLE-SDK-12-SP3-2018-2426,SUSE-SLE-SERVER-12-SP3-2018-2426,SUSE-SLE-WE-12-SP3-2018-2426 SKIP SUSE-RU-2018:3385-1 as SUSE-SLE-Product-WE-15-2018-2428 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2428,SUSE-SLE-Product-WE-15-2018-2428 SKIP SUSE-RU-2018:3390-1 as SUSE-Storage-4-2018-2435 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2435,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2435,SUSE-SLE-DESKTOP-12-SP3-2018-2435,SUSE-SLE-SAP-12-SP2-2018-2435,SUSE-SLE-SDK-12-SP3-2018-2435,SUSE-SLE-SERVER-12-SP2-2018-2435,SUSE-SLE-SERVER-12-SP2-BCL-2018-2435,SUSE-SLE-SERVER-12-SP3-2018-2435,SUSE-Storage-4-2018-2435 SKIP SUSE-RU-2018:3394-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2443 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2443 SKIP SUSE-RU-2018:3395-1 as slessp4-supportutils-13835 is not security or has no CVEs. patches: slessp4-supportutils-13835 SKIP SUSE-RU-2018:3397-1 as SUSE-SLE-Module-Server-Applications-15-2018-2440 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2440 SKIP SUSE-RU-2018:3398-1 as SUSE-SLE-SERVER-12-SP3-2018-2444 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2444,SUSE-SLE-SERVER-12-SP3-2018-2444 SKIP SUSE-RU-2018:3400-1 as SUSE-SLE-Module-Basesystem-15-2018-2438 is not security or has no CVEs. patches: SUSE-SLE-INSTALLER-15-2018-2438,SUSE-SLE-Module-Basesystem-15-2018-2438 SKIP SUSE-RU-2018:3401-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2437 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2437 SKIP SUSE-RU-2018:3402-1 as SUSE-SLE-Module-Development-Tools-15-2018-2439 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2439 SKIP SUSE-RU-2018:3404-1 as SUSE-SLE-Module-Basesystem-15-2018-2445 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2445 SKIP SUSE-RU-2018:3405-1 as SUSE-SLE-Module-Public-Cloud-15-2018-2442 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-15-2018-2442 SKIP SUSE-RU-2018:3406-1 as slessp4-tcsh-13836 is not security or has no CVEs. patches: slessp4-tcsh-13836 SKIP SUSE-RU-2018:3421-1 as SUSE-SLE-SERVER-12-SP3-2018-2449 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2449,SUSE-SLE-SDK-12-SP3-2018-2449,SUSE-SLE-SERVER-12-SP3-2018-2449 SKIP SUSE-RU-2018:3422-1 as slessp4-yast2-core-13837 is not security or has no CVEs. patches: sdksp4-yast2-core-13837,slessp4-yast2-core-13837 SKIP SUSE-RU-2018:3425-1 as SUSE-SLE-Module-Basesystem-15-2018-2454 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2454 SKIP SUSE-RU-2018:3426-1 as slessp4-rsync-13839 is not security or has no CVEs. patches: slessp4-rsync-13839 SKIP SUSE-RU-2018:3429-1 as SUSE-SLE-SERVER-12-SP3-2018-2455 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2455,SUSE-SLE-DESKTOP-12-SP3-2018-2455,SUSE-SLE-SERVER-12-SP3-2018-2455 SKIP SUSE-RU-2018:3431-1 as SUSE-SLE-SERVER-12-SP3-2018-2451 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2451,SUSE-SLE-SERVER-12-SP3-2018-2451 SKIP SUSE-RU-2018:3437-1 as SUSE-SLE-SERVER-12-SP3-2018-2464 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2464,SUSE-SLE-SDK-12-SP3-2018-2464,SUSE-SLE-SERVER-12-SP3-2018-2464 SKIP SUSE-RU-2018:3439-1 as SUSE-SLE-SERVER-12-SP3-2018-2465 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2465,SUSE-SLE-SERVER-12-SP3-2018-2465 SKIP SUSE-RU-2018:3442-1 as SUSE-SLE-Module-Basesystem-15-2018-2467 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2467 SKIP SUSE-RU-2018:3443-1 as slessp4-smartmontools-13840 is not security or has no CVEs. patches: slessp4-smartmontools-13840 SKIP SUSE-RU-2018:3444-1 as SUSE-SLE-SERVER-12-SP3-2018-2457 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2457,SUSE-SLE-DESKTOP-12-SP3-2018-2457,SUSE-SLE-SDK-12-SP3-2018-2457,SUSE-SLE-SERVER-12-SP3-2018-2457 SKIP SUSE-RU-2018:3448-1 as SUSE-SLE-Module-Basesystem-15-2018-2463 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2463 SKIP SUSE-RU-2018:3450-1 as SUSE-SLE-SERVER-12-SP3-2018-2466 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2466,SUSE-SLE-SDK-12-SP3-2018-2466,SUSE-SLE-SERVER-12-SP3-2018-2466 SKIP SUSE-RU-2018:3454-1 as SUSE-SLE-Module-Basesystem-15-2018-2478 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2478 SKIP SUSE-RU-2018:3455-1 as SUSE-SLE-Module-Basesystem-15-2018-2477 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2477 SKIP SUSE-RU-2018:3457-1 as SUSE-SLE-Module-Legacy-12-2018-2470 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-12-2018-2470 SKIP SUSE-RU-2018:3458-1 as SUSE-Storage-4-2018-2476 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2476,SUSE-SLE-SAP-12-SP2-2018-2476,SUSE-SLE-SERVER-12-2018-2476,SUSE-SLE-SERVER-12-SP1-2018-2476,SUSE-SLE-SERVER-12-SP2-2018-2476,SUSE-SLE-SERVER-12-SP2-BCL-2018-2476,SUSE-SLE-SERVER-12-SP3-2018-2476,SUSE-Storage-4-2018-2476 SKIP SUSE-RU-2018:3458-2 as SUSE-SLE-SAP-12-SP1-2019-1078 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2019-1078 SKIP SUSE-RU-2018:3459-1 as slessp4-tar-13844 is not security or has no CVEs. patches: slessp4-tar-13844 SKIP SUSE-RU-2018:3460-1 as SUSE-Storage-4-2018-2471 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2471,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2471,SUSE-SLE-SAP-12-2018-2471,SUSE-SLE-SAP-12-SP1-2018-2471,SUSE-SLE-SAP-12-SP2-2018-2471,SUSE-SLE-SERVER-12-2018-2471,SUSE-SLE-SERVER-12-SP1-2018-2471,SUSE-SLE-SERVER-12-SP2-2018-2471,SUSE-SLE-SERVER-12-SP2-BCL-2018-2471,SUSE-Storage-4-2018-2471 SKIP SUSE-RU-2018:3461-1 as SUSE-SLE-Module-Basesystem-15-2018-2479 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2479 SKIP SUSE-RU-2018:3462-1 as SUSE-SLE-SERVER-12-2018-2474 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-2474 SKIP SUSE-RU-2018:3463-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-2475 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2475,SUSE-SLE-DESKTOP-INSTALLER-12-SP3-2018-2475,SUSE-SLE-SDK-12-SP3-2018-2475,SUSE-SLE-SERVER-12-SP3-2018-2475,SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-2475 SKIP SUSE-RU-2018:3464-1 as SUSE-SLE-SERVER-12-SP3-2018-2473 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2473,SUSE-SLE-DESKTOP-12-SP3-2018-2473,SUSE-SLE-SERVER-12-SP3-2018-2473 SKIP SUSE-RU-2018:3482-1 as SUSE-SLE-SERVER-12-SP3-2018-2488 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2488,SUSE-SLE-DESKTOP-12-SP3-2018-2488,SUSE-SLE-SERVER-12-SP3-2018-2488 SKIP SUSE-RU-2018:3483-1 as SUSE-SLE-Module-Basesystem-15-2018-2489 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2489 SKIP SUSE-RU-2018:3484-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2496 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2496 SKIP SUSE-RU-2018:3485-1 as SUSE-SLE-Module-Basesystem-15-2018-2490 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2490 SKIP SUSE-RU-2018:3486-1 as SUSE-SLE-Module-Basesystem-15-2018-2494 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2494 SKIP SUSE-RU-2018:3488-1 as SUSE-SLE-Module-Basesystem-15-2018-2485 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2485 SKIP SUSE-RU-2018:3489-1 as slessp4-s390-tools-13845 is not security or has no CVEs. patches: slessp4-s390-tools-13845 SKIP SUSE-RU-2018:3491-1 as SUSE-SLE-Module-Basesystem-15-2018-2486 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2486 SKIP SUSE-RU-2018:3492-1 as SUSE-SLE-Module-Development-Tools-15-2018-2487 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2487,SUSE-SLE-Module-Development-Tools-15-2018-2487 SKIP SUSE-RU-2018:3493-1 as SUSE-SLE-Module-Containers-12-2018-2498 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-2498 SKIP SUSE-RU-2018:3494-1 as SUSE-SLE-SERVER-12-SP1-2018-2499 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2018-2499 SKIP SUSE-RU-2018:3494-2 as SUSE-SLE-SAP-12-SP1-2019-1083 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2019-1083 SKIP SUSE-RU-2018:3495-1 as SUSE-SLE-SERVER-12-2018-2500 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-2500 SKIP SUSE-RU-2018:3496-1 as SUSE-SLE-SERVER-12-SP3-2018-2501 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2501,SUSE-SLE-SERVER-12-SP3-2018-2501 SKIP SUSE-RU-2018:3497-1 as SUSE-SLE-Module-Basesystem-15-2018-2502 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2502 SKIP SUSE-RU-2018:3500-1 as SUSE-SLE-Module-Public-Cloud-15-2018-2507 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-15-2018-2507 SKIP SUSE-RU-2018:3509-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2506 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2506,SUSE-SLE-Module-Desktop-Applications-15-2018-2506 SKIP SUSE-RU-2018:3543-1 as SUSE-Storage-4-2018-2510 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2510,SUSE-SLE-DESKTOP-12-SP3-2018-2510,SUSE-SLE-SAP-12-SP2-2018-2510,SUSE-SLE-SDK-12-SP3-2018-2510,SUSE-SLE-SERVER-12-SP2-2018-2510,SUSE-SLE-SERVER-12-SP2-BCL-2018-2510,SUSE-SLE-SERVER-12-SP3-2018-2510,SUSE-Storage-4-2018-2510 SKIP SUSE-RU-2018:3544-1 as SUSE-SLE-Module-Server-Applications-15-2018-2513 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2513,SUSE-SLE-Module-Server-Applications-15-2018-2513 SKIP SUSE-RU-2018:3546-1 as SUSE-SLE-Product-WE-15-2018-2511 is not security or has no CVEs. patches: SUSE-SLE-Product-WE-15-2018-2511 SKIP SUSE-RU-2018:3547-1 as SUSE-SLE-Module-Basesystem-15-2018-2514 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2514 ERROR: notice SUSE-RU-2018:3548-1 has no valid patches out of: SUSE-SLE-Module-Development-Tools-OBS-15-2018-2515 SKIP SUSE-RU-2018:3551-1 as SUSE-SLE-SERVER-12-SP3-2018-2516 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2516,SUSE-SLE-DESKTOP-12-SP3-2018-2516,SUSE-SLE-SERVER-12-SP3-2018-2516 SKIP SUSE-RU-2018:3557-1 as SUSE-SLE-SERVER-12-SP3-2018-2524 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2524,SUSE-SLE-SERVER-12-SP3-2018-2524 ERROR: notice SUSE-RU-2018:3561-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1720,SUSE-SLE-SERVER-12-SP4-2018-1720 ERROR: notice SUSE-RU-2018:3565-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1721,SUSE-SLE-SERVER-12-SP4-2018-1721 ERROR: notice SUSE-RU-2018:3566-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1723,SUSE-SLE-SERVER-12-SP4-2018-1723 ERROR: notice SUSE-RU-2018:3567-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1724,SUSE-SLE-SERVER-12-SP4-2018-1724 ERROR: notice SUSE-RU-2018:3568-1 has no valid patches out of: SUSE-SLE-DESKTOP-12-SP4-2018-1722,SUSE-SLE-SERVER-12-SP4-2018-1722 SKIP SUSE-RU-2018:3569-1 as SUSE-SLE-Module-Basesystem-15-2018-2526 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2526 SKIP SUSE-RU-2018:3570-1 as SUSE-SLE-WE-12-SP3-2018-2525 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2525,SUSE-SLE-DESKTOP-12-SP3-2018-2525,SUSE-SLE-SDK-12-SP3-2018-2525,SUSE-SLE-SERVER-12-SP3-2018-2525,SUSE-SLE-WE-12-SP3-2018-2525 SKIP SUSE-RU-2018:3570-2 as SUSE-SLE-WE-12-SP4-2018-2525 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2525,SUSE-SLE-SDK-12-SP4-2018-2525,SUSE-SLE-SERVER-12-SP4-2018-2525,SUSE-SLE-WE-12-SP4-2018-2525 SKIP SUSE-RU-2018:3573-1 as slessp4-yast2-bootloader-13850 is not security or has no CVEs. patches: slessp4-yast2-bootloader-13850 SKIP SUSE-RU-2018:3574-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-2531 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-2531,SUSE-OpenStack-Cloud-8-2018-2531,SUSE-OpenStack-Cloud-Crowbar-8-2018-2531 SKIP SUSE-RU-2018:3575-1 as SUSE-SLE-SERVER-12-SP1-2018-2535 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP1-2018-2535 SKIP SUSE-RU-2018:3575-2 as SUSE-SLE-SAP-12-SP1-2019-1069 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2019-1069 SKIP SUSE-RU-2018:3576-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2536 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2536,SUSE-SLE-Module-Desktop-Applications-15-2018-2536 SKIP SUSE-RU-2018:3577-1 as SUSE-SLE-SERVER-12-SP3-2018-2533 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2533,SUSE-SLE-DESKTOP-12-SP3-2018-2533,SUSE-SLE-SERVER-12-SP3-2018-2533 SKIP SUSE-RU-2018:3577-2 as SUSE-SLE-SERVER-12-SP4-2018-2533 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2533,SUSE-SLE-SERVER-12-SP4-2018-2533 SKIP SUSE-RU-2018:3578-1 as SUSE-SLE-Module-Server-Applications-15-2018-2529 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2529 SKIP SUSE-RU-2018:3579-1 as SUSE-SLE-Module-Basesystem-15-2018-2540 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2540,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2540 SKIP SUSE-RU-2018:3580-1 as SUSE-SLE-Module-Development-Tools-15-2018-2539 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2539,SUSE-SLE-Module-Development-Tools-15-2018-2539 SKIP SUSE-RU-2018:3581-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-2530 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-2530,SUSE-OpenStack-Cloud-8-2018-2530,SUSE-OpenStack-Cloud-Crowbar-8-2018-2530 SKIP SUSE-RU-2018:3583-1 as SUSE-SLE-SERVER-12-SP3-2018-2532 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-2532,SUSE-SLE-SDK-12-SP3-2018-2532,SUSE-SLE-SERVER-12-SP3-2018-2532 SKIP SUSE-RU-2018:3584-1 as SUSE-Storage-4-2018-2534 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2534,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2534,SUSE-SLE-SAP-12-SP2-2018-2534,SUSE-SLE-SERVER-12-SP2-2018-2534,SUSE-SLE-SERVER-12-SP2-BCL-2018-2534,SUSE-Storage-4-2018-2534 SKIP SUSE-RU-2018:3585-1 as SUSE-SLE-Module-Toolchain-12-2018-2537 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2018-2537 SKIP SUSE-RU-2018:3586-1 as slessp4-cmpi-provider-register-13851 is not security or has no CVEs. patches: slessp4-cmpi-provider-register-13851 SKIP SUSE-RU-2018:3594-1 as slessp4-open-iscsi-13852 is not security or has no CVEs. patches: slessp4-open-iscsi-13852 SKIP SUSE-RU-2018:3595-1 as SUSE-SLE-Module-Basesystem-15-2018-2550 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2550 SKIP SUSE-RU-2018:3596-1 as SUSE-SLE-Module-Basesystem-15-2018-2552 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2552 SKIP SUSE-RU-2018:3597-1 as SUSE-SLE-SERVER-12-SP3-2018-2557 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2557,SUSE-SLE-SERVER-12-SP3-2018-2557 SKIP SUSE-RU-2018:3597-2 as SUSE-SLE-DESKTOP-12-SP3-2018-2557 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2557 SKIP SUSE-RU-2018:3597-3 as SUSE-SLE-SERVER-12-SP4-2018-2557 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2557,SUSE-SLE-SDK-12-SP4-2018-2557,SUSE-SLE-SERVER-12-SP4-2018-2557 SKIP SUSE-RU-2018:3598-1 as SUSE-SLE-Module-Basesystem-15-2018-2560 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2560 SKIP SUSE-RU-2018:3599-1 as SUSE-SLE-SERVER-12-SP3-2018-2554 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2554 SKIP SUSE-RU-2018:3599-2 as SUSE-SLE-DESKTOP-12-SP3-2018-2554 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2554 SKIP SUSE-RU-2018:3600-1 as SUSE-SLE-HA-12-SP2-2018-2558 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-2558 SKIP SUSE-RU-2018:3601-1 as SUSE-SLE-Module-Server-Applications-15-2018-2555 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2555,SUSE-SLE-Module-Server-Applications-15-2018-2555 SKIP SUSE-RU-2018:3602-1 as slessp4-python-pywbem-13853 is not security or has no CVEs. patches: slessp4-python-pywbem-13853 SKIP SUSE-RU-2018:3603-1 as SUSE-SLE-SERVER-12-SP3-2018-2553 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2553 SKIP SUSE-RU-2018:3603-2 as SUSE-SLE-DESKTOP-12-SP3-2018-2553 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2553 SKIP SUSE-RU-2018:3603-3 as SUSE-SLE-SERVER-12-SP4-2019-1401 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2019-1401,SUSE-SLE-SERVER-12-SP4-2019-1401 SKIP SUSE-RU-2018:3604-1 as SUSE-SLE-Module-Basesystem-15-2018-2559 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2559 SKIP SUSE-RU-2018:3605-1 as SUSE-OpenStack-Cloud-7-2018-2561 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2561 SKIP SUSE-RU-2018:3611-1 as SUSE-SLE-SERVER-12-SP3-2018-2567 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2567,SUSE-SLE-SDK-12-SP3-2018-2567,SUSE-SLE-SERVER-12-SP3-2018-2567 SKIP SUSE-RU-2018:3611-2 as SUSE-SLE-SERVER-12-SP4-2018-2567 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2567,SUSE-SLE-SDK-12-SP4-2018-2567,SUSE-SLE-SERVER-12-SP4-2018-2567 SKIP SUSE-RU-2018:3612-1 as SUSE-SLE-SDK-12-SP3-2018-2568 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2568 SKIP SUSE-RU-2018:3612-2 as SUSE-SLE-SDK-12-SP4-2019-2547 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP4-2019-2547 SKIP SUSE-RU-2018:3613-1 as SUSE-SLE-Module-Development-Tools-15-2018-2569 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2569,SUSE-SLE-Module-Development-Tools-15-2018-2569 SKIP SUSE-RU-2018:3614-1 as SUSE-SLE-Product-HA-15-2018-2573 is not security or has no CVEs. patches: SUSE-SLE-Product-HA-15-2018-2573 SKIP SUSE-RU-2018:3615-1 as SUSE-SLE-SERVER-12-SP3-2018-2570 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2570 SKIP SUSE-RU-2018:3615-2 as SUSE-SLE-SERVER-12-SP4-2019-2528 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP4-2019-2528 SKIP SUSE-RU-2018:3616-1 as SUSE-SLE-WE-12-SP3-2018-2572 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2572,SUSE-SLE-SDK-12-SP3-2018-2572,SUSE-SLE-SERVER-12-SP3-2018-2572,SUSE-SLE-WE-12-SP3-2018-2572 SKIP SUSE-RU-2018:3616-2 as SUSE-SLE-WE-12-SP4-2018-2572 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2572,SUSE-SLE-SDK-12-SP4-2018-2572,SUSE-SLE-SERVER-12-SP4-2018-2572,SUSE-SLE-WE-12-SP4-2018-2572 SKIP SUSE-RU-2018:3617-1 as SUSE-SLE-Module-Basesystem-15-2018-2571 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2571 SKIP SUSE-RU-2018:3623-1 as SUSE-SLE-SERVER-12-SP3-2018-2584 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2584,SUSE-SLE-SDK-12-SP3-2018-2584,SUSE-SLE-SERVER-12-SP3-2018-2584 SKIP SUSE-RU-2018:3623-2 as SUSE-SLE-SERVER-12-SP4-2018-2584 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2584,SUSE-SLE-SDK-12-SP4-2018-2584,SUSE-SLE-SERVER-12-SP4-2018-2584 SKIP SUSE-RU-2018:3627-1 as SUSE-Storage-4-2018-2577 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2577,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2577,SUSE-SLE-SAP-12-SP2-2018-2577,SUSE-SLE-SERVER-12-SP2-2018-2577,SUSE-SLE-SERVER-12-SP2-BCL-2018-2577,SUSE-Storage-4-2018-2577 SKIP SUSE-RU-2018:3628-1 as SUSE-SLE-WE-12-SP3-2018-2585 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2585,SUSE-SLE-SDK-12-SP3-2018-2585,SUSE-SLE-SERVER-12-SP3-2018-2585,SUSE-SLE-WE-12-SP3-2018-2585 SKIP SUSE-RU-2018:3628-2 as SUSE-SLE-WE-12-SP4-2018-2585 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2585,SUSE-SLE-SDK-12-SP4-2018-2585,SUSE-SLE-SERVER-12-SP4-2018-2585,SUSE-SLE-WE-12-SP4-2018-2585 SKIP SUSE-RU-2018:3634-1 as SUSE-SLE-SERVER-12-SP3-2018-2586 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2586,SUSE-SLE-SDK-12-SP3-2018-2586,SUSE-SLE-SERVER-12-SP3-2018-2586 SKIP SUSE-RU-2018:3634-2 as SUSE-SLE-SERVER-12-SP4-2018-2586 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2586,SUSE-SLE-SDK-12-SP4-2018-2586,SUSE-SLE-SERVER-12-SP4-2018-2586 SKIP SUSE-RU-2018:3636-1 as SUSE-SLE-Module-Basesystem-15-2018-2591 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2591,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2591 SKIP SUSE-RU-2018:3637-1 as SUSE-SLE-Module-Server-Applications-15-2018-2590 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2590 SKIP SUSE-RU-2018:3641-1 as SUSE-SLE-SERVER-12-SP3-2018-2593 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2593,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2593,SUSE-SLE-DESKTOP-12-SP3-2018-2593,SUSE-SLE-SDK-12-SP3-2018-2593,SUSE-SLE-SERVER-12-SP3-2018-2593 SKIP SUSE-RU-2018:3642-1 as SUSE-SLE-Module-Basesystem-15-2018-2597 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2597 SKIP SUSE-RU-2018:3645-1 as slessp3-sysvinit-13857 is not security or has no CVEs. patches: sleposp3-sysvinit-13857,slessp3-sysvinit-13857 SKIP SUSE-RU-2018:3647-1 as SUSE-SLE-HA-12-SP3-2018-2599 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-2599 SKIP SUSE-RU-2018:3648-1 as SUSE-SLE-Product-WE-15-2018-2596 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2596,SUSE-SLE-Product-WE-15-2018-2596 SKIP SUSE-RU-2018:3649-1 as SUSE-SLE-SERVER-12-SP3-2018-2601 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2601,SUSE-SLE-SERVER-12-SP3-2018-2601 SKIP SUSE-RU-2018:3650-1 as SUSE-SLE-SERVER-12-SP3-2018-2603 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2603,SUSE-SLE-SDK-12-SP3-2018-2603,SUSE-SLE-SERVER-12-SP3-2018-2603 SKIP SUSE-RU-2018:3650-2 as SUSE-SLE-SERVER-12-SP4-2018-2603 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2603,SUSE-SLE-SDK-12-SP4-2018-2603,SUSE-SLE-SERVER-12-SP4-2018-2603 SKIP SUSE-RU-2018:3651-1 as slehasp4-pacemaker-13858 is not security or has no CVEs. patches: slehasp4-pacemaker-13858 SKIP SUSE-RU-2018:3652-1 as SUSE-SLE-Module-Basesystem-15-2018-2605 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2605 SKIP SUSE-RU-2018:3654-1 as SUSE-SLE-Module-Basesystem-15-2018-2604 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2604 SKIP SUSE-RU-2018:3655-1 as SUSE-SLE-Module-Development-Tools-15-2018-2607 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2607,SUSE-SLE-Module-Development-Tools-15-2018-2607 ERROR: notice SUSE-RU-2018:3655-2 has no valid patches out of: SUSE-SLE-Module-Development-Tools-OBS-15-2019-227 SKIP SUSE-RU-2018:3655-3 as SUSE-SLE-Product-SLES_SAP-15-2020-3716 is not security or has no CVEs. patches: SUSE-SLE-Product-HPC-15-2020-3716,SUSE-SLE-Product-SLES_SAP-15-2020-3716 SKIP SUSE-RU-2018:3677-1 as slessp4-bridge-utils-13860 is not security or has no CVEs. patches: slessp4-bridge-utils-13860 SKIP SUSE-RU-2018:3678-1 as SUSE-SLE-Module-Toolchain-12-2018-2611 is not security or has no CVEs. patches: SUSE-SLE-Module-Toolchain-12-2018-2611 SKIP SUSE-RU-2018:3679-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-2614 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2614,SUSE-SLE-DESKTOP-INSTALLER-12-SP3-2018-2614,SUSE-SLE-SAP-INSTALLER-12-SP3-2018-2614,SUSE-SLE-SERVER-12-SP3-2018-2614,SUSE-SLE-SERVER-INSTALLER-12-SP3-2018-2614 SKIP SUSE-RU-2018:3682-1 as SUSE-SLE-Module-Basesystem-15-2018-2613 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2613 SKIP SUSE-RU-2018:3684-1 as SUSE-SLE-SERVER-12-SP3-2018-2615 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2615,SUSE-SLE-SERVER-12-SP3-2018-2615 SKIP SUSE-RU-2018:3684-2 as SUSE-SLE-SERVER-12-SP4-2018-2615 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2615,SUSE-SLE-SERVER-12-SP4-2018-2615 SKIP SUSE-RU-2018:3724-1 as SUSE-Storage-5-2018-2623 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2623 ERROR: notice SUSE-RU-2018:3725-1 has no valid patches out of: SUSE-SLE-Module-Development-Tools-OBS-15-2018-2624 ERROR: notice SUSE-RU-2018:3726-1 has no valid patches out of: SUSE-SLE-Module-Development-Tools-OBS-15-2018-2625 SKIP SUSE-RU-2018:3727-1 as SUSE-SLE-Module-Basesystem-15-2018-2622 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2622 SKIP SUSE-RU-2018:3728-1 as SUSE-SLE-Module-Basesystem-15-2018-2626 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2626 SKIP SUSE-RU-2018:3729-1 as SUSE-SLE-SERVER-12-SP3-2018-2627 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2627,SUSE-SLE-SERVER-12-SP3-2018-2627 SKIP SUSE-RU-2018:3729-2 as SUSE-SLE-SERVER-12-SP4-2018-2627 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2627,SUSE-SLE-SERVER-12-SP4-2018-2627 SKIP SUSE-RU-2018:3730-1 as SUSE-SLE-SAP-12-SP3-2018-2631 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP3-2018-2631 SKIP SUSE-RU-2018:3731-1 as SUSE-SLE-Module-SAP-Applications-15-2018-2630 is not security or has no CVEs. patches: SUSE-SLE-Module-SAP-Applications-15-2018-2630 SKIP SUSE-RU-2018:3732-1 as SUSE-SLE-SAP-12-SP2-2018-2632 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-2632 SKIP SUSE-RU-2018:3733-1 as SUSE-SLE-Module-Basesystem-15-2018-2633 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2633 SKIP SUSE-RU-2018:3735-1 as SUSE-SLE-Module-Basesystem-15-2018-2641 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2641 SKIP SUSE-RU-2018:3736-1 as SUSE-Storage-5-2018-2634 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2634 SKIP SUSE-RU-2018:3737-1 as SUSE-SLE-WE-12-SP3-2018-2642 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2642,SUSE-SLE-SDK-12-SP3-2018-2642,SUSE-SLE-SERVER-12-SP3-2018-2642,SUSE-SLE-WE-12-SP3-2018-2642 SKIP SUSE-RU-2018:3737-2 as SUSE-SLE-WE-12-SP4-2018-2642 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2642,SUSE-SLE-SDK-12-SP4-2018-2642,SUSE-SLE-SERVER-12-SP4-2018-2642,SUSE-SLE-WE-12-SP4-2018-2642 SKIP SUSE-RU-2018:3738-1 as SUSE-SLE-WE-12-SP3-2018-2643 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2643,SUSE-SLE-SERVER-12-SP3-2018-2643,SUSE-SLE-WE-12-SP3-2018-2643 SKIP SUSE-RU-2018:3739-1 as SUSE-SLE-SERVER-12-SP3-2018-2640 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2640,SUSE-SLE-SDK-12-SP3-2018-2640,SUSE-SLE-SERVER-12-SP3-2018-2640 SKIP SUSE-RU-2018:3739-2 as SUSE-SLE-SERVER-12-SP4-2018-2640 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2640,SUSE-SLE-SDK-12-SP4-2018-2640,SUSE-SLE-SERVER-12-SP4-2018-2640 SKIP SUSE-RU-2018:3740-1 as SUSE-Storage-4-2018-2637 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2637,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2637,SUSE-SLE-DESKTOP-12-SP3-2018-2637,SUSE-SLE-SAP-12-SP2-2018-2637,SUSE-SLE-SERVER-12-2018-2637,SUSE-SLE-SERVER-12-SP1-2018-2637,SUSE-SLE-SERVER-12-SP2-2018-2637,SUSE-SLE-SERVER-12-SP2-BCL-2018-2637,SUSE-SLE-SERVER-12-SP3-2018-2637,SUSE-Storage-4-2018-2637 SKIP SUSE-RU-2018:3740-2 as SUSE-SLE-SERVER-12-SP4-2018-2637 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2637,SUSE-SLE-SERVER-12-SP4-2018-2637 SKIP SUSE-RU-2018:3741-1 as slessp4-timezone-13862 is not security or has no CVEs. patches: sdksp4-timezone-13862,sleposp3-timezone-13862,slessp3-timezone-13862,slessp4-timezone-13862 SKIP SUSE-RU-2018:3742-1 as SUSE-SLE-Product-HA-15-2018-2638 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2638,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2638,SUSE-SLE-Module-Packagehub-Subpackages-15-2018-2638,SUSE-SLE-Product-HA-15-2018-2638 SKIP SUSE-RU-2018:3743-1 as SUSE-SLE-SERVER-12-SP3-2018-2639 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2639,SUSE-SLE-SERVER-12-SP3-2018-2639 SKIP SUSE-RU-2018:3743-2 as SUSE-SLE-SERVER-12-SP4-2018-2639 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2639,SUSE-SLE-SERVER-12-SP4-2018-2639 SKIP SUSE-RU-2018:3744-1 as SUSE-SLE-Module-Basesystem-15-2018-2644 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2644 SKIP SUSE-RU-2018:3756-1 as SUSE-SLE-Module-Development-Tools-15-2018-2649 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2649 SKIP SUSE-RU-2018:3758-1 as SUSE-SLE-Live-Patching-12-SP3-2018-2651 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-SP3-2018-2651 SKIP SUSE-RU-2018:3759-1 as SUSE-SLE-WE-12-SP3-2018-2651 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2651,SUSE-SLE-HA-12-SP3-2018-2651,SUSE-SLE-SDK-12-SP3-2018-2651,SUSE-SLE-SERVER-12-SP3-2018-2651,SUSE-SLE-WE-12-SP3-2018-2651 SKIP SUSE-RU-2018:3760-1 as SUSE-SLE-SERVER-12-SP3-2018-2652 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2652,SUSE-SLE-SDK-12-SP3-2018-2652,SUSE-SLE-SERVER-12-SP3-2018-2652 SKIP SUSE-RU-2018:3761-1 as SUSE-Storage-4-2018-2655 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2655,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2655,SUSE-SLE-SAP-12-SP2-2018-2655,SUSE-SLE-SERVER-12-SP2-2018-2655,SUSE-SLE-SERVER-12-SP2-BCL-2018-2655,SUSE-Storage-4-2018-2655 SKIP SUSE-RU-2018:3762-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2653 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2653,SUSE-SLE-Module-Desktop-Applications-15-2018-2653 SKIP SUSE-RU-2018:3763-1 as SUSE-SLE-SERVER-12-SP3-2018-2654 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2654,SUSE-SLE-SERVER-12-SP3-2018-2654 ERROR: notice SUSE-RU-2018:3763-2 has no valid patches out of: SUSE-SLE-SERVER-12-SP4-2018-2654 SKIP SUSE-RU-2018:3763-3 as SUSE-SLE-DESKTOP-12-SP4-2019-2531 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2019-2531 SKIP SUSE-RU-2018:3764-1 as slehasp4-resource-agents-13864 is not security or has no CVEs. patches: slehasp4-resource-agents-13864 SKIP SUSE-RU-2018:3765-1 as SUSE-SLE-Module-Basesystem-15-2018-2658 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2658 SKIP SUSE-RU-2018:3784-1 as SUSE-SLE-SERVER-12-SP2-2018-2687 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP2-2018-2687,SUSE-SLE-SERVER-12-SP2-2018-2687 SKIP SUSE-RU-2018:3806-1 as SUSE-Storage-5-2018-2701 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2701 SKIP SUSE-RU-2018:3807-1 as SUSE-SLE-Module-Basesystem-15-2018-2700 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2700 SKIP SUSE-RU-2018:3809-1 as SUSE-SUSE-Manager-Server-3.1-2018-2704 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-2704,SUSE-SUSE-Manager-Server-3.1-2018-2704 SKIP SUSE-RU-2018:3810-1 as SUSE-SLE-SERVER-12-SP3-2018-2705 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2705 SKIP SUSE-RU-2018:3810-2 as SUSE-SLE-SERVER-12-SP4-2018-2705 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP4-2018-2705 SKIP SUSE-RU-2018:3814-1 as SUSE-SUSE-Manager-Proxy-3.1-2018-2708 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.1-2018-2708 SKIP SUSE-RU-2018:3820-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2018-2716 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2716,SUSE-SLE-Module-Development-Tools-15-2018-2716,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2716,SUSE-SLE-Module-Packagehub-Subpackages-15-2018-2716 SKIP SUSE-RU-2018:3821-1 as SUSE-SLE-Module-Server-Applications-15-2018-2720 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2720,SUSE-SLE-Module-Desktop-Applications-15-2018-2720,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2720,SUSE-SLE-Module-Server-Applications-15-2018-2720 SKIP SUSE-RU-2018:3822-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2719 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2719,SUSE-SLE-Module-Desktop-Applications-15-2018-2719 SKIP SUSE-RU-2018:3823-1 as SUSE-SLE-Product-WE-15-2018-2717 is not security or has no CVEs. patches: SUSE-SLE-Product-WE-15-2018-2717 SKIP SUSE-RU-2018:3826-1 as SUSE-SLE-SERVER-12-SP3-2018-2718 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2718,SUSE-SLE-SERVER-12-SP3-2018-2718 SKIP SUSE-RU-2018:3829-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-2715 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Crowbar-8-2018-2715 SKIP SUSE-RU-2018:3830-1 as SUSE-SUSE-Manager-Server-3.1-2018-2714 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Server-3.1-2018-2714 SKIP SUSE-RU-2018:3831-1 as secsp3-openssh-13874 is not security or has no CVEs. patches: secsp3-openssh-13874 SKIP SUSE-RU-2018:3832-1 as slessp3-openssh-13873 is not security or has no CVEs. patches: sleposp3-openssh-13873,slessp3-openssh-13873 SKIP SUSE-RU-2018:3833-1 as SUSE-SLE-SERVER-12-SP1-2018-2722 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-2018-2722,SUSE-SLE-SERVER-12-SP1-2018-2722 SKIP SUSE-RU-2018:3833-2 as SUSE-SLE-SAP-12-SP1-2019-1080 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2019-1080 SKIP SUSE-RU-2018:3834-1 as slessp4-openssh-13872 is not security or has no CVEs. patches: slessp4-openssh-13872 SKIP SUSE-RU-2018:3843-1 as SUSE-SLE-Module-Server-Applications-15-2018-2726 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2726 SKIP SUSE-RU-2018:3844-1 as SUSE-SLE-SDK-12-SP3-2018-2740 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2740 SKIP SUSE-RU-2018:3845-1 as SUSE-SLE-Module-Development-Tools-15-2018-2741 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2741 SKIP SUSE-RU-2018:3846-1 as slessp4-autofs-13875 is not security or has no CVEs. patches: slessp4-autofs-13875 SKIP SUSE-RU-2018:3847-1 as SUSE-SLE-Module-Basesystem-15-2018-2728 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2728 SKIP SUSE-RU-2018:3848-1 as SUSE-SLE-Module-Development-Tools-15-2018-2729 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2729,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2729 SKIP SUSE-RU-2018:3850-1 as SUSE-SLE-HA-12-SP1-2018-2739 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP1-2018-2739 SKIP SUSE-RU-2018:3851-1 as SUSE-SLE-SERVER-12-SP3-2018-2734 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2734,SUSE-SLE-SDK-12-SP3-2018-2734,SUSE-SLE-SERVER-12-SP3-2018-2734 SKIP SUSE-RU-2018:3851-2 as SUSE-SLE-SERVER-12-SP4-2018-2734 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2734,SUSE-SLE-SDK-12-SP4-2018-2734,SUSE-SLE-SERVER-12-SP4-2018-2734 SKIP SUSE-RU-2018:3852-1 as SUSE-SLE-WE-12-SP3-2018-2743 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2743,SUSE-SLE-WE-12-SP3-2018-2743 SKIP SUSE-RU-2018:3853-1 as SUSE-SLE-Live-Patching-12-SP3-2018-2732 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-SP3-2018-2730,SUSE-SLE-Live-Patching-12-SP3-2018-2731,SUSE-SLE-Live-Patching-12-SP3-2018-2732 SKIP SUSE-RU-2018:3854-1 as SUSE-SLE-SERVER-12-SP3-2018-2738 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2738,SUSE-SLE-SERVER-12-SP3-2018-2738 SKIP SUSE-RU-2018:3854-2 as SUSE-SLE-SERVER-12-SP4-2018-2738 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2738,SUSE-SLE-SERVER-12-SP4-2018-2738 SKIP SUSE-RU-2018:3855-1 as SUSE-SLE-SAP-12-SP2-2018-2737 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2018-2737,SUSE-SLE-SAP-12-SP2-2018-2737 SKIP SUSE-RU-2018:3856-1 as SUSE-SLE-HA-12-SP2-2018-2735 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP2-2018-2735 SKIP SUSE-RU-2018:3857-1 as SUSE-SLE-Module-Server-Applications-15-2018-2744 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2744,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2744,SUSE-SLE-Module-Server-Applications-15-2018-2744 SKIP SUSE-RU-2018:3858-1 as SUSE-SLE-Module-Server-Applications-15-2018-2736 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-OBS-15-2018-2736,SUSE-SLE-Module-Server-Applications-15-2018-2736 SKIP SUSE-RU-2018:3859-1 as SUSE-SLE-Module-Basesystem-15-2018-2742 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2742 SKIP SUSE-RU-2018:3877-1 as SUSE-SLE-Module-Live-Patching-15-2018-2771 is not security or has no CVEs. patches: SUSE-SLE-Module-Live-Patching-15-2018-2769,SUSE-SLE-Module-Live-Patching-15-2018-2771 SKIP SUSE-RU-2018:3878-1 as SUSE-Storage-4-2018-2775 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2775,SUSE-Storage-4-2018-2775 SKIP SUSE-RU-2018:3883-1 as SUSE-OpenStack-Cloud-7-2018-2773 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2773 SKIP SUSE-RU-2018:3885-1 as SUSE-OpenStack-Cloud-7-2018-2774 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2774 SKIP SUSE-RU-2018:3914-1 as slessp4-yast2-network-13880 is not security or has no CVEs. patches: sdksp4-yast2-network-13880,slessp4-yast2-network-13880 SKIP SUSE-RU-2018:3915-1 as SUSE-SLE-HA-12-SP3-2018-2787 is not security or has no CVEs. patches: SUSE-SLE-HA-12-SP3-2018-2787 SKIP SUSE-RU-2018:3916-1 as SUSE-SLE-SERVER-12-SP1-2018-2789 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-2018-2789,SUSE-SLE-SAP-12-SP1-2018-2789,SUSE-SLE-SERVER-12-2018-2789,SUSE-SLE-SERVER-12-SP1-2018-2789 SKIP SUSE-RU-2018:3917-1 as SUSE-SLE-SERVER-12-SP3-2018-2784 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2784,SUSE-SLE-SERVER-12-SP3-2018-2784 SKIP SUSE-RU-2018:3918-1 as slessp4-libqca2-13881 is not security or has no CVEs. patches: sdksp4-libqca2-13881,slessp4-libqca2-13881 SKIP SUSE-RU-2018:3919-1 as SUSE-SLE-SERVER-12-SP3-2018-2786 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2786,SUSE-SLE-SERVER-12-SP3-2018-2786 SKIP SUSE-RU-2018:3922-1 as SUSE-SLE-Module-Basesystem-15-2018-2792 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2792 SKIP SUSE-RU-2018:3929-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2018-2799 is not security or has no CVEs. patches: SUSE-SLE-Module-Adv-Systems-Management-12-2018-2799 SKIP SUSE-RU-2018:3930-1 as SUSE-SLE-Product-WE-15-2018-2800 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2800,SUSE-SLE-Module-Development-Tools-15-2018-2800,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2800,SUSE-SLE-Product-WE-15-2018-2800 SKIP SUSE-RU-2018:3931-1 as SUSE-SLE-Module-Basesystem-15-2018-2798 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2798 SKIP SUSE-RU-2018:3932-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2801 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2801,SUSE-SLE-Module-Desktop-Applications-15-2018-2801 SKIP SUSE-RU-2018:3936-1 as SUSE-SLE-SERVER-12-SP4-2018-2804 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2804,SUSE-SLE-DESKTOP-12-SP4-2018-2804,SUSE-SLE-SERVER-12-SP3-2018-2804,SUSE-SLE-SERVER-12-SP4-2018-2804 SKIP SUSE-RU-2018:3937-1 as SUSE-SLE-SERVER-12-SP4-2018-2807 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2807,SUSE-SLE-DESKTOP-12-SP4-2018-2807,SUSE-SLE-SERVER-12-SP3-2018-2807,SUSE-SLE-SERVER-12-SP4-2018-2807 SKIP SUSE-RU-2018:3938-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2810 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2810 SKIP SUSE-RU-2018:3939-1 as SUSE-SLE-Module-HPC-12-2018-2808 is not security or has no CVEs. patches: SUSE-SLE-Module-HPC-12-2018-2808 SKIP SUSE-RU-2018:3940-1 as SUSE-SLE-Module-SAP-Applications-15-2018-2809 is not security or has no CVEs. patches: SUSE-SLE-Module-SAP-Applications-15-2018-2809 SKIP SUSE-RU-2018:3941-1 as SUSE-SLE-SERVER-12-SP4-2018-2811 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2811,SUSE-SLE-DESKTOP-12-SP4-2018-2811,SUSE-SLE-SDK-12-SP3-2018-2811,SUSE-SLE-SDK-12-SP4-2018-2811,SUSE-SLE-SERVER-12-SP3-2018-2811,SUSE-SLE-SERVER-12-SP4-2018-2811 SKIP SUSE-RU-2018:3959-1 as SUSE-SLE-Module-Server-Applications-15-2018-2818 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2818 SKIP SUSE-RU-2018:3960-1 as SUSE-SLE-Module-Containers-12-2018-2817 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2817,SUSE-SLE-Module-Containers-12-2018-2817 SKIP SUSE-RU-2018:3962-1 as SUSE-Storage-5-2018-2820 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2820 SKIP SUSE-RU-2018:3971-1 as SUSE-SLE-Module-Public-Cloud-12-2018-2831 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-2831 SKIP SUSE-RU-2018:3974-1 as slessp4-kernel-source-13890 is not security or has no CVEs. patches: sdksp4-kernel-source-13890,slessp4-kernel-source-13890,slexsp3-kernel-source-13890 SKIP SUSE-RU-2018:3976-1 as SUSE-SLE-Product-HA-15-2018-2837 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-OBS-15-2018-2837,SUSE-SLE-Product-HA-15-2018-2837 SKIP SUSE-RU-2018:3977-1 as SUSE-SLE-SERVER-12-SP4-2018-2836 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2836,SUSE-SLE-DESKTOP-12-SP4-2018-2836,SUSE-SLE-SDK-12-SP3-2018-2836,SUSE-SLE-SDK-12-SP4-2018-2836,SUSE-SLE-SERVER-12-SP3-2018-2836,SUSE-SLE-SERVER-12-SP4-2018-2836 SKIP SUSE-RU-2018:3978-1 as SUSE-SLE-WE-12-SP3-2018-2839 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2839,SUSE-SLE-SDK-12-SP3-2018-2839,SUSE-SLE-SERVER-12-SP3-2018-2839,SUSE-SLE-WE-12-SP3-2018-2839 SKIP SUSE-RU-2018:3978-2 as SUSE-SLE-WE-12-SP4-2019-2546 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2019-2546,SUSE-SLE-SDK-12-SP4-2019-2546,SUSE-SLE-SERVER-12-SP4-2019-2546,SUSE-SLE-WE-12-SP4-2019-2546 SKIP SUSE-RU-2018:3979-1 as slessp4-mkinitrd-13892 is not security or has no CVEs. patches: slessp4-mkinitrd-13892 SKIP SUSE-RU-2018:3980-1 as SUSE-SLE-SERVER-12-SP4-2018-2843 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2843,SUSE-SLE-DESKTOP-12-SP4-2018-2843,SUSE-SLE-SDK-12-SP3-2018-2843,SUSE-SLE-SDK-12-SP4-2018-2843,SUSE-SLE-SERVER-12-SP3-2018-2843,SUSE-SLE-SERVER-12-SP4-2018-2843 SKIP SUSE-RU-2018:3981-1 as SUSE-SLE-SERVER-12-SP3-2018-2840 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2840,SUSE-SLE-DESKTOP-12-SP3-2018-2840,SUSE-SLE-SERVER-12-SP3-2018-2840 SKIP SUSE-RU-2018:3982-1 as SUSE-SLE-SERVER-12-SP3-2018-2841 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2841,SUSE-SLE-DESKTOP-12-SP3-2018-2841,SUSE-SLE-SDK-12-SP3-2018-2841,SUSE-SLE-SERVER-12-SP3-2018-2841 SKIP SUSE-RU-2018:3983-1 as SUSE-SLE-Module-Basesystem-15-2018-2838 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2838,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2838 SKIP SUSE-RU-2018:3984-1 as SUSE-SLE-SERVER-12-SP4-2018-2844 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2844,SUSE-SLE-DESKTOP-12-SP4-2018-2844,SUSE-SLE-SERVER-12-SP3-2018-2844,SUSE-SLE-SERVER-12-SP4-2018-2844 SKIP SUSE-RU-2018:3985-1 as SUSE-SLE-SERVER-12-SP4-2018-2842 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2842,SUSE-SLE-DESKTOP-12-SP3-2018-2842,SUSE-SLE-DESKTOP-12-SP4-2018-2842,SUSE-SLE-SERVER-12-SP3-2018-2842,SUSE-SLE-SERVER-12-SP4-2018-2842 SKIP SUSE-RU-2018:3990-1 as SUSE-SLE-SERVER-12-SP4-2018-2853 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2853,SUSE-SLE-SERVER-12-SP4-2018-2853 SKIP SUSE-RU-2018:3991-1 as SUSE-SLE-Module-Basesystem-15-2018-2852 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2852 SKIP SUSE-RU-2018:3992-1 as SUSE-SLE-Module-Basesystem-15-2018-2854 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2854 SKIP SUSE-RU-2018:4006-1 as SUSE-SLE-Module-Basesystem-15-2018-2860 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2860 SKIP SUSE-RU-2018:4010-1 as SUSE-SLE-Module-Containers-15-2018-2866 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-15-2018-2866 SKIP SUSE-RU-2018:4012-1 as SUSE-SUSE-Manager-Server-3.2-2018-2872 is not security or has no CVEs. patches: SUSE-SUSE-Manager-Proxy-3.2-2018-2872,SUSE-SUSE-Manager-Server-3.2-2018-2872 SKIP SUSE-RU-2018:4016-1 as SUSE-SLE-Manager-Tools-15-2018-2879 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-15-2018-2879,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2879 SKIP SUSE-RU-2018:4017-1 as SUSE-SLE-Module-Server-Applications-15-2018-2871 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2871,SUSE-SLE-Module-Server-Applications-15-2018-2871 SKIP SUSE-RU-2018:4019-1 as SUSE-SUSE-Manager-Server-3.2-2018-2880 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2880,SUSE-SLE-Module-Adv-Systems-Management-12-2018-2880,SUSE-SLE-POS-12-SP2-2018-2880,SUSE-SUSE-Manager-Proxy-3.0-2018-2880,SUSE-SUSE-Manager-Proxy-3.1-2018-2880,SUSE-SUSE-Manager-Proxy-3.2-2018-2880,SUSE-SUSE-Manager-Server-3.0-2018-2880,SUSE-SUSE-Manager-Server-3.1-2018-2880,SUSE-SUSE-Manager-Server-3.2-2018-2880 SKIP SUSE-RU-2018:4021-1 as SUSE-SLE-Module-Basesystem-15-2018-2873 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2873 SKIP SUSE-RU-2018:4022-1 as SUSE-SLE-Manager-Tools-12-2018-2877 is not security or has no CVEs. patches: SUSE-SLE-Manager-Tools-12-2018-2877 SKIP SUSE-RU-2018:4024-1 as slesctsp4-client-tools-201811-13897 is not security or has no CVEs. patches: slesctsp3-client-tools-201811-13897,slesctsp4-client-tools-201811-13897 SKIP SUSE-RU-2018:4026-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-2881 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-2881,SUSE-OpenStack-Cloud-8-2018-2881,SUSE-OpenStack-Cloud-Crowbar-8-2018-2881 SKIP SUSE-RU-2018:4060-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2884 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2884 SKIP SUSE-RU-2018:4061-1 as SUSE-SLE-SERVER-12-SP4-2018-2883 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2883,SUSE-SLE-SERVER-12-SP4-2018-2883 SKIP SUSE-RU-2018:4065-1 as SUSE-SLE-Module-Containers-12-2018-2887 is not security or has no CVEs. patches: SUSE-SLE-Module-Containers-12-2018-2887 SKIP SUSE-RU-2018:4071-1 as slessp4-libmlx5-rdmav2-13908 is not security or has no CVEs. patches: slessp4-libmlx5-rdmav2-13908 SKIP SUSE-RU-2018:4075-1 as SUSE-SLE-WE-12-SP4-2018-2901 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2901,SUSE-SLE-DESKTOP-12-SP4-2018-2901,SUSE-SLE-SERVER-12-SP3-2018-2901,SUSE-SLE-SERVER-12-SP4-2018-2901,SUSE-SLE-WE-12-SP3-2018-2901,SUSE-SLE-WE-12-SP4-2018-2901 SKIP SUSE-RU-2018:4076-1 as SUSE-SLE-SERVER-12-SP3-2018-2907 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-2907 SKIP SUSE-RU-2018:4077-1 as SUSE-SLE-SERVER-12-SP4-2018-2906 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2906,SUSE-SLE-DESKTOP-12-SP4-2018-2906,SUSE-SLE-SERVER-12-SP3-2018-2906,SUSE-SLE-SERVER-12-SP4-2018-2906 SKIP SUSE-RU-2018:4078-1 as SUSE-Storage-4-2018-2897 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2897,SUSE-SLE-DESKTOP-12-SP3-2018-2897,SUSE-SLE-DESKTOP-12-SP4-2018-2897,SUSE-SLE-SAP-12-SP2-2018-2897,SUSE-SLE-SERVER-12-SP2-2018-2897,SUSE-SLE-SERVER-12-SP2-BCL-2018-2897,SUSE-SLE-SERVER-12-SP3-2018-2897,SUSE-SLE-SERVER-12-SP4-2018-2897,SUSE-Storage-4-2018-2897 SKIP SUSE-RU-2018:4079-1 as SUSE-SLE-Module-Basesystem-15-2018-2908 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2908 SKIP SUSE-RU-2018:4080-1 as SUSE-SLE-Module-Basesystem-15-2018-2903 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2903 SKIP SUSE-RU-2018:4080-2 as SUSE-SLE-INSTALLER-15-2019-468 is not security or has no CVEs. patches: SUSE-SLE-INSTALLER-15-2019-468 SKIP SUSE-RU-2018:4081-1 as SUSE-SLE-Module-Basesystem-15-2018-2904 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2904 SKIP SUSE-RU-2018:4082-1 as SUSE-SLE-SERVER-12-SP4-2018-2899 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-2899,SUSE-SLE-SERVER-12-SP4-2018-2899 SKIP SUSE-RU-2018:4083-1 as slessp4-pciutils-ids-13906 is not security or has no CVEs. patches: slessp4-pciutils-ids-13906 SKIP SUSE-RU-2018:4084-1 as SUSE-SLE-Module-Basesystem-15-2018-2905 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2905,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2905 SKIP SUSE-RU-2018:4085-1 as SUSE-SLE-SERVER-12-SP3-2018-2909 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2909,SUSE-SLE-SERVER-12-SP3-2018-2909 SKIP SUSE-RU-2018:4091-1 as SUSE-SLE-Module-Basesystem-15-2018-2920 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2920 SKIP SUSE-RU-2018:4092-1 as SUSE-SLE-SERVER-12-SP3-2018-2925 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2925,SUSE-SLE-SERVER-12-SP3-2018-2925 SKIP SUSE-RU-2018:4093-1 as SUSE-SLE-SERVER-12-SP3-2018-2923 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-2923,SUSE-SLE-SERVER-12-SP3-2018-2923 SKIP SUSE-RU-2018:4094-1 as SUSE-SLE-SERVER-12-SP4-2018-2919 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP4-2018-2919 SKIP SUSE-RU-2018:4095-1 as SUSE-SLE-Module-Basesystem-15-2018-2921 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2921 SKIP SUSE-RU-2018:4096-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2018-2924 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2924,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2924,SUSE-SLE-Module-Packagehub-Subpackages-15-2018-2924 SKIP SUSE-RU-2018:4097-1 as SUSE-SLE-Module-Basesystem-15-2018-2922 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2922 SKIP SUSE-RU-2018:4118-1 as SUSE-Storage-4-2018-2927 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-2927,SUSE-SLE-SAP-12-SP2-2018-2927,SUSE-SLE-SDK-12-SP3-2018-2927,SUSE-SLE-SDK-12-SP4-2018-2927,SUSE-SLE-SERVER-12-SP1-2018-2927,SUSE-SLE-SERVER-12-SP2-2018-2927,SUSE-SLE-SERVER-12-SP2-BCL-2018-2927,SUSE-SLE-SERVER-12-SP3-2018-2927,SUSE-SLE-SERVER-12-SP4-2018-2927,SUSE-Storage-4-2018-2927 SKIP SUSE-RU-2018:4118-2 as SUSE-SLE-SAP-12-SP1-2019-1075 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP1-2019-1075 SKIP SUSE-RU-2018:4119-1 as SUSE-SLE-Module-Legacy-15-2018-2926 is not security or has no CVEs. patches: SUSE-SLE-Module-Legacy-15-2018-2926 SKIP SUSE-RU-2018:4123-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2939 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2939,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2939 SKIP SUSE-RU-2018:4126-1 as SUSE-SLE-Module-Basesystem-15-2018-2938 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2938 SKIP SUSE-RU-2018:4159-1 as SUSE-SLE-SERVER-12-SP4-2018-2963 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP4-2018-2963 SKIP SUSE-RU-2018:4160-1 as SUSE-SLE-Product-WE-15-2018-2964 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2964,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2964,SUSE-SLE-Product-WE-15-2018-2964 SKIP SUSE-RU-2018:4161-1 as SUSE-SLE-Module-Development-Tools-15-2018-2972 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2972,SUSE-SLE-Module-Development-Tools-15-2018-2972 SKIP SUSE-RU-2018:4162-1 as SUSE-SLE-Product-SLES-15-2018-2969 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-OBS-15-2018-2969,SUSE-SLE-Product-SLES-15-2018-2969 SKIP SUSE-RU-2018:4163-1 as SUSE-SLE-Module-Basesystem-15-2018-2961 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2961 SKIP SUSE-RU-2018:4164-1 as SUSE-SLE-Module-Development-Tools-15-2018-2967 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-2018-2967 SKIP SUSE-RU-2018:4165-1 as SUSE-SLE-Module-Basesystem-15-2018-2971 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2971 SKIP SUSE-RU-2018:4166-1 as SUSE-SLE-Module-Desktop-Applications-15-2018-2970 is not security or has no CVEs. patches: SUSE-SLE-Module-Desktop-Applications-15-2018-2970,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2970 SKIP SUSE-RU-2018:4167-1 as SUSE-SLE-Module-Basesystem-15-2018-2966 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2966,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2966 SKIP SUSE-RU-2018:4168-1 as SUSE-SLE-Module-Server-Applications-15-2018-2968 is not security or has no CVEs. patches: SUSE-SLE-Module-Server-Applications-15-2018-2968 SKIP SUSE-RU-2018:4169-1 as SUSE-SLE-SAP-12-SP4-2018-2965 is not security or has no CVEs. patches: SUSE-SLE-SAP-12-SP4-2018-2965 SKIP SUSE-RU-2018:4170-1 as SUSE-SLE-Module-Basesystem-15-2018-2962 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2962,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2962 SKIP SUSE-RU-2018:4171-1 as SUSE-SLE-WE-12-SP4-2018-2973 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-2973,SUSE-OpenStack-Cloud-8-2018-2973,SUSE-OpenStack-Cloud-Crowbar-8-2018-2973,SUSE-SLE-DESKTOP-12-SP3-2018-2973,SUSE-SLE-DESKTOP-12-SP4-2018-2973,SUSE-SLE-SDK-12-SP3-2018-2973,SUSE-SLE-SDK-12-SP4-2018-2973,SUSE-SLE-SERVER-12-SP3-2018-2973,SUSE-SLE-SERVER-12-SP4-2018-2973,SUSE-SLE-WE-12-SP3-2018-2973,SUSE-SLE-WE-12-SP4-2018-2973 SKIP SUSE-RU-2018:4176-1 as SUSE-Storage-5-2018-2975 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-2975,SUSE-SLE-Manager-Tools-12-2018-2975,SUSE-SLE-Module-Adv-Systems-Management-12-2018-2975,SUSE-SLE-Module-Public-Cloud-12-2018-2975,SUSE-SLE-POS-12-SP2-2018-2975,SUSE-SUSE-Manager-Proxy-3.0-2018-2975,SUSE-SUSE-Manager-Proxy-3.1-2018-2975,SUSE-SUSE-Manager-Proxy-3.2-2018-2975,SUSE-SUSE-Manager-Server-3.0-2018-2975,SUSE-SUSE-Manager-Server-3.1-2018-2975,SUSE-SUSE-Manager-Server-3.2-2018-2975,SUSE-Storage-4-2018-2975,SUSE-Storage-5-2018-2975 SKIP SUSE-RU-2018:4178-1 as SUSE-SLE-Module-Basesystem-15-2018-2978 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2978 SKIP SUSE-RU-2018:4180-1 as SUSE-OpenStack-Cloud-Crowbar-8-2018-2979 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Crowbar-8-2018-2979 SKIP SUSE-RU-2018:4184-1 as SUSE-Storage-5-2018-2982 is not security or has no CVEs. patches: SUSE-Storage-5-2018-2982 SKIP SUSE-RU-2018:4186-1 as SUSE-SLE-SERVER-12-SP3-2018-2980 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-2980,SUSE-SLE-SDK-12-SP3-2018-2980,SUSE-SLE-SERVER-12-SP3-2018-2980 SKIP SUSE-RU-2018:4186-2 as SUSE-SLE-SERVER-12-SP4-2019-2530 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2019-2530,SUSE-SLE-SDK-12-SP4-2019-2530,SUSE-SLE-SERVER-12-SP4-2019-2530 SKIP SUSE-RU-2018:4198-1 as SUSE-SLE-Module-Basesystem-15-2018-2992 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-2992,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2992 SKIP SUSE-RU-2018:4199-1 as SUSE-SLE-SERVER-12-SP4-2018-3002 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3002,SUSE-SLE-DESKTOP-12-SP4-2018-3002,SUSE-SLE-SERVER-12-SP3-2018-3002,SUSE-SLE-SERVER-12-SP4-2018-3002 SKIP SUSE-RU-2018:4200-1 as SUSE-SLE-SERVER-12-SP4-2018-3008 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-3008,SUSE-OpenStack-Cloud-8-2018-3008,SUSE-OpenStack-Cloud-Crowbar-8-2018-3008,SUSE-SLE-SERVER-12-SP3-2018-3008,SUSE-SLE-SERVER-12-SP4-2018-3008 SKIP SUSE-RU-2018:4201-1 as SUSE-SLE-SERVER-12-SP4-2018-3004 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP4-2018-3004 SKIP SUSE-RU-2018:4202-1 as SUSE-SLE-SERVER-12-SP3-2018-3007 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3007,SUSE-SLE-SERVER-12-SP3-2018-3007 SKIP SUSE-RU-2018:4203-1 as SUSE-SLE-Module-Public-Cloud-12-2018-3005 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2018-3005 SKIP SUSE-RU-2018:4204-1 as slessp4-open-vm-tools-13914 is not security or has no CVEs. patches: slessp4-open-vm-tools-13914 SKIP SUSE-RU-2018:4205-1 as SUSE-SLE-Product-SLED-15-2018-3009 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-OBS-15-2018-3009,SUSE-SLE-Product-SLED-15-2018-3009 SKIP SUSE-RU-2018:4206-1 as SUSE-SLE-SERVER-12-SP4-2018-3003 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3003,SUSE-SLE-DESKTOP-12-SP4-2018-3003,SUSE-SLE-SDK-12-SP3-2018-3003,SUSE-SLE-SDK-12-SP4-2018-3003,SUSE-SLE-SERVER-12-SP3-2018-3003,SUSE-SLE-SERVER-12-SP4-2018-3003 SKIP SUSE-RU-2018:4216-1 as SUSE-OpenStack-Cloud-7-2018-3025 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-3025 SKIP SUSE-RU-2018:4219-1 as SUSE-SUSE-Manager-Server-3.0-2018-3042 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2018-3042,SUSE-OpenStack-Cloud-8-2018-3042,SUSE-SLE-Manager-Tools-12-2018-3042,SUSE-SUSE-Manager-Server-3.0-2018-3042 SKIP SUSE-RU-2018:4220-1 as SUSE-SLE-SERVER-12-SP4-2018-3034 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-3034,SUSE-SLE-SAP-12-SP4-2018-3034,SUSE-SLE-SERVER-12-SP4-2018-3034 SKIP SUSE-RU-2018:4221-1 as slessp4-multipath-tools-13917 is not security or has no CVEs. patches: slessp4-multipath-tools-13917 SKIP SUSE-RU-2018:4222-1 as SUSE-SLE-SERVER-12-SP4-2018-3038 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-3038,SUSE-SLE-SERVER-12-SP4-2018-3038 SKIP SUSE-RU-2018:4223-1 as SUSE-SLE-Module-Basesystem-15-2018-3036 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-3036 SKIP SUSE-RU-2018:4224-1 as SUSE-SLE-SERVER-12-SP4-2018-3040 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-3040,SUSE-SLE-SERVER-12-SP4-2018-3040 SKIP SUSE-RU-2018:4225-1 as slessp4-ntp-13916 is not security or has no CVEs. patches: slessp4-ntp-13916 SKIP SUSE-RU-2018:4226-1 as SUSE-SLE-SERVER-12-SP4-2018-3035 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP4-2018-3035,SUSE-SLE-HA-12-SP4-2018-3035,SUSE-SLE-SDK-12-SP4-2018-3035,SUSE-SLE-SERVER-12-SP4-2018-3035 SKIP SUSE-RU-2018:4227-1 as SUSE-SLE-SERVER-12-SP3-2018-3031 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3031,SUSE-SLE-SERVER-12-SP3-2018-3031 SKIP SUSE-RU-2018:4228-1 as SUSE-SLE-SERVER-12-SP4-2018-3043 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-3043,SUSE-SLE-DESKTOP-12-SP3-2018-3043,SUSE-SLE-DESKTOP-12-SP4-2018-3043,SUSE-SLE-Module-Public-Cloud-12-2018-3043,SUSE-SLE-SERVER-12-SP3-2018-3043,SUSE-SLE-SERVER-12-SP4-2018-3043 SKIP SUSE-RU-2018:4229-1 as SUSE-SLE-SERVER-12-SP4-2018-3029 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-3029,SUSE-SLE-DESKTOP-12-SP3-2018-3029,SUSE-SLE-DESKTOP-12-SP4-2018-3029,SUSE-SLE-SDK-12-SP3-2018-3029,SUSE-SLE-SDK-12-SP4-2018-3029,SUSE-SLE-SERVER-12-SP3-2018-3029,SUSE-SLE-SERVER-12-SP4-2018-3029 SKIP SUSE-RU-2018:4230-1 as SUSE-SLE-SERVER-12-SP4-2018-3032 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3032,SUSE-SLE-DESKTOP-12-SP4-2018-3032,SUSE-SLE-SERVER-12-SP3-2018-3032,SUSE-SLE-SERVER-12-SP4-2018-3032 SKIP SUSE-RU-2018:4231-1 as SUSE-SLE-Module-Server-Applications-15-2018-3041 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-3041,SUSE-SLE-Module-Development-Tools-OBS-15-2018-3041,SUSE-SLE-Module-Server-Applications-15-2018-3041 SKIP SUSE-RU-2018:4232-1 as SUSE-SLE-SERVER-12-SP3-2018-3037 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3037,SUSE-SLE-SERVER-12-SP3-2018-3037 SKIP SUSE-RU-2018:4233-1 as SUSE-SLE-Live-Patching-12-SP4-2018-3028 is not security or has no CVEs. patches: SUSE-SLE-Live-Patching-12-SP4-2018-3028 SKIP SUSE-RU-2018:4234-1 as SUSE-SLE-SERVER-12-SP4-2018-3039 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP4-2018-3039 SKIP SUSE-RU-2018:4277-1 as SUSE-Storage-5-2018-3052 is not security or has no CVEs. patches: SUSE-OpenStack-Cloud-7-2018-3052,SUSE-Storage-4-2018-3052,SUSE-Storage-5-2018-3052 SKIP SUSE-RU-2018:4278-1 as SUSE-SLE-SERVER-12-SP3-2018-3057 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3057,SUSE-SLE-SDK-12-SP3-2018-3057,SUSE-SLE-SERVER-12-SP3-2018-3057 SKIP SUSE-RU-2018:4279-1 as SUSE-SLE-SERVER-12-SP4-2018-3060 is not security or has no CVEs. patches: SUSE-SLE-SERVER-12-SP3-2018-3060,SUSE-SLE-SERVER-12-SP4-2018-3060 SKIP SUSE-RU-2018:4281-1 as SUSE-SLE-SERVER-12-SP4-2018-3055 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP3-2018-3055,SUSE-SLE-SDK-12-SP4-2018-3055,SUSE-SLE-SERVER-12-SP3-2018-3055,SUSE-SLE-SERVER-12-SP4-2018-3055 SKIP SUSE-RU-2018:4284-1 as SUSE-SLE-SERVER-12-SP4-2018-3054 is not security or has no CVEs. patches: SUSE-SLE-DESKTOP-12-SP3-2018-3054,SUSE-SLE-DESKTOP-12-SP4-2018-3054,SUSE-SLE-SDK-12-SP3-2018-3054,SUSE-SLE-SDK-12-SP4-2018-3054,SUSE-SLE-SERVER-12-SP3-2018-3054,SUSE-SLE-SERVER-12-SP4-2018-3054 SKIP SUSE-RU-2018:4288-1 as SUSE-SLE-Module-Public-Cloud-15-2018-3061 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-OBS-15-2018-3061,SUSE-SLE-Module-Public-Cloud-15-2018-3061 SKIP SUSE-RU-2018:4290-1 as slessp4-mirror-13920 is not security or has no CVEs. patches: slessp4-mirror-13920 SKIP SUSE-RU-2018:4291-1 as SUSE-SLE-Module-Basesystem-15-2018-3058 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-2018-3058 SKIP SUSE-RU-2018:4292-1 as slestso13-susestudio-13919 is not security or has no CVEs. patches: slestso13-susestudio-13919 SKIP SUSE-RU-2018:4293-1 as SUSE-SLE-SERVER-12-SP4-2018-3056 is not security or has no CVEs. patches: SUSE-SLE-SDK-12-SP4-2018-3056,SUSE-SLE-SERVER-12-SP4-2018-3056 SKIP SUSE-RU-2019:0006-1 as SUSE-SLE-Module-Development-Tools-15-2019-6 is not security or has no CVEs. patches: SUSE-2019-6,SUSE-SLE-Module-Basesystem-15-2019-6,SUSE-SLE-Module-Development-Tools-15-2019-6,SUSE-SLE-Module-Development-Tools-OBS-15-2019-6 SKIP SUSE-RU-2019:0007-1 as SUSE-SLE-SERVER-12-SP4-2019-7 is not security or has no CVEs. patches: SUSE-2019-7,SUSE-SLE-SERVER-12-SP3-2019-7,SUSE-SLE-SERVER-12-SP4-2019-7 SKIP SUSE-RU-2019:0008-1 as SUSE-SLE-SERVER-12-SP4-2019-8 is not security or has no CVEs. patches: SUSE-2019-8,SUSE-SLE-SERVER-12-SP3-2019-8,SUSE-SLE-SERVER-12-SP4-2019-8 SKIP SUSE-RU-2019:0009-1 as SUSE-SLE-Module-Server-Applications-15-2019-9 is not security or has no CVEs. patches: SUSE-2019-9,SUSE-SLE-Module-Server-Applications-15-2019-9 SKIP SUSE-RU-2019:0011-1 as SUSE-SLE-SERVER-12-SP4-2019-11 is not security or has no CVEs. patches: SUSE-2019-11,SUSE-SLE-DESKTOP-12-SP3-2019-11,SUSE-SLE-DESKTOP-12-SP4-2019-11,SUSE-SLE-SDK-12-SP3-2019-11,SUSE-SLE-SDK-12-SP4-2019-11,SUSE-SLE-SERVER-12-SP3-2019-11,SUSE-SLE-SERVER-12-SP4-2019-11 SKIP SUSE-RU-2019:0012-1 as SUSE-SLE-SERVER-12-SP4-2019-12 is not security or has no CVEs. patches: SUSE-2019-12,SUSE-SLE-DESKTOP-12-SP4-2019-12,SUSE-SLE-SERVER-12-SP4-2019-12 SKIP SUSE-RU-2019:0013-1 as SUSE-SLE-Module-Basesystem-15-2019-13 is not security or has no CVEs. patches: SUSE-2019-13,SUSE-SLE-Module-Basesystem-15-2019-13 SKIP SUSE-RU-2019:0014-1 as SUSE-SLE-Module-Basesystem-15-2019-14 is not security or has no CVEs. patches: SUSE-2019-14,SUSE-SLE-Module-Basesystem-15-2019-14 SKIP SUSE-RU-2019:0016-1 as SUSE-SLE-SERVER-12-SP3-2019-16 is not security or has no CVEs. patches: SUSE-2019-16,SUSE-SLE-DESKTOP-12-SP3-2019-16,SUSE-SLE-SERVER-12-SP3-2019-16 SKIP SUSE-RU-2019:0021-1 as SUSE-Storage-4-2019-21 is not security or has no CVEs. patches: SUSE-2019-21,SUSE-OpenStack-Cloud-7-2019-21,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-21,SUSE-SLE-DESKTOP-12-SP3-2019-21,SUSE-SLE-DESKTOP-12-SP4-2019-21,SUSE-SLE-Module-Toolchain-12-2019-21,SUSE-SLE-SAP-12-SP2-2019-21,SUSE-SLE-SDK-12-SP3-2019-21,SUSE-SLE-SERVER-12-2019-21,SUSE-SLE-SERVER-12-SP1-2019-21,SUSE-SLE-SERVER-12-SP2-2019-21,SUSE-SLE-SERVER-12-SP2-BCL-2019-21,SUSE-SLE-SERVER-12-SP3-2019-21,SUSE-SLE-SERVER-12-SP4-2019-21,SUSE-Storage-4-2019-21 SKIP SUSE-RU-2019:0021-2 as SUSE-SLE-SAP-12-SP1-2019-21 is not security or has no CVEs. patches: SUSE-2019-21,SUSE-SLE-SAP-12-SP1-2019-21 SKIP SUSE-RU-2019:0026-1 as SUSE-SLE-Module-Public-Cloud-12-2019-26 is not security or has no CVEs. patches: SUSE-2019-26,SUSE-SLE-Module-Public-Cloud-12-2019-26 SKIP SUSE-RU-2019:0028-1 as SUSE-SLE-HA-GEO-12-SP4-2019-28 is not security or has no CVEs. patches: SUSE-2019-28,SUSE-SLE-HA-GEO-12-SP4-2019-28 SKIP SUSE-RU-2019:0029-1 as SUSE-SLE-SDK-12-SP4-2019-29 is not security or has no CVEs. patches: SUSE-2019-29,SUSE-SLE-SDK-12-SP4-2019-29 SKIP SUSE-RU-2019:0030-1 as SUSE-SLE-WE-12-SP4-2019-30 is not security or has no CVEs. patches: SUSE-2019-30,SUSE-SLE-DESKTOP-12-SP4-2019-30,SUSE-SLE-WE-12-SP4-2019-30 SKIP SUSE-RU-2019:0031-1 as SUSE-SLE-SERVER-12-SP4-2019-31 is not security or has no CVEs. patches: SUSE-2019-31,SUSE-SLE-SDK-12-SP3-2019-31,SUSE-SLE-SDK-12-SP4-2019-31,SUSE-SLE-SERVER-12-SP3-2019-31,SUSE-SLE-SERVER-12-SP4-2019-31 SKIP SUSE-RU-2019:0034-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-34 is not security or has no CVEs. patches: SUSE-2019-34,SUSE-SLE-DESKTOP-12-SP3-2019-34,SUSE-SLE-DESKTOP-INSTALLER-12-SP3-2019-34,SUSE-SLE-SAP-INSTALLER-12-SP3-2019-34,SUSE-SLE-SERVER-12-SP3-2019-34,SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-34 SKIP SUSE-RU-2019:0035-1 as SUSE-SLE-SERVER-12-SP4-2019-35 is not security or has no CVEs. patches: SUSE-2019-35,SUSE-SLE-DESKTOP-12-SP3-2019-35,SUSE-SLE-DESKTOP-12-SP4-2019-35,SUSE-SLE-SDK-12-SP3-2019-35,SUSE-SLE-SDK-12-SP4-2019-35,SUSE-SLE-SERVER-12-SP3-2019-35,SUSE-SLE-SERVER-12-SP4-2019-35 SKIP SUSE-RU-2019:0036-1 as SUSE-SLE-SERVER-12-SP4-2019-36 is not security or has no CVEs. patches: SUSE-2019-36,SUSE-SLE-DESKTOP-12-SP4-2019-36,SUSE-SLE-SDK-12-SP4-2019-36,SUSE-SLE-SERVER-12-SP4-2019-36 SKIP SUSE-RU-2019:0037-1 as SUSE-SLE-SERVER-12-SP4-2019-37 is not security or has no CVEs. patches: SUSE-2019-37,SUSE-SLE-DESKTOP-12-SP3-2019-37,SUSE-SLE-DESKTOP-12-SP4-2019-37,SUSE-SLE-SERVER-12-SP3-2019-37,SUSE-SLE-SERVER-12-SP4-2019-37 SKIP SUSE-RU-2019:0038-1 as SUSE-SLE-HA-12-SP3-2019-38 is not security or has no CVEs. patches: SUSE-2019-38,SUSE-SLE-HA-12-SP3-2019-38 SKIP SUSE-RU-2019:0039-1 as SUSE-SLE-HA-12-SP4-2019-39 is not security or has no CVEs. patches: SUSE-2019-39,SUSE-SLE-HA-12-SP4-2019-39 SKIP SUSE-RU-2019:0040-1 as SUSE-SUSE-Manager-Server-3.1-2019-40 is not security or has no CVEs. patches: SUSE-2019-40,SUSE-SUSE-Manager-Proxy-3.1-2019-40,SUSE-SUSE-Manager-Server-3.1-2019-40 SKIP SUSE-RU-2019:0041-1 as SUSE-SUSE-Manager-Server-3.1-2019-41 is not security or has no CVEs. patches: SUSE-2019-41,SUSE-SUSE-Manager-Proxy-3.1-2019-41,SUSE-SUSE-Manager-Server-3.1-2019-41 SKIP SUSE-RU-2019:0042-1 as SUSE-SLE-WE-12-SP4-2019-42 is not security or has no CVEs. patches: SUSE-2019-42,SUSE-SLE-DESKTOP-12-SP3-2019-42,SUSE-SLE-DESKTOP-12-SP4-2019-42,SUSE-SLE-SDK-12-SP3-2019-42,SUSE-SLE-SDK-12-SP4-2019-42,SUSE-SLE-SERVER-12-SP3-2019-42,SUSE-SLE-SERVER-12-SP4-2019-42,SUSE-SLE-WE-12-SP3-2019-42,SUSE-SLE-WE-12-SP4-2019-42 SKIP SUSE-RU-2019:0043-1 as SUSE-SLE-SERVER-12-SP3-2019-43 is not security or has no CVEs. patches: SUSE-2019-43,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-43,SUSE-SLE-DESKTOP-12-SP3-2019-43,SUSE-SLE-SDK-12-SP3-2019-43,SUSE-SLE-SERVER-12-SP3-2019-43 SKIP SUSE-RU-2019:0043-2 as SUSE-SLE-SERVER-12-SP4-2019-43 is not security or has no CVEs. patches: SUSE-2019-43,SUSE-SLE-DESKTOP-12-SP4-2019-43,SUSE-SLE-SDK-12-SP4-2019-43,SUSE-SLE-SERVER-12-SP4-2019-43 SKIP SUSE-RU-2019:0044-1 as SUSE-SLE-Module-Basesystem-15-2019-44 is not security or has no CVEs. patches: SUSE-2019-44,SUSE-SLE-Module-Basesystem-15-2019-44 SKIP SUSE-RU-2019:0046-1 as SUSE-SLE-SERVER-12-SP3-2019-46 is not security or has no CVEs. patches: SUSE-2019-46,SUSE-SLE-DESKTOP-12-SP3-2019-46,SUSE-SLE-SERVER-12-SP3-2019-46 SKIP SUSE-RU-2019:0047-1 as SUSE-SLE-SERVER-12-SP4-2019-47 is not security or has no CVEs. patches: SUSE-2019-47,SUSE-SLE-DESKTOP-12-SP3-2019-47,SUSE-SLE-DESKTOP-12-SP4-2019-47,SUSE-SLE-SERVER-12-SP3-2019-47,SUSE-SLE-SERVER-12-SP4-2019-47 SKIP SUSE-RU-2019:0050-1 as SUSE-2019-50 is not security or has no CVEs. patches: SUSE-2019-50,SUSE-SLE-Module-Public-Cloud-12-2019-50 SKIP SUSE-RU-2019:0051-1 as SUSE-SLE-Module-Public-Cloud-15-2019-51 is not security or has no CVEs. patches: SUSE-2019-51,SUSE-SLE-Module-Public-Cloud-15-2019-51 SKIP SUSE-RU-2019:0052-1 as SUSE-Storage-4-2019-52 is not security or has no CVEs. patches: SUSE-2019-52,SUSE-OpenStack-Cloud-7-2019-52,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-52,SUSE-SLE-SAP-12-SP2-2019-52,SUSE-SLE-SERVER-12-2019-52,SUSE-SLE-SERVER-12-SP1-2019-52,SUSE-SLE-SERVER-12-SP2-2019-52,SUSE-SLE-SERVER-12-SP2-BCL-2019-52,SUSE-Storage-4-2019-52 SKIP SUSE-RU-2019:0056-1 as SUSE-SLE-Module-Server-Applications-15-2019-56 is not security or has no CVEs. patches: SUSE-2019-56,SUSE-SLE-Module-Basesystem-15-2019-56,SUSE-SLE-Module-Development-Tools-OBS-15-2019-56,SUSE-SLE-Module-Server-Applications-15-2019-56 SKIP SUSE-RU-2019:0062-1 as SUSE-SLE-Module-Basesystem-15-2019-62 is not security or has no CVEs. patches: SUSE-2019-62,SUSE-SLE-Module-Basesystem-15-2019-62 SKIP SUSE-RU-2019:0063-1 as SUSE-SLE-Module-Basesystem-15-2019-63 is not security or has no CVEs. patches: SUSE-2019-63,SUSE-SLE-Module-Basesystem-15-2019-63 SKIP SUSE-RU-2019:0064-1 as SUSE-SLE-SERVER-12-SP4-2019-64 is not security or has no CVEs. patches: SUSE-2019-64,SUSE-SLE-DESKTOP-12-SP3-2019-64,SUSE-SLE-DESKTOP-12-SP4-2019-64,SUSE-SLE-SERVER-12-SP3-2019-64,SUSE-SLE-SERVER-12-SP4-2019-64 SKIP SUSE-RU-2019:0065-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-65 is not security or has no CVEs. patches: SUSE-2019-65,SUSE-SLE-Module-Desktop-Applications-15-2019-65,SUSE-SLE-Module-Development-Tools-OBS-15-2019-65 SKIP SUSE-RU-2019:0066-1 as SUSE-SLE-Module-Basesystem-15-2019-66 is not security or has no CVEs. patches: SUSE-2019-66,SUSE-SLE-Module-Basesystem-15-2019-66 SKIP SUSE-RU-2019:0067-1 as SUSE-SLE-Module-Server-Applications-15-2019-67 is not security or has no CVEs. patches: SUSE-2019-67,SUSE-SLE-Module-Development-Tools-OBS-15-2019-67,SUSE-SLE-Module-Server-Applications-15-2019-67 SKIP SUSE-RU-2019:0068-1 as SUSE-SLE-SERVER-12-SP4-2019-68 is not security or has no CVEs. patches: SUSE-2019-68,SUSE-SLE-DESKTOP-12-SP3-2019-68,SUSE-SLE-DESKTOP-12-SP4-2019-68,SUSE-SLE-SDK-12-SP3-2019-68,SUSE-SLE-SDK-12-SP4-2019-68,SUSE-SLE-SERVER-12-SP3-2019-68,SUSE-SLE-SERVER-12-SP4-2019-68 SKIP SUSE-RU-2019:0069-1 as SUSE-Storage-5-2019-69 is not security or has no CVEs. patches: SUSE-2019-69,SUSE-SLE-DESKTOP-12-SP3-2019-69,SUSE-SLE-DESKTOP-12-SP4-2019-69,SUSE-SLE-SDK-12-SP3-2019-69,SUSE-SLE-SDK-12-SP4-2019-69,SUSE-SLE-SERVER-12-SP3-2019-69,SUSE-SLE-SERVER-12-SP4-2019-69,SUSE-Storage-5-2019-69 SKIP SUSE-RU-2019:0070-1 as SUSE-SLE-Module-Containers-12-2019-70 is not security or has no CVEs. patches: SUSE-2019-70,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-70,SUSE-SLE-Module-Containers-12-2019-70 SKIP SUSE-RU-2019:0071-1 as SUSE-SLE-SERVER-12-SP4-2019-71 is not security or has no CVEs. patches: SUSE-2019-71,SUSE-SLE-DESKTOP-12-SP4-2019-71,SUSE-SLE-SERVER-12-SP4-2019-71 SKIP SUSE-RU-2019:0072-1 as SUSE-SLE-SERVER-12-SP4-2019-72 is not security or has no CVEs. patches: SUSE-2019-72,SUSE-SLE-SDK-12-SP3-2019-72,SUSE-SLE-SDK-12-SP4-2019-72,SUSE-SLE-SERVER-12-SP3-2019-72,SUSE-SLE-SERVER-12-SP4-2019-72 SKIP SUSE-RU-2019:0075-1 as SUSE-2019-75 is not security or has no CVEs. patches: SUSE-2019-75,SUSE-SLE-Module-Public-Cloud-15-2019-75 SKIP SUSE-RU-2019:0077-1 as SUSE-2019-77 is not security or has no CVEs. patches: SUSE-2019-77,SUSE-SLE-Module-Development-Tools-OBS-15-2019-77 SKIP SUSE-RU-2019:0078-1 as SUSE-SLE-Module-Live-Patching-15-2019-76 is not security or has no CVEs. patches: SUSE-2019-78,SUSE-SLE-Live-Patching-12-2019-78,SUSE-SLE-Live-Patching-12-SP3-2019-78,SUSE-SLE-Live-Patching-12-SP4-2019-78,SUSE-SLE-Module-Live-Patching-15-2019-76 SKIP SUSE-RU-2019:0082-1 as SUSE-SLE-Module-Basesystem-15-2019-82 is not security or has no CVEs. patches: SUSE-2019-82,SUSE-SLE-Module-Basesystem-15-2019-82 SKIP SUSE-RU-2019:0083-1 as SUSE-SLE-Module-Basesystem-15-2019-83 is not security or has no CVEs. patches: SUSE-2019-83,SUSE-SLE-Module-Basesystem-15-2019-83 SKIP SUSE-RU-2019:0087-1 as SUSE-SLE-Module-Public-Cloud-12-2019-87 is not security or has no CVEs. patches: SUSE-2019-87,SUSE-SLE-Module-Public-Cloud-12-2019-87 SKIP SUSE-RU-2019:0089-1 as SUSE-SLE-Module-Public-Cloud-15-2019-89 is not security or has no CVEs. patches: SUSE-2019-89,SUSE-SLE-Module-Public-Cloud-15-2019-89 SKIP SUSE-RU-2019:0090-1 as SUSE-SLE-Module-Public-Cloud-15-2019-90 is not security or has no CVEs. patches: SUSE-2019-90,SUSE-SLE-Module-Public-Cloud-15-2019-90 SKIP SUSE-RU-2019:0091-1 as SUSE-SLE-Module-Basesystem-15-2019-91 is not security or has no CVEs. patches: SUSE-2019-91,SUSE-SLE-Module-Basesystem-15-2019-91 SKIP SUSE-RU-2019:0097-1 as SUSE-SLE-Module-Development-Tools-15-2019-97 is not security or has no CVEs. patches: SUSE-2019-97,SUSE-SLE-Module-Development-Tools-15-2019-97 SKIP SUSE-RU-2019:0098-1 as SUSE-SLE-Module-Basesystem-15-2019-98 is not security or has no CVEs. patches: SUSE-2019-98,SUSE-SLE-Module-Basesystem-15-2019-98 SKIP SUSE-RU-2019:0099-1 as SUSE-SLE-SERVER-12-SP3-2019-99 is not security or has no CVEs. patches: SUSE-2019-99,SUSE-SLE-DESKTOP-12-SP3-2019-99,SUSE-SLE-SERVER-12-SP3-2019-99 SKIP SUSE-RU-2019:0100-1 as SUSE-SLE-SERVER-12-SP4-2019-100 is not security or has no CVEs. patches: SUSE-2019-100,SUSE-SLE-DESKTOP-12-SP4-2019-100,SUSE-SLE-SERVER-12-SP4-2019-100 SKIP SUSE-RU-2019:0101-1 as SUSE-SLE-SERVER-12-SP4-2019-101 is not security or has no CVEs. patches: SUSE-2019-101,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-101,SUSE-SLE-DESKTOP-12-SP3-2019-101,SUSE-SLE-DESKTOP-12-SP4-2019-101,SUSE-SLE-SERVER-12-SP3-2019-101,SUSE-SLE-SERVER-12-SP4-2019-101 SKIP SUSE-RU-2019:0102-1 as SUSE-SLE-Module-Basesystem-15-2019-102 is not security or has no CVEs. patches: SUSE-2019-102,SUSE-SLE-Module-Basesystem-15-2019-102 SKIP SUSE-RU-2019:0103-1 as SUSE-Storage-5-2019-103 is not security or has no CVEs. patches: SUSE-2019-103,SUSE-Storage-5-2019-103 SKIP SUSE-RU-2019:0104-1 as SUSE-SLE-Module-Basesystem-15-2019-104 is not security or has no CVEs. patches: SUSE-2019-104,SUSE-SLE-Module-Basesystem-15-2019-104 SKIP SUSE-RU-2019:0105-1 as SUSE-SLE-SERVER-12-SP4-2019-105 is not security or has no CVEs. patches: SUSE-2019-105,SUSE-SLE-SERVER-12-SP3-2019-105,SUSE-SLE-SERVER-12-SP4-2019-105 SKIP SUSE-RU-2019:0106-1 as SUSE-OpenStack-Cloud-8-2019-106 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-106,SUSE-2019-106,SUSE-OpenStack-Cloud-8-2019-106 SKIP SUSE-RU-2019:0107-1 as SUSE-Storage-4-2019-107 is not security or has no CVEs. patches: SUSE-2019-107,SUSE-OpenStack-Cloud-7-2019-107,SUSE-SLE-DESKTOP-12-SP3-2019-107,SUSE-SLE-DESKTOP-12-SP4-2019-107,SUSE-SLE-SAP-12-SP2-2019-107,SUSE-SLE-SDK-12-SP3-2019-107,SUSE-SLE-SDK-12-SP4-2019-107,SUSE-SLE-SERVER-12-2019-107,SUSE-SLE-SERVER-12-SP1-2019-107,SUSE-SLE-SERVER-12-SP2-2019-107,SUSE-SLE-SERVER-12-SP2-BCL-2019-107,SUSE-SLE-SERVER-12-SP3-2019-107,SUSE-SLE-SERVER-12-SP4-2019-107,SUSE-Storage-4-2019-107 SKIP SUSE-RU-2019:0107-2 as SUSE-SLE-SAP-12-SP1-2019-107 is not security or has no CVEs. patches: SUSE-2019-107,SUSE-SLE-SAP-12-SP1-2019-107 SKIP SUSE-RU-2019:0108-1 as SUSE-SLE-Module-Server-Applications-15-2019-108 is not security or has no CVEs. patches: SUSE-2019-108,SUSE-SLE-Module-Server-Applications-15-2019-108 SKIP SUSE-RU-2019:0114-1 as SUSE-SLE-Module-Server-Applications-15-2019-114 is not security or has no CVEs. patches: SUSE-2019-114,SUSE-SLE-Module-Server-Applications-15-2019-114 SKIP SUSE-RU-2019:0115-1 as SUSE-SLE-HA-12-SP3-2019-115 is not security or has no CVEs. patches: SUSE-2019-115,SUSE-SLE-HA-12-SP3-2019-115 SKIP SUSE-RU-2019:0116-1 as SUSE-SLE-HA-12-SP4-2019-116 is not security or has no CVEs. patches: SUSE-2019-116,SUSE-SLE-HA-12-SP4-2019-116 SKIP SUSE-RU-2019:0120-1 as SUSE-SLE-SERVER-12-SP4-2019-120 is not security or has no CVEs. patches: SUSE-2019-120,SUSE-SLE-DESKTOP-12-SP4-2019-120,SUSE-SLE-SERVER-12-SP4-2019-120 SKIP SUSE-RU-2019:0121-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-121 is not security or has no CVEs. patches: SUSE-2019-121,SUSE-SLE-Module-Desktop-Applications-15-2019-121 SKIP SUSE-RU-2019:0122-1 as SUSE-SLE-Module-Basesystem-15-2019-122 is not security or has no CVEs. patches: SUSE-2019-122,SUSE-SLE-Module-Basesystem-15-2019-122,SUSE-SLE-Module-Development-Tools-OBS-15-2019-122 SKIP SUSE-RU-2019:0123-1 as SUSE-SLE-Module-Basesystem-15-2019-123 is not security or has no CVEs. patches: SUSE-2019-123,SUSE-SLE-Module-Basesystem-15-2019-123 SKIP SUSE-RU-2019:0124-1 as SUSE-SLE-Module-Basesystem-15-2019-124 is not security or has no CVEs. patches: SUSE-2019-124,SUSE-SLE-Module-Basesystem-15-2019-124 SKIP SUSE-RU-2019:0140-1 as SUSE-Storage-4-2019-140 is not security or has no CVEs. patches: SUSE-2019-140,SUSE-OpenStack-Cloud-7-2019-140,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-140,SUSE-SLE-DESKTOP-12-SP3-2019-140,SUSE-SLE-DESKTOP-12-SP4-2019-140,SUSE-SLE-SAP-12-SP2-2019-140,SUSE-SLE-SERVER-12-SP1-2019-140,SUSE-SLE-SERVER-12-SP2-2019-140,SUSE-SLE-SERVER-12-SP2-BCL-2019-140,SUSE-SLE-SERVER-12-SP3-2019-140,SUSE-SLE-SERVER-12-SP4-2019-140,SUSE-Storage-4-2019-140 SKIP SUSE-RU-2019:0141-1 as SUSE-SLE-Module-Basesystem-15-2019-141 is not security or has no CVEs. patches: SUSE-2019-141,SUSE-SLE-Module-Basesystem-15-2019-141 SKIP SUSE-RU-2019:0143-1 as SUSE-SLE-SERVER-12-SP4-2019-143 is not security or has no CVEs. patches: SUSE-2019-143,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-143,SUSE-SLE-DESKTOP-12-SP3-2019-143,SUSE-SLE-DESKTOP-12-SP4-2019-143,SUSE-SLE-SDK-12-SP3-2019-143,SUSE-SLE-SDK-12-SP4-2019-143,SUSE-SLE-SERVER-12-SP3-2019-143,SUSE-SLE-SERVER-12-SP4-2019-143 SKIP SUSE-RU-2019:0149-1 as SUSE-Storage-4-2019-149 is not security or has no CVEs. patches: SUSE-2019-149,SUSE-OpenStack-Cloud-7-2019-149,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-149,SUSE-SLE-DESKTOP-12-SP3-2019-149,SUSE-SLE-DESKTOP-12-SP4-2019-149,SUSE-SLE-SAP-12-SP2-2019-149,SUSE-SLE-SERVER-12-2019-149,SUSE-SLE-SERVER-12-SP1-2019-149,SUSE-SLE-SERVER-12-SP2-2019-149,SUSE-SLE-SERVER-12-SP2-BCL-2019-149,SUSE-SLE-SERVER-12-SP3-2019-149,SUSE-SLE-SERVER-12-SP4-2019-149,SUSE-Storage-4-2019-149 SKIP SUSE-RU-2019:0151-1 as SUSE-SLE-Module-Server-Applications-15-2019-151 is not security or has no CVEs. patches: SUSE-2019-151,SUSE-SLE-Module-Basesystem-15-2019-151,SUSE-SLE-Module-Development-Tools-OBS-15-2019-151,SUSE-SLE-Module-Server-Applications-15-2019-151 SKIP SUSE-RU-2019:0153-1 as SUSE-SLE-Module-Basesystem-15-2019-153 is not security or has no CVEs. patches: SUSE-2019-153,SUSE-SLE-Module-Basesystem-15-2019-153,SUSE-SLE-Module-Development-Tools-OBS-15-2019-153 SKIP SUSE-RU-2019:0154-1 as SUSE-SLE-SERVER-12-SP3-2019-154 is not security or has no CVEs. patches: SUSE-2019-154,SUSE-SLE-DESKTOP-12-SP3-2019-154,SUSE-SLE-SERVER-12-SP3-2019-154 SKIP SUSE-RU-2019:0155-1 as SUSE-SLE-Product-WE-15-2019-155 is not security or has no CVEs. patches: SUSE-2019-155,SUSE-SLE-Module-Development-Tools-OBS-15-2019-155,SUSE-SLE-Product-WE-15-2019-155 SKIP SUSE-RU-2019:0156-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-156 is not security or has no CVEs. patches: SUSE-2019-156,SUSE-SLE-Module-Desktop-Applications-15-2019-156 SKIP SUSE-RU-2019:0157-1 as SUSE-SLE-SERVER-12-SP4-2019-157 is not security or has no CVEs. patches: SUSE-2019-157,SUSE-SLE-DESKTOP-12-SP3-2019-157,SUSE-SLE-DESKTOP-12-SP4-2019-157,SUSE-SLE-SERVER-12-SP3-2019-157,SUSE-SLE-SERVER-12-SP4-2019-157 SKIP SUSE-RU-2019:0158-1 as SUSE-SLE-Module-Basesystem-15-2019-158 is not security or has no CVEs. patches: SUSE-2019-158,SUSE-SLE-Module-Basesystem-15-2019-158 SKIP SUSE-RU-2019:0159-1 as SUSE-SLE-SERVER-12-SP4-2019-159 is not security or has no CVEs. patches: SUSE-2019-159,SUSE-SLE-DESKTOP-12-SP3-2019-159,SUSE-SLE-DESKTOP-12-SP4-2019-159,SUSE-SLE-SDK-12-SP3-2019-159,SUSE-SLE-SDK-12-SP4-2019-159,SUSE-SLE-SERVER-12-SP3-2019-159,SUSE-SLE-SERVER-12-SP4-2019-159 SKIP SUSE-RU-2019:0160-1 as SUSE-SLE-Module-Server-Applications-15-2019-160 is not security or has no CVEs. patches: SUSE-2019-160,SUSE-SLE-Module-Server-Applications-15-2019-160 SKIP SUSE-RU-2019:0161-1 as SUSE-SLE-WE-12-SP4-2019-161 is not security or has no CVEs. patches: SUSE-2019-161,SUSE-SLE-DESKTOP-12-SP3-2019-161,SUSE-SLE-DESKTOP-12-SP4-2019-161,SUSE-SLE-SDK-12-SP3-2019-161,SUSE-SLE-SDK-12-SP4-2019-161,SUSE-SLE-SERVER-12-SP3-2019-161,SUSE-SLE-SERVER-12-SP4-2019-161,SUSE-SLE-WE-12-SP3-2019-161,SUSE-SLE-WE-12-SP4-2019-161 SKIP SUSE-RU-2019:0162-1 as SUSE-SLE-Module-Server-Applications-15-2019-162 is not security or has no CVEs. patches: SUSE-2019-162,SUSE-SLE-Module-Basesystem-15-2019-162,SUSE-SLE-Module-Development-Tools-OBS-15-2019-162,SUSE-SLE-Module-Server-Applications-15-2019-162 SKIP SUSE-RU-2019:0163-1 as SUSE-SLE-Module-Server-Applications-15-2019-163 is not security or has no CVEs. patches: SUSE-2019-163,SUSE-SLE-Module-Server-Applications-15-2019-163 SKIP SUSE-RU-2019:0164-1 as SUSE-SLE-SERVER-12-SP4-2019-164 is not security or has no CVEs. patches: SUSE-2019-164,SUSE-SLE-SERVER-12-SP3-2019-164,SUSE-SLE-SERVER-12-SP4-2019-164 SKIP SUSE-RU-2019:0166-1 as SUSE-SLE-Module-Basesystem-15-2019-166 is not security or has no CVEs. patches: SUSE-2019-166,SUSE-SLE-Module-Basesystem-15-2019-166 SKIP SUSE-RU-2019:0167-1 as SUSE-OpenStack-Cloud-7-2019-167 is not security or has no CVEs. patches: SUSE-2019-167,SUSE-OpenStack-Cloud-7-2019-167 SKIP SUSE-RU-2019:0168-1 as SUSE-SLE-SERVER-12-SP3-2019-168 is not security or has no CVEs. patches: SUSE-2019-168,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-168,SUSE-SLE-DESKTOP-12-SP3-2019-168,SUSE-SLE-SERVER-12-SP3-2019-168 SKIP SUSE-RU-2019:0169-1 as SUSE-OpenStack-Cloud-7-2019-169 is not security or has no CVEs. patches: SUSE-2019-169,SUSE-OpenStack-Cloud-7-2019-169 SKIP SUSE-RU-2019:0170-1 as SUSE-SLE-Module-Basesystem-15-2019-170 is not security or has no CVEs. patches: SUSE-2019-170,SUSE-SLE-Module-Basesystem-15-2019-170 SKIP SUSE-RU-2019:0171-1 as SUSE-2019-171 is not security or has no CVEs. patches: SUSE-2019-171,SUSE-SLE-Module-Public-Cloud-12-2019-171 SKIP SUSE-RU-2019:0172-1 as SUSE-SLE-Module-Server-Applications-15-2019-172 is not security or has no CVEs. patches: SUSE-2019-172,SUSE-SLE-Module-Basesystem-15-2019-172,SUSE-SLE-Module-Development-Tools-OBS-15-2019-172,SUSE-SLE-Module-Server-Applications-15-2019-172 SKIP SUSE-RU-2019:0176-1 as SUSE-OpenStack-Cloud-7-2019-176 is not security or has no CVEs. patches: SUSE-2019-176,SUSE-OpenStack-Cloud-7-2019-176 SKIP SUSE-RU-2019:0177-1 as SUSE-Storage-4-2019-177 is not security or has no CVEs. patches: SUSE-2019-177,SUSE-OpenStack-Cloud-7-2019-177,SUSE-Storage-4-2019-177 SKIP SUSE-RU-2019:0178-1 as SUSE-OpenStack-Cloud-7-2019-178 is not security or has no CVEs. patches: SUSE-2019-178,SUSE-OpenStack-Cloud-7-2019-178 SKIP SUSE-RU-2019:0180-1 as SUSE-Storage-5-2019-180 is not security or has no CVEs. patches: SUSE-2019-180,SUSE-OpenStack-Cloud-7-2019-180,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-180,SUSE-SLE-DESKTOP-12-SP3-2019-180,SUSE-SLE-DESKTOP-12-SP4-2019-180,SUSE-SLE-Manager-Tools-12-2019-180,SUSE-SLE-Module-Adv-Systems-Management-12-2019-180,SUSE-SLE-Module-Containers-12-2019-180,SUSE-SLE-Module-Public-Cloud-12-2019-180,SUSE-SLE-POS-12-SP2-2019-180,SUSE-SUSE-Manager-Proxy-3.0-2019-180,SUSE-SUSE-Manager-Proxy-3.1-2019-180,SUSE-SUSE-Manager-Proxy-3.2-2019-180,SUSE-SUSE-Manager-Server-3.0-2019-180,SUSE-SUSE-Manager-Server-3.1-2019-180,SUSE-SUSE-Manager-Server-3.2-2019-180,SUSE-Storage-4-2019-180,SUSE-Storage-5-2019-180 SKIP SUSE-RU-2019:0182-1 as SUSE-SLE-SERVER-12-SP4-2019-182 is not security or has no CVEs. patches: SUSE-2019-182,SUSE-SLE-DESKTOP-12-SP4-2019-182,SUSE-SLE-SDK-12-SP4-2019-182,SUSE-SLE-SERVER-12-SP4-2019-182 SKIP SUSE-RU-2019:0183-1 as SUSE-SLE-SERVER-12-SP4-2019-183 is not security or has no CVEs. patches: SUSE-2019-183,SUSE-SLE-DESKTOP-12-SP3-2019-183,SUSE-SLE-DESKTOP-12-SP4-2019-183,SUSE-SLE-SDK-12-SP3-2019-183,SUSE-SLE-SDK-12-SP4-2019-183,SUSE-SLE-SERVER-12-SP3-2019-183,SUSE-SLE-SERVER-12-SP4-2019-183 SKIP SUSE-RU-2019:0186-1 as SUSE-SLE-Module-Web-Scripting-15-2019-186 is not security or has no CVEs. patches: SUSE-2019-186,SUSE-SLE-Module-Web-Scripting-15-2019-186 SKIP SUSE-RU-2019:0188-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-188 is not security or has no CVEs. patches: SUSE-2019-188,SUSE-SLE-Module-Basesystem-15-2019-188,SUSE-SLE-Module-Desktop-Applications-15-2019-188,SUSE-SLE-Module-Development-Tools-OBS-15-2019-188 SKIP SUSE-RU-2019:0189-1 as SUSE-SLE-Module-Development-Tools-15-2019-189 is not security or has no CVEs. patches: SUSE-2019-189,SUSE-SLE-Module-Basesystem-15-2019-189,SUSE-SLE-Module-Development-Tools-15-2019-189 SKIP SUSE-RU-2019:0190-1 as SUSE-Storage-4-2019-190 is not security or has no CVEs. patches: SUSE-2019-190,SUSE-OpenStack-Cloud-7-2019-190,SUSE-SLE-Module-Public-Cloud-12-2019-190,SUSE-SLE-SAP-12-SP2-2019-190,SUSE-SLE-SERVER-12-SP1-2019-190,SUSE-SLE-SERVER-12-SP2-2019-190,SUSE-SLE-SERVER-12-SP2-BCL-2019-190,SUSE-SLE-SERVER-12-SP3-2019-190,SUSE-SLE-SERVER-12-SP4-2019-190,SUSE-Storage-4-2019-190 SKIP SUSE-RU-2019:0190-2 as SUSE-SLE-SAP-12-SP1-2019-190 is not security or has no CVEs. patches: SUSE-2019-190,SUSE-SLE-SAP-12-SP1-2019-190 SKIP SUSE-RU-2019:0191-1 as SUSE-SLE-SERVER-12-SP4-2019-191 is not security or has no CVEs. patches: SUSE-2019-191,SUSE-SLE-SERVER-12-SP4-2019-191 SKIP SUSE-RU-2019:0192-1 as SUSE-OpenStack-Cloud-8-2019-192 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-192,SUSE-2019-192,SUSE-OpenStack-Cloud-8-2019-192 SKIP SUSE-RU-2019:0193-1 as SUSE-OpenStack-Cloud-8-2019-193 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-193,SUSE-2019-193,SUSE-OpenStack-Cloud-8-2019-193 ERROR: notice SUSE-RU-2019:0198-1 has no valid patches out of: SUSE-2019-198,SUSE-SLE-DESKTOP-12-SP4-2019-198,SUSE-SLE-SDK-12-SP4-2019-198,SUSE-SLE-SERVER-12-SP4-2019-198 SKIP SUSE-RU-2019:0198-2 as SUSE-SLE-SERVER-12-SP5-2020-473 is not security or has no CVEs. patches: SUSE-2019-198,SUSE-SLE-SDK-12-SP5-2020-473,SUSE-SLE-SERVER-12-SP5-2020-473 SKIP SUSE-RU-2019:0199-1 as SUSE-SLE-Module-Web-Scripting-15-2019-199 is not security or has no CVEs. patches: SUSE-2019-199,SUSE-SLE-Module-Development-Tools-OBS-15-2019-199,SUSE-SLE-Module-Web-Scripting-15-2019-199 SKIP SUSE-RU-2019:0201-1 as SUSE-SLE-Module-Public-Cloud-15-2019-201 is not security or has no CVEs. patches: SUSE-2019-201,SUSE-SLE-Module-Public-Cloud-15-2019-201 SKIP SUSE-RU-2019:0202-1 as SUSE-SLE-Module-Public-Cloud-12-2019-202 is not security or has no CVEs. patches: SUSE-2019-202,SUSE-SLE-Module-Public-Cloud-12-2019-202 SKIP SUSE-RU-2019:0203-1 as SUSE-SLE-Module-Public-Cloud-15-2019-203 is not security or has no CVEs. patches: SUSE-2019-203,SUSE-SLE-Module-Public-Cloud-15-2019-203 SKIP SUSE-RU-2019:0204-1 as SUSE-SLE-Module-Web-Scripting-12-2019-204 is not security or has no CVEs. patches: SUSE-2019-204,SUSE-SLE-Module-Web-Scripting-12-2019-204 SKIP SUSE-RU-2019:0205-1 as SUSE-SLE-SERVER-12-SP4-2019-205 is not security or has no CVEs. patches: SUSE-2019-205,SUSE-SLE-DESKTOP-12-SP4-2019-205,SUSE-SLE-SERVER-12-SP4-2019-205 SKIP SUSE-RU-2019:0206-1 as SUSE-SLE-Module-Public-Cloud-12-2019-206 is not security or has no CVEs. patches: SUSE-2019-206,SUSE-SLE-Module-Public-Cloud-12-2019-206 SKIP SUSE-RU-2019:0207-1 as SUSE-SLE-Module-Containers-15-2019-207 is not security or has no CVEs. patches: SUSE-2019-207,SUSE-SLE-Module-Containers-15-2019-207 SKIP SUSE-RU-2019:0208-1 as SUSE-SLE-SERVER-12-SP1-2019-208 is not security or has no CVEs. patches: SUSE-2019-208,SUSE-SLE-SAP-12-SP1-2019-208,SUSE-SLE-SERVER-12-SP1-2019-208 SKIP SUSE-RU-2019:0211-1 as SUSE-SLE-Module-Server-Applications-15-2019-211 is not security or has no CVEs. patches: SUSE-2019-211,SUSE-SLE-Module-Basesystem-15-2019-211,SUSE-SLE-Module-Desktop-Applications-15-2019-211,SUSE-SLE-Module-Development-Tools-OBS-15-2019-211,SUSE-SLE-Module-Server-Applications-15-2019-211 SKIP SUSE-RU-2019:0212-1 as SUSE-Storage-4-2019-212 is not security or has no CVEs. patches: SUSE-2019-212,SUSE-OpenStack-Cloud-7-2019-212,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-212,SUSE-SLE-DESKTOP-12-SP3-2019-212,SUSE-SLE-DESKTOP-12-SP4-2019-212,SUSE-SLE-SAP-12-SP2-2019-212,SUSE-SLE-SERVER-12-SP2-2019-212,SUSE-SLE-SERVER-12-SP2-BCL-2019-212,SUSE-SLE-SERVER-12-SP3-2019-212,SUSE-SLE-SERVER-12-SP4-2019-212,SUSE-Storage-4-2019-212 SKIP SUSE-RU-2019:0213-1 as SUSE-SLE-SERVER-12-SP1-2019-213 is not security or has no CVEs. patches: SUSE-2019-213,SUSE-SLE-SERVER-12-2019-213,SUSE-SLE-SERVER-12-SP1-2019-213 SKIP SUSE-RU-2019:0213-2 as SUSE-SLE-SAP-12-SP1-2019-213 is not security or has no CVEs. patches: SUSE-2019-213,SUSE-SLE-SAP-12-SP1-2019-213 SKIP SUSE-RU-2019:0216-1 as SUSE-SLE-Module-Basesystem-15-2019-216 is not security or has no CVEs. patches: SUSE-2019-216,SUSE-SLE-Module-Basesystem-15-2019-216,SUSE-SLE-Module-Development-Tools-OBS-15-2019-216 SKIP SUSE-RU-2019:0218-1 as SUSE-SLE-SERVER-12-SP3-2019-218 is not security or has no CVEs. patches: SUSE-2019-218,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-218,SUSE-SLE-DESKTOP-12-SP3-2019-218,SUSE-SLE-SDK-12-SP3-2019-218,SUSE-SLE-SERVER-12-SP3-2019-218 SKIP SUSE-RU-2019:0219-1 as SUSE-Storage-4-2019-219 is not security or has no CVEs. patches: SUSE-2019-219,SUSE-OpenStack-Cloud-7-2019-219,SUSE-SLE-SAP-12-SP2-2019-219,SUSE-SLE-SERVER-12-SP2-2019-219,SUSE-SLE-SERVER-12-SP2-BCL-2019-219,SUSE-Storage-4-2019-219 SKIP SUSE-RU-2019:0225-1 as SUSE-SLE-Module-Basesystem-15-2019-225 is not security or has no CVEs. patches: SUSE-2019-225,SUSE-SLE-Module-Basesystem-15-2019-225 SKIP SUSE-RU-2019:0244-1 as SUSE-SLE-SDK-12-SP4-2019-244 is not security or has no CVEs. patches: SUSE-2019-244,SUSE-SLE-SDK-12-SP3-2019-244,SUSE-SLE-SDK-12-SP4-2019-244 SKIP SUSE-RU-2019:0245-1 as SUSE-SLE-Module-Basesystem-15-2019-245 is not security or has no CVEs. patches: SUSE-2019-245,SUSE-SLE-Module-Basesystem-15-2019-245 SKIP SUSE-RU-2019:0246-1 as SUSE-SLE-SERVER-12-SP3-2019-246 is not security or has no CVEs. patches: SUSE-2019-246,SUSE-SLE-DESKTOP-12-SP3-2019-246,SUSE-SLE-SERVER-12-SP3-2019-246 SKIP SUSE-RU-2019:0250-1 as SUSE-SLE-Module-Basesystem-15-2019-250 is not security or has no CVEs. patches: SUSE-2019-250,SUSE-SLE-Module-Basesystem-15-2019-250,SUSE-SLE-Module-Development-Tools-OBS-15-2019-250 SKIP SUSE-RU-2019:0251-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2019-251 is not security or has no CVEs. patches: SUSE-2019-251,SUSE-SLE-Module-Basesystem-15-2019-251,SUSE-SLE-Module-Development-Tools-OBS-15-2019-251,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-251 SKIP SUSE-RU-2019:0252-1 as SUSE-SLE-Module-Server-Applications-15-2019-252 is not security or has no CVEs. patches: SUSE-2019-252,SUSE-SLE-Module-Basesystem-15-2019-252,SUSE-SLE-Module-Development-Tools-OBS-15-2019-252,SUSE-SLE-Module-Server-Applications-15-2019-252 SKIP SUSE-RU-2019:0253-1 as SUSE-SLE-SERVER-12-SP3-2019-253 is not security or has no CVEs. patches: SUSE-2019-253,SUSE-SLE-DESKTOP-12-SP3-2019-253,SUSE-SLE-SERVER-12-SP3-2019-253 SKIP SUSE-RU-2019:0254-1 as SUSE-SLE-SERVER-12-SP4-2019-254 is not security or has no CVEs. patches: SUSE-2019-254,SUSE-SLE-DESKTOP-12-SP4-2019-254,SUSE-SLE-SERVER-12-SP4-2019-254 SKIP SUSE-RU-2019:0255-1 as SUSE-SLE-Module-Basesystem-15-2019-255 is not security or has no CVEs. patches: SUSE-2019-255,SUSE-SLE-Module-Basesystem-15-2019-255 SKIP SUSE-RU-2019:0256-1 as SUSE-SLE-SERVER-12-SP4-2019-256 is not security or has no CVEs. patches: SUSE-2019-256,SUSE-SLE-SERVER-12-SP4-2019-256 SKIP SUSE-RU-2019:0257-1 as SUSE-SLE-Module-Basesystem-15-2019-257 is not security or has no CVEs. patches: SUSE-2019-257,SUSE-SLE-Module-Basesystem-15-2019-257 SKIP SUSE-RU-2019:0258-1 as SUSE-SLE-Module-Basesystem-15-2019-258 is not security or has no CVEs. patches: SUSE-2019-258,SUSE-SLE-Module-Basesystem-15-2019-258 SKIP SUSE-RU-2019:0259-1 as SUSE-SLE-Module-Basesystem-15-2019-259 is not security or has no CVEs. patches: SUSE-2019-259,SUSE-SLE-Module-Basesystem-15-2019-259 SKIP SUSE-RU-2019:0260-1 as SUSE-SLE-SERVER-12-SP4-2019-260 is not security or has no CVEs. patches: SUSE-2019-260,SUSE-SLE-DESKTOP-12-SP3-2019-260,SUSE-SLE-DESKTOP-12-SP4-2019-260,SUSE-SLE-SERVER-12-SP3-2019-260,SUSE-SLE-SERVER-12-SP4-2019-260 SKIP SUSE-RU-2019:0261-1 as SUSE-Storage-4-2019-261 is not security or has no CVEs. patches: SUSE-2019-261,SUSE-OpenStack-Cloud-7-2019-261,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-261,SUSE-SLE-DESKTOP-12-SP3-2019-261,SUSE-SLE-DESKTOP-12-SP4-2019-261,SUSE-SLE-SAP-12-SP2-2019-261,SUSE-SLE-SERVER-12-SP2-2019-261,SUSE-SLE-SERVER-12-SP2-BCL-2019-261,SUSE-SLE-SERVER-12-SP3-2019-261,SUSE-SLE-SERVER-12-SP4-2019-261,SUSE-Storage-4-2019-261 SKIP SUSE-RU-2019:0262-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-262 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-262,SUSE-2019-262,SUSE-OpenStack-Cloud-8-2019-262,SUSE-OpenStack-Cloud-Crowbar-8-2019-262 SKIP SUSE-RU-2019:0263-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-263 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-263,SUSE-2019-263,SUSE-OpenStack-Cloud-8-2019-263,SUSE-OpenStack-Cloud-Crowbar-8-2019-263 SKIP SUSE-RU-2019:0264-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-264 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-264,SUSE-2019-264,SUSE-OpenStack-Cloud-8-2019-264,SUSE-OpenStack-Cloud-Crowbar-8-2019-264 SKIP SUSE-RU-2019:0265-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-265 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-265,SUSE-2019-265,SUSE-OpenStack-Cloud-8-2019-265,SUSE-OpenStack-Cloud-Crowbar-8-2019-265 SKIP SUSE-RU-2019:0266-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-266 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-266,SUSE-2019-266,SUSE-OpenStack-Cloud-8-2019-266,SUSE-OpenStack-Cloud-Crowbar-8-2019-266 SKIP SUSE-RU-2019:0267-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-267 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-267,SUSE-2019-267,SUSE-OpenStack-Cloud-8-2019-267,SUSE-OpenStack-Cloud-Crowbar-8-2019-267 SKIP SUSE-RU-2019:0268-1 as SUSE-SLE-Module-Public-Cloud-12-2019-268 is not security or has no CVEs. patches: SUSE-2019-268,SUSE-SLE-Module-Public-Cloud-12-2019-268 SKIP SUSE-RU-2019:0270-1 as SUSE-SLE-Module-Server-Applications-15-2019-270 is not security or has no CVEs. patches: SUSE-2019-270,SUSE-SLE-Module-Basesystem-15-2019-270,SUSE-SLE-Module-Server-Applications-15-2019-270 SKIP SUSE-RU-2019:0276-1 as SUSE-SLE-Module-Basesystem-15-2019-276 is not security or has no CVEs. patches: SUSE-2019-276,SUSE-SLE-Module-Basesystem-15-2019-276 SKIP SUSE-RU-2019:0277-1 as SUSE-SLE-Module-Server-Applications-15-2019-277 is not security or has no CVEs. patches: SUSE-2019-277,SUSE-SLE-Module-Server-Applications-15-2019-277 SKIP SUSE-RU-2019:0278-1 as SUSE-SLE-Module-Development-Tools-15-2019-278 is not security or has no CVEs. patches: SUSE-2019-278,SUSE-SLE-Module-Development-Tools-15-2019-278 SKIP SUSE-RU-2019:0279-1 as SUSE-SLE-SERVER-12-SP3-2019-279 is not security or has no CVEs. patches: SUSE-2019-279,SUSE-SLE-SDK-12-SP3-2019-279,SUSE-SLE-SERVER-12-SP3-2019-279 SKIP SUSE-RU-2019:0280-1 as SUSE-SLE-SERVER-12-SP3-2019-280 is not security or has no CVEs. patches: SUSE-2019-280,SUSE-SLE-DESKTOP-12-SP3-2019-280,SUSE-SLE-SDK-12-SP3-2019-280,SUSE-SLE-SERVER-12-SP3-2019-280 SKIP SUSE-RU-2019:0290-1 as SUSE-SLE-Module-Basesystem-15-2019-290 is not security or has no CVEs. patches: SUSE-2019-290,SUSE-SLE-Module-Basesystem-15-2019-290 SKIP SUSE-RU-2019:0314-1 as SUSE-SLE-Product-HA-15-2019-314 is not security or has no CVEs. patches: SUSE-2019-314,SUSE-SLE-Module-Development-Tools-OBS-15-2019-314,SUSE-SLE-Product-HA-15-2019-314 SKIP SUSE-RU-2019:0315-1 as SUSE-SLE-HA-12-SP3-2019-315 is not security or has no CVEs. patches: SUSE-2019-315,SUSE-SLE-HA-12-SP3-2019-315 SKIP SUSE-RU-2019:0316-1 as SUSE-SLE-Module-Development-Tools-15-2019-316 is not security or has no CVEs. patches: SUSE-2019-316,SUSE-SLE-Module-Development-Tools-15-2019-316,SUSE-SLE-Module-Development-Tools-OBS-15-2019-316 SKIP SUSE-RU-2019:0317-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2019-317 is not security or has no CVEs. patches: SUSE-2019-317,SUSE-SLE-Module-Basesystem-15-2019-317,SUSE-SLE-Module-Development-Tools-OBS-15-2019-317,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-317 SKIP SUSE-RU-2019:0318-1 as SUSE-SLE-SERVER-12-SP4-2019-318 is not security or has no CVEs. patches: SUSE-2019-318,SUSE-SLE-DESKTOP-12-SP4-2019-318,SUSE-SLE-SAP-12-SP4-2019-318,SUSE-SLE-SERVER-12-SP4-2019-318 SKIP SUSE-RU-2019:0319-1 as SUSE-SLE-Module-Development-Tools-15-2019-319 is not security or has no CVEs. patches: SUSE-2019-319,SUSE-SLE-Module-Development-Tools-15-2019-319,SUSE-SLE-Module-Development-Tools-OBS-15-2019-319 SKIP SUSE-RU-2019:0331-1 as SUSE-OpenStack-Cloud-8-2019-331 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-331,SUSE-2019-331,SUSE-OpenStack-Cloud-8-2019-331 SKIP SUSE-RU-2019:0340-1 as SUSE-Storage-5-2019-340 is not security or has no CVEs. patches: SUSE-2019-340,SUSE-Storage-5-2019-340 SKIP SUSE-RU-2019:0342-1 as SUSE-SUSE-Manager-Server-3.2-2019-342 is not security or has no CVEs. patches: SUSE-2019-342,SUSE-SLE-Manager-Tools-12-2019-342,SUSE-SLE-Module-Adv-Systems-Management-12-2019-342,SUSE-SLE-POS-12-SP2-2019-342,SUSE-SUSE-Manager-Proxy-3.0-2019-342,SUSE-SUSE-Manager-Proxy-3.1-2019-342,SUSE-SUSE-Manager-Proxy-3.2-2019-342,SUSE-SUSE-Manager-Server-3.0-2019-342,SUSE-SUSE-Manager-Server-3.1-2019-342,SUSE-SUSE-Manager-Server-3.2-2019-342 SKIP SUSE-RU-2019:0343-1 as SUSE-SLE-Module-Server-Applications-15-2019-343 is not security or has no CVEs. patches: SUSE-2019-343,SUSE-SLE-Module-Basesystem-15-2019-343,SUSE-SLE-Module-Server-Applications-15-2019-343 SKIP SUSE-RU-2019:0347-1 as SUSE-SLE-Manager-Tools-15-2019-347 is not security or has no CVEs. patches: SUSE-2019-347,SUSE-SLE-Manager-Tools-15-2019-347,SUSE-SLE-Module-Development-Tools-OBS-15-2019-347 SKIP SUSE-RU-2019:0348-1 as SUSE-SLE-Manager-Tools-12-2019-348 is not security or has no CVEs. patches: SUSE-2019-348,SUSE-SLE-Manager-Tools-12-2019-348 SKIP SUSE-RU-2019:0351-1 as SUSE-SUSE-Manager-Server-3.2-2019-351 is not security or has no CVEs. patches: SUSE-2019-351,SUSE-SUSE-Manager-Proxy-3.2-2019-351,SUSE-SUSE-Manager-Server-3.2-2019-351 SKIP SUSE-RU-2019:0363-1 as SUSE-Storage-5-2019-363 is not security or has no CVEs. patches: SUSE-2019-363,SUSE-Storage-5-2019-363 SKIP SUSE-RU-2019:0364-1 as SUSE-SLE-Module-Basesystem-15-2019-364 is not security or has no CVEs. patches: SUSE-2019-364,SUSE-SLE-Module-Basesystem-15-2019-364 SKIP SUSE-RU-2019:0365-1 as SUSE-SLE-SERVER-12-SP4-2019-365 is not security or has no CVEs. patches: SUSE-2019-365,SUSE-SLE-SDK-12-SP4-2019-365,SUSE-SLE-SERVER-12-SP4-2019-365 SKIP SUSE-RU-2019:0366-1 as SUSE-SLE-Module-Basesystem-15-2019-366 is not security or has no CVEs. patches: SUSE-2019-366,SUSE-SLE-Module-Basesystem-15-2019-366 SKIP SUSE-RU-2019:0367-1 as SUSE-Storage-4-2019-367 is not security or has no CVEs. patches: SUSE-2019-367,SUSE-OpenStack-Cloud-7-2019-367,SUSE-SLE-DESKTOP-12-SP3-2019-367,SUSE-SLE-DESKTOP-12-SP4-2019-367,SUSE-SLE-SAP-12-SP2-2019-367,SUSE-SLE-SERVER-12-SP2-2019-367,SUSE-SLE-SERVER-12-SP2-BCL-2019-367,SUSE-SLE-SERVER-12-SP3-2019-367,SUSE-SLE-SERVER-12-SP4-2019-367,SUSE-SLE-WE-12-SP3-2019-367,SUSE-Storage-4-2019-367 SKIP SUSE-RU-2019:0368-1 as SUSE-SLE-SDK-12-SP4-2019-368 is not security or has no CVEs. patches: SUSE-2019-368,SUSE-SLE-SDK-12-SP3-2019-368,SUSE-SLE-SDK-12-SP4-2019-368 SKIP SUSE-RU-2019:0369-1 as SUSE-SLE-Module-Development-Tools-15-2019-369 is not security or has no CVEs. patches: SUSE-2019-369,SUSE-SLE-Module-Basesystem-15-2019-369,SUSE-SLE-Module-Development-Tools-15-2019-369,SUSE-SLE-Module-Development-Tools-OBS-15-2019-369 SKIP SUSE-RU-2019:0370-1 as SUSE-SLE-Module-Server-Applications-15-2019-370 is not security or has no CVEs. patches: SUSE-2019-370,SUSE-SLE-Module-Development-Tools-OBS-15-2019-370,SUSE-SLE-Module-Server-Applications-15-2019-370 SKIP SUSE-RU-2019:0371-1 as SUSE-SLE-Module-Basesystem-15-2019-371 is not security or has no CVEs. patches: SUSE-2019-371,SUSE-SLE-Module-Basesystem-15-2019-371 SKIP SUSE-RU-2019:0372-1 as SUSE-SLE-SERVER-12-SP4-2019-372 is not security or has no CVEs. patches: SUSE-2019-372,SUSE-SLE-DESKTOP-12-SP3-2019-372,SUSE-SLE-DESKTOP-12-SP4-2019-372,SUSE-SLE-SERVER-12-SP3-2019-372,SUSE-SLE-SERVER-12-SP4-2019-372 SKIP SUSE-RU-2019:0373-1 as SUSE-SLE-Module-Development-Tools-15-2019-373 is not security or has no CVEs. patches: SUSE-2019-373,SUSE-SLE-Module-Development-Tools-15-2019-373 SKIP SUSE-RU-2019:0374-1 as SUSE-SLE-Module-Basesystem-15-2019-374 is not security or has no CVEs. patches: SUSE-2019-374,SUSE-SLE-Module-Basesystem-15-2019-374 SKIP SUSE-RU-2019:0375-1 as SUSE-SLE-WE-12-SP4-2019-375 is not security or has no CVEs. patches: SUSE-2019-375,SUSE-SLE-DESKTOP-12-SP3-2019-375,SUSE-SLE-DESKTOP-12-SP4-2019-375,SUSE-SLE-SDK-12-SP3-2019-375,SUSE-SLE-SDK-12-SP4-2019-375,SUSE-SLE-SERVER-12-SP3-2019-375,SUSE-SLE-SERVER-12-SP4-2019-375,SUSE-SLE-WE-12-SP3-2019-375,SUSE-SLE-WE-12-SP4-2019-375 SKIP SUSE-RU-2019:0384-1 as SUSE-2019-384 is not security or has no CVEs. patches: SUSE-2019-384,SUSE-SLE-Module-Development-Tools-OBS-15-2019-384 SKIP SUSE-RU-2019:0388-1 as SUSE-SUSE-Manager-Server-3.2-2019-388 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-388,SUSE-2019-388,SUSE-OpenStack-Cloud-7-2019-388,SUSE-OpenStack-Cloud-8-2019-388,SUSE-OpenStack-Cloud-Crowbar-8-2019-388,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-388,SUSE-SLE-Module-Public-Cloud-12-2019-388,SUSE-SLE-SERVER-12-SP3-2019-388,SUSE-SLE-SERVER-12-SP4-2019-388,SUSE-SUSE-Manager-Server-3.2-2019-388 SKIP SUSE-RU-2019:0389-1 as SUSE-SLE-SERVER-12-SP4-2019-389 is not security or has no CVEs. patches: SUSE-2019-389,SUSE-SLE-SERVER-12-SP3-2019-389,SUSE-SLE-SERVER-12-SP4-2019-389 SKIP SUSE-RU-2019:0397-1 as SUSE-OpenStack-Cloud-8-2019-397 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-397,SUSE-2019-397,SUSE-OpenStack-Cloud-8-2019-397 SKIP SUSE-RU-2019:0399-1 as SUSE-SLE-Module-Public-Cloud-12-2019-399 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-399,SUSE-2019-399,SUSE-OpenStack-Cloud-8-2019-399,SUSE-OpenStack-Cloud-Crowbar-8-2019-399,SUSE-SLE-Module-Public-Cloud-12-2019-399 SKIP SUSE-RU-2019:0400-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-400 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-400,SUSE-2019-400,SUSE-OpenStack-Cloud-8-2019-400,SUSE-OpenStack-Cloud-Crowbar-8-2019-400 SKIP SUSE-RU-2019:0401-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-401 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-401,SUSE-2019-401,SUSE-OpenStack-Cloud-8-2019-401,SUSE-OpenStack-Cloud-Crowbar-8-2019-401 SKIP SUSE-RU-2019:0402-1 as SUSE-OpenStack-Cloud-8-2019-402 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-402,SUSE-2019-402,SUSE-OpenStack-Cloud-8-2019-402 SKIP SUSE-RU-2019:0403-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-403 is not security or has no CVEs. patches: SUSE-2019-403,SUSE-OpenStack-Cloud-Crowbar-8-2019-403 SKIP SUSE-RU-2019:0404-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-404 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-404,SUSE-2019-404,SUSE-OpenStack-Cloud-8-2019-404,SUSE-OpenStack-Cloud-Crowbar-8-2019-404 SKIP SUSE-RU-2019:0405-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-405 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-405,SUSE-2019-405,SUSE-OpenStack-Cloud-8-2019-405,SUSE-OpenStack-Cloud-Crowbar-8-2019-405 SKIP SUSE-RU-2019:0406-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-406 is not security or has no CVEs. patches: SUSE-2019-406,SUSE-OpenStack-Cloud-Crowbar-8-2019-406 SKIP SUSE-RU-2019:0407-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-407 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-407,SUSE-2019-407,SUSE-OpenStack-Cloud-8-2019-407,SUSE-OpenStack-Cloud-Crowbar-8-2019-407 SKIP SUSE-RU-2019:0408-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-408 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-408,SUSE-2019-408,SUSE-OpenStack-Cloud-8-2019-408,SUSE-OpenStack-Cloud-Crowbar-8-2019-408 SKIP SUSE-RU-2019:0409-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-409 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-409,SUSE-2019-409,SUSE-OpenStack-Cloud-8-2019-409,SUSE-OpenStack-Cloud-Crowbar-8-2019-409 SKIP SUSE-RU-2019:0410-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-410 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-410,SUSE-2019-410,SUSE-OpenStack-Cloud-8-2019-410,SUSE-OpenStack-Cloud-Crowbar-8-2019-410 SKIP SUSE-RU-2019:0411-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-411 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-411,SUSE-2019-411,SUSE-OpenStack-Cloud-8-2019-411,SUSE-OpenStack-Cloud-Crowbar-8-2019-411 SKIP SUSE-RU-2019:0415-1 as SUSE-SLE-SERVER-12-SP4-2019-415 is not security or has no CVEs. patches: SUSE-2019-415,SUSE-SLE-SERVER-12-SP4-2019-415 SKIP SUSE-RU-2019:0420-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-420 is not security or has no CVEs. patches: SUSE-2019-420,SUSE-SLE-Module-Desktop-Applications-15-2019-420,SUSE-SLE-Module-Development-Tools-OBS-15-2019-420 SKIP SUSE-RU-2019:0429-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-429 is not security or has no CVEs. patches: SUSE-2019-429,SUSE-SLE-Module-Basesystem-15-2019-429,SUSE-SLE-Module-Desktop-Applications-15-2019-429,SUSE-SLE-Module-Development-Tools-OBS-15-2019-429 SKIP SUSE-RU-2019:0430-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-430 is not security or has no CVEs. patches: SUSE-2019-430,SUSE-SLE-Module-Desktop-Applications-15-2019-430 SKIP SUSE-RU-2019:0431-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-431 is not security or has no CVEs. patches: SUSE-2019-431,SUSE-SLE-Module-Desktop-Applications-15-2019-431 SKIP SUSE-RU-2019:0432-1 as SUSE-SLE-Module-Basesystem-15-2019-432 is not security or has no CVEs. patches: SUSE-2019-432,SUSE-SLE-Module-Basesystem-15-2019-432 SKIP SUSE-RU-2019:0433-1 as SUSE-SLE-Module-Basesystem-15-2019-433 is not security or has no CVEs. patches: SUSE-2019-433,SUSE-SLE-Module-Basesystem-15-2019-433 SKIP SUSE-RU-2019:0434-1 as SUSE-SLE-SERVER-12-SP4-2019-434 is not security or has no CVEs. patches: SUSE-2019-434,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-434,SUSE-SLE-DESKTOP-12-SP3-2019-434,SUSE-SLE-DESKTOP-12-SP4-2019-434,SUSE-SLE-SDK-12-SP3-2019-434,SUSE-SLE-SDK-12-SP4-2019-434,SUSE-SLE-SERVER-12-SP3-2019-434,SUSE-SLE-SERVER-12-SP4-2019-434 SKIP SUSE-RU-2019:0436-1 as SUSE-SLE-Module-Basesystem-15-2019-436 is not security or has no CVEs. patches: SUSE-2019-436,SUSE-SLE-INSTALLER-15-2019-436,SUSE-SLE-Module-Basesystem-15-2019-436 SKIP SUSE-RU-2019:0440-1 as SUSE-SLE-SERVER-12-SP4-2019-440 is not security or has no CVEs. patches: SUSE-2019-440,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-440,SUSE-SLE-DESKTOP-12-SP3-2019-440,SUSE-SLE-DESKTOP-12-SP4-2019-440,SUSE-SLE-SERVER-12-SP3-2019-440,SUSE-SLE-SERVER-12-SP4-2019-440 SKIP SUSE-RU-2019:0441-1 as SUSE-SLE-Module-Basesystem-15-2019-441 is not security or has no CVEs. patches: SUSE-2019-441,SUSE-SLE-Module-Basesystem-15-2019-441 SKIP SUSE-RU-2019:0442-1 as SUSE-SLE-SERVER-12-SP4-2019-442 is not security or has no CVEs. patches: SUSE-2019-442,SUSE-SLE-SERVER-12-SP4-2019-442 SKIP SUSE-RU-2019:0443-1 as SUSE-SLE-Module-Public-Cloud-15-2019-443 is not security or has no CVEs. patches: SUSE-2019-443,SUSE-SLE-Module-Public-Cloud-15-2019-443 SKIP SUSE-RU-2019:0444-1 as SUSE-SLE-Module-Basesystem-15-2019-444 is not security or has no CVEs. patches: SUSE-2019-444,SUSE-SLE-Module-Basesystem-15-2019-444 SKIP SUSE-RU-2019:0445-1 as SUSE-SLE-Module-Basesystem-15-2019-445 is not security or has no CVEs. patches: SUSE-2019-445,SUSE-SLE-Module-Basesystem-15-2019-445 SKIP SUSE-RU-2019:0446-1 as SUSE-SLE-Module-Public-Cloud-15-2019-446 is not security or has no CVEs. patches: SUSE-2019-446,SUSE-SLE-Module-Development-Tools-OBS-15-2019-446,SUSE-SLE-Module-Public-Cloud-15-2019-446 SKIP SUSE-RU-2019:0451-1 as SUSE-SLE-SERVER-12-SP3-2019-451 is not security or has no CVEs. patches: SUSE-2019-451,SUSE-SLE-SERVER-12-SP3-2019-451 SKIP SUSE-RU-2019:0452-1 as SUSE-SLE-SERVER-12-SP1-2019-452 is not security or has no CVEs. patches: SUSE-2019-452,SUSE-SLE-SERVER-12-SP1-2019-452 SKIP SUSE-RU-2019:0452-2 as SUSE-SLE-SAP-12-SP1-2019-452 is not security or has no CVEs. patches: SUSE-2019-452,SUSE-SLE-SAP-12-SP1-2019-452 SKIP SUSE-RU-2019:0453-1 as SUSE-SLE-SERVER-12-SP3-2019-453 is not security or has no CVEs. patches: SUSE-2019-453,SUSE-SLE-SERVER-12-SP3-2019-453 SKIP SUSE-RU-2019:0454-1 as SUSE-SLE-Module-Public-Cloud-12-2019-454 is not security or has no CVEs. patches: SUSE-2019-454,SUSE-SLE-Module-Public-Cloud-12-2019-454 SKIP SUSE-RU-2019:0455-1 as SUSE-SLE-Module-Server-Applications-15-2019-455 is not security or has no CVEs. patches: SUSE-2019-455,SUSE-SLE-Module-Development-Tools-OBS-15-2019-455,SUSE-SLE-Module-Server-Applications-15-2019-455 SKIP SUSE-RU-2019:0456-1 as SUSE-SUSE-Manager-Server-3.1-2019-456 is not security or has no CVEs. patches: SUSE-2019-456,SUSE-SUSE-Manager-Server-3.1-2019-456 SKIP SUSE-RU-2019:0459-1 as SUSE-SLE-Product-HA-15-2019-459 is not security or has no CVEs. patches: SUSE-2019-459,SUSE-SLE-Product-HA-15-2019-459 SKIP SUSE-RU-2019:0460-1 as SUSE-SLE-Module-Basesystem-15-2019-460 is not security or has no CVEs. patches: SUSE-2019-460,SUSE-SLE-INSTALLER-15-2019-460,SUSE-SLE-Module-Basesystem-15-2019-460,SUSE-SLE-Module-Development-Tools-OBS-15-2019-460 SKIP SUSE-RU-2019:0461-1 as SUSE-SLE-Module-Basesystem-15-2019-461 is not security or has no CVEs. patches: SUSE-2019-461,SUSE-SLE-INSTALLER-15-2019-461,SUSE-SLE-Module-Basesystem-15-2019-461 SKIP SUSE-RU-2019:0462-1 as SUSE-SLE-SERVER-12-SP4-2019-462 is not security or has no CVEs. patches: SUSE-2019-462,SUSE-SLE-DESKTOP-12-SP4-2019-462,SUSE-SLE-SERVER-12-SP4-2019-462 SKIP SUSE-RU-2019:0463-1 as SUSE-SLE-Module-Web-Scripting-15-2019-463 is not security or has no CVEs. patches: SUSE-2019-463,SUSE-SLE-Module-Development-Tools-OBS-15-2019-463,SUSE-SLE-Module-Web-Scripting-15-2019-463 SKIP SUSE-RU-2019:0464-1 as SUSE-SLE-Module-Basesystem-15-2019-464 is not security or has no CVEs. patches: SUSE-2019-464,SUSE-SLE-Module-Basesystem-15-2019-464 SKIP SUSE-RU-2019:0465-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-465 is not security or has no CVEs. patches: SUSE-2019-465,SUSE-SLE-Module-Desktop-Applications-15-2019-465 SKIP SUSE-RU-2019:0467-1 as SUSE-Storage-5-2019-467 is not security or has no CVEs. patches: SUSE-2019-467,SUSE-Storage-5-2019-467 SKIP SUSE-RU-2019:0472-1 as SUSE-SLE-SERVER-12-SP4-2019-472 is not security or has no CVEs. patches: SUSE-2019-472,SUSE-SLE-SERVER-12-SP3-2019-472,SUSE-SLE-SERVER-12-SP4-2019-472 SKIP SUSE-RU-2019:0473-1 as SUSE-SLE-SERVER-12-SP4-2019-473 is not security or has no CVEs. patches: SUSE-2019-473,SUSE-SLE-SERVER-12-SP3-2019-473,SUSE-SLE-SERVER-12-SP4-2019-473 SKIP SUSE-RU-2019:0474-1 as SUSE-Storage-4-2019-474 is not security or has no CVEs. patches: SUSE-2019-474,SUSE-OpenStack-Cloud-7-2019-474,SUSE-Storage-4-2019-474 SKIP SUSE-RU-2019:0475-1 as SUSE-OpenStack-Cloud-8-2019-475 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-475,SUSE-2019-475,SUSE-OpenStack-Cloud-8-2019-475 SKIP SUSE-RU-2019:0476-1 as SUSE-Storage-4-2019-476 is not security or has no CVEs. patches: SUSE-2019-476,SUSE-OpenStack-Cloud-7-2019-476,SUSE-Storage-4-2019-476 SKIP SUSE-RU-2019:0477-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-477 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-477,SUSE-2019-477,SUSE-OpenStack-Cloud-8-2019-477,SUSE-OpenStack-Cloud-Crowbar-8-2019-477 SKIP SUSE-RU-2019:0478-1 as SUSE-Storage-4-2019-478 is not security or has no CVEs. patches: SUSE-2019-478,SUSE-OpenStack-Cloud-7-2019-478,SUSE-Storage-4-2019-478 SKIP SUSE-RU-2019:0485-1 as SUSE-SLE-HA-12-SP2-2019-485 is not security or has no CVEs. patches: SUSE-2019-485,SUSE-SLE-HA-12-SP2-2019-485 SKIP SUSE-RU-2019:0486-1 as SUSE-SLE-Module-Public-Cloud-12-2019-486 is not security or has no CVEs. patches: SUSE-2019-486,SUSE-SLE-Module-Public-Cloud-12-2019-486 SKIP SUSE-RU-2019:0487-1 as SUSE-SLE-Module-Public-Cloud-15-2019-487 is not security or has no CVEs. patches: SUSE-2019-487,SUSE-SLE-Module-Public-Cloud-15-2019-487 SKIP SUSE-RU-2019:0488-1 as SUSE-SLE-SERVER-12-SP4-2019-488 is not security or has no CVEs. patches: SUSE-2019-488,SUSE-SLE-SERVER-12-SP4-2019-488 SKIP SUSE-RU-2019:0490-1 as SUSE-SLE-Module-Basesystem-15-2019-490 is not security or has no CVEs. patches: SUSE-2019-490,SUSE-SLE-Module-Basesystem-15-2019-490 SKIP SUSE-RU-2019:0491-1 as SUSE-SLE-Product-HA-15-2019-491 is not security or has no CVEs. patches: SUSE-2019-491,SUSE-SLE-Product-HA-15-2019-491 SKIP SUSE-RU-2019:0492-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-492 is not security or has no CVEs. patches: SUSE-2019-492,SUSE-SLE-Module-Desktop-Applications-15-2019-492 SKIP SUSE-RU-2019:0493-1 as SUSE-2019-493 is not security or has no CVEs. patches: SUSE-2019-493,SUSE-SLE-Module-Development-Tools-OBS-15-2019-493 SKIP SUSE-RU-2019:0494-1 as SUSE-SLE-SERVER-12-SP4-2019-494 is not security or has no CVEs. patches: SUSE-2019-494,SUSE-SLE-SERVER-12-SP4-2019-494 SKIP SUSE-RU-2019:0500-1 as SUSE-SLE-Module-Live-Patching-15-2019-500 is not security or has no CVEs. patches: SUSE-2019-500,SUSE-SLE-Module-Live-Patching-15-2019-500 SKIP SUSE-RU-2019:0501-1 as SUSE-SLE-Module-Development-Tools-15-2019-501 is not security or has no CVEs. patches: SUSE-2019-501,SUSE-SLE-Module-Development-Tools-15-2019-501,SUSE-SLE-Module-Development-Tools-OBS-15-2019-501 SKIP SUSE-RU-2019:0502-1 as SUSE-SLE-Module-Public-Cloud-12-2019-502 is not security or has no CVEs. patches: SUSE-2019-502,SUSE-SLE-Module-Public-Cloud-12-2019-502 SKIP SUSE-RU-2019:0503-1 as SUSE-SLE-Module-Basesystem-15-2019-503 is not security or has no CVEs. patches: SUSE-2019-503,SUSE-SLE-Module-Basesystem-15-2019-503 SKIP SUSE-RU-2019:0506-1 as SUSE-SLE-Module-Basesystem-15-2019-506 is not security or has no CVEs. patches: SUSE-2019-506,SUSE-SLE-Module-Basesystem-15-2019-506 SKIP SUSE-RU-2019:0509-1 as SUSE-SLE-Module-Basesystem-15-2019-509 is not security or has no CVEs. patches: SUSE-2019-509,SUSE-SLE-Module-Basesystem-15-2019-509 SKIP SUSE-RU-2019:0513-1 as SUSE-SLE-SERVER-12-SP4-2019-513 is not security or has no CVEs. patches: SUSE-2019-513,SUSE-SLE-SDK-12-SP4-2019-513,SUSE-SLE-SERVER-12-SP4-2019-513 SKIP SUSE-RU-2019:0514-1 as SUSE-SLE-SERVER-12-SP4-2019-514 is not security or has no CVEs. patches: SUSE-2019-514,SUSE-SLE-DESKTOP-12-SP3-2019-514,SUSE-SLE-DESKTOP-12-SP4-2019-514,SUSE-SLE-SDK-12-SP3-2019-514,SUSE-SLE-SDK-12-SP4-2019-514,SUSE-SLE-SERVER-12-SP3-2019-514,SUSE-SLE-SERVER-12-SP4-2019-514 SKIP SUSE-RU-2019:0515-1 as SUSE-SLE-HA-12-SP1-2019-515 is not security or has no CVEs. patches: SUSE-2019-515,SUSE-SLE-HA-12-SP1-2019-515 SKIP SUSE-RU-2019:0516-1 as SUSE-SLE-HA-12-SP2-2019-516 is not security or has no CVEs. patches: SUSE-2019-516,SUSE-SLE-HA-12-SP2-2019-516 SKIP SUSE-RU-2019:0517-1 as SUSE-SLE-SERVER-12-SP4-2019-517 is not security or has no CVEs. patches: SUSE-2019-517,SUSE-SLE-DESKTOP-12-SP3-2019-517,SUSE-SLE-DESKTOP-12-SP4-2019-517,SUSE-SLE-SDK-12-SP3-2019-517,SUSE-SLE-SDK-12-SP4-2019-517,SUSE-SLE-SERVER-12-SP3-2019-517,SUSE-SLE-SERVER-12-SP4-2019-517 SKIP SUSE-RU-2019:0518-1 as SUSE-SLE-Module-Basesystem-15-2019-518 is not security or has no CVEs. patches: SUSE-2019-518,SUSE-SLE-Module-Basesystem-15-2019-518,SUSE-SLE-Module-Development-Tools-OBS-15-2019-518 SKIP SUSE-RU-2019:0519-1 as SUSE-SLE-SERVER-12-SP4-2019-519 is not security or has no CVEs. patches: SUSE-2019-519,SUSE-SLE-DESKTOP-12-SP4-2019-519,SUSE-SLE-SERVER-12-SP4-2019-519 SKIP SUSE-RU-2019:0520-1 as SUSE-SLE-WE-12-SP4-2019-520 is not security or has no CVEs. patches: SUSE-2019-520,SUSE-SLE-DESKTOP-12-SP3-2019-520,SUSE-SLE-DESKTOP-12-SP4-2019-520,SUSE-SLE-SDK-12-SP3-2019-520,SUSE-SLE-SDK-12-SP4-2019-520,SUSE-SLE-WE-12-SP3-2019-520,SUSE-SLE-WE-12-SP4-2019-520 SKIP SUSE-RU-2019:0521-1 as SUSE-SLE-SERVER-12-SP4-2019-521 is not security or has no CVEs. patches: SUSE-2019-521,SUSE-SLE-Module-Public-Cloud-12-2019-521,SUSE-SLE-SERVER-12-SP3-2019-521,SUSE-SLE-SERVER-12-SP4-2019-521 SKIP SUSE-RU-2019:0522-1 as SUSE-SLE-Product-WE-15-2019-522 is not security or has no CVEs. patches: SUSE-2019-522,SUSE-SLE-Product-WE-15-2019-522 SKIP SUSE-RU-2019:0525-1 as SUSE-Storage-4-2019-525 is not security or has no CVEs. patches: SUSE-2019-525,SUSE-OpenStack-Cloud-7-2019-525,SUSE-SLE-SAP-12-SP2-2019-525,SUSE-SLE-SERVER-12-SP2-2019-525,SUSE-SLE-SERVER-12-SP2-BCL-2019-525,SUSE-Storage-4-2019-525 SKIP SUSE-RU-2019:0528-1 as SUSE-SLE-Product-WE-15-2019-528 is not security or has no CVEs. patches: SUSE-2019-528,SUSE-SLE-Module-Basesystem-15-2019-528,SUSE-SLE-Module-Desktop-Applications-15-2019-528,SUSE-SLE-Module-Development-Tools-OBS-15-2019-528,SUSE-SLE-Product-WE-15-2019-528 SKIP SUSE-RU-2019:0529-1 as SUSE-SLE-Module-Public-Cloud-15-2019-529 is not security or has no CVEs. patches: SUSE-2019-529,SUSE-SLE-Module-Public-Cloud-15-2019-529 SKIP SUSE-RU-2019:0530-1 as SUSE-SLE-Module-Public-Cloud-12-2019-530 is not security or has no CVEs. patches: SUSE-2019-530,SUSE-SLE-Module-Public-Cloud-12-2019-530 SKIP SUSE-RU-2019:0531-1 as SUSE-SLE-SAP-12-SP4-2019-531 is not security or has no CVEs. patches: SUSE-2019-531,SUSE-SLE-SAP-12-SP1-2019-531,SUSE-SLE-SAP-12-SP2-2019-531,SUSE-SLE-SAP-12-SP3-2019-531,SUSE-SLE-SAP-12-SP4-2019-531 SKIP SUSE-RU-2019:0532-1 as SUSE-SLE-Module-Basesystem-15-2019-532 is not security or has no CVEs. patches: SUSE-2019-532,SUSE-SLE-Module-Basesystem-15-2019-532,SUSE-SLE-Module-Development-Tools-OBS-15-2019-532 SKIP SUSE-RU-2019:0533-1 as SUSE-SLE-Module-Server-Applications-15-2019-533 is not security or has no CVEs. patches: SUSE-2019-533,SUSE-SLE-Module-Server-Applications-15-2019-533 SKIP SUSE-RU-2019:0535-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-535 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-535,SUSE-2019-535,SUSE-OpenStack-Cloud-8-2019-535,SUSE-OpenStack-Cloud-Crowbar-8-2019-535 SKIP SUSE-RU-2019:0536-1 as SUSE-SLE-Module-SAP-Applications-15-2019-536 is not security or has no CVEs. patches: SUSE-2019-536,SUSE-SLE-Module-SAP-Applications-15-2019-536 SKIP SUSE-RU-2019:0543-1 as SUSE-SLE-WE-12-SP4-2019-543 is not security or has no CVEs. patches: SUSE-2019-543,SUSE-SLE-DESKTOP-12-SP3-2019-543,SUSE-SLE-DESKTOP-12-SP4-2019-543,SUSE-SLE-SDK-12-SP3-2019-543,SUSE-SLE-SDK-12-SP4-2019-543,SUSE-SLE-SERVER-12-SP3-2019-543,SUSE-SLE-SERVER-12-SP4-2019-543,SUSE-SLE-WE-12-SP3-2019-543,SUSE-SLE-WE-12-SP4-2019-543 SKIP SUSE-RU-2019:0544-1 as SUSE-SLE-Module-Basesystem-15-2019-544 is not security or has no CVEs. patches: SUSE-2019-544,SUSE-SLE-Module-Basesystem-15-2019-544,SUSE-SLE-Module-Development-Tools-OBS-15-2019-544 SKIP SUSE-RU-2019:0545-1 as SUSE-SLE-SERVER-12-SP4-2019-545 is not security or has no CVEs. patches: SUSE-2019-545,SUSE-SLE-DESKTOP-12-SP4-2019-545,SUSE-SLE-SERVER-12-SP4-2019-545 SKIP SUSE-RU-2019:0546-1 as SUSE-SLE-SERVER-12-SP3-2019-546 is not security or has no CVEs. patches: SUSE-2019-546,SUSE-SLE-DESKTOP-12-SP3-2019-546,SUSE-SLE-SERVER-12-SP3-2019-546 SKIP SUSE-RU-2019:0547-1 as SUSE-Storage-4-2019-547 is not security or has no CVEs. patches: SUSE-2019-547,SUSE-OpenStack-Cloud-7-2019-547,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-547,SUSE-SLE-SAP-12-SP2-2019-547,SUSE-SLE-SERVER-12-SP2-2019-547,SUSE-SLE-SERVER-12-SP2-BCL-2019-547,SUSE-Storage-4-2019-547 SKIP SUSE-RU-2019:0548-1 as SUSE-SLE-Module-Basesystem-15-2019-548 is not security or has no CVEs. patches: SUSE-2019-548,SUSE-SLE-Module-Basesystem-15-2019-548 SKIP SUSE-RU-2019:0549-1 as SUSE-SLE-SERVER-12-SP4-2019-549 is not security or has no CVEs. patches: SUSE-2019-549,SUSE-SLE-SERVER-12-SP4-2019-549 SKIP SUSE-RU-2019:0550-1 as SUSE-SLE-Module-Server-Applications-15-2019-550 is not security or has no CVEs. patches: SUSE-2019-550,SUSE-SLE-Module-Server-Applications-15-2019-550 SKIP SUSE-RU-2019:0551-1 as SUSE-SLE-Module-Basesystem-15-2019-551 is not security or has no CVEs. patches: SUSE-2019-551,SUSE-SLE-Module-Basesystem-15-2019-551 SKIP SUSE-RU-2019:0557-1 as SUSE-SLE-HA-12-SP3-2019-557 is not security or has no CVEs. patches: SUSE-2019-557,SUSE-SLE-HA-12-SP1-2019-557,SUSE-SLE-HA-12-SP2-2019-557,SUSE-SLE-HA-12-SP3-2019-557 SKIP SUSE-RU-2019:0558-1 as SUSE-SLE-SERVER-12-SP4-2019-558 is not security or has no CVEs. patches: SUSE-2019-558,SUSE-SLE-DESKTOP-12-SP3-2019-558,SUSE-SLE-DESKTOP-12-SP4-2019-558,SUSE-SLE-SDK-12-SP3-2019-558,SUSE-SLE-SDK-12-SP4-2019-558,SUSE-SLE-SERVER-12-SP3-2019-558,SUSE-SLE-SERVER-12-SP4-2019-558 SKIP SUSE-RU-2019:0560-1 as SUSE-SLE-Module-Basesystem-15-2019-560 is not security or has no CVEs. patches: SUSE-2019-560,SUSE-SLE-INSTALLER-15-2019-560,SUSE-SLE-Module-Basesystem-15-2019-560 SKIP SUSE-RU-2019:0561-1 as SUSE-SLE-SERVER-12-SP4-2019-561 is not security or has no CVEs. patches: SUSE-2019-561,SUSE-SLE-DESKTOP-12-SP3-2019-561,SUSE-SLE-DESKTOP-12-SP4-2019-561,SUSE-SLE-SDK-12-SP3-2019-561,SUSE-SLE-SDK-12-SP4-2019-561,SUSE-SLE-SERVER-12-SP3-2019-561,SUSE-SLE-SERVER-12-SP4-2019-561 SKIP SUSE-RU-2019:0564-1 as SUSE-SLE-HA-12-SP4-2019-564 is not security or has no CVEs. patches: SUSE-2019-564,SUSE-SLE-HA-12-SP4-2019-564 SKIP SUSE-RU-2019:0566-1 as SUSE-SLE-SERVER-12-SP3-2019-566 is not security or has no CVEs. patches: SUSE-2019-566,SUSE-SLE-DESKTOP-12-SP3-2019-566,SUSE-SLE-SERVER-12-SP3-2019-566 SKIP SUSE-RU-2019:0567-1 as SUSE-SLE-Module-Basesystem-15-2019-567 is not security or has no CVEs. patches: SUSE-2019-567,SUSE-SLE-Module-Basesystem-15-2019-567,SUSE-SLE-Module-Development-Tools-OBS-15-2019-567 SKIP SUSE-RU-2019:0568-1 as SUSE-Storage-4-2019-568 is not security or has no CVEs. patches: SUSE-2019-568,SUSE-OpenStack-Cloud-7-2019-568,SUSE-SLE-SAP-12-SP2-2019-568,SUSE-SLE-SERVER-12-SP2-2019-568,SUSE-SLE-SERVER-12-SP2-BCL-2019-568,SUSE-Storage-4-2019-568 SKIP SUSE-RU-2019:0569-1 as SUSE-SLE-Module-Public-Cloud-15-2019-569 is not security or has no CVEs. patches: SUSE-2019-569,SUSE-SLE-Module-Development-Tools-OBS-15-2019-569,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-569,SUSE-SLE-Module-Public-Cloud-15-2019-569 SKIP SUSE-RU-2019:0570-1 as SUSE-SLE-Module-Server-Applications-15-2019-570 is not security or has no CVEs. patches: SUSE-2019-570,SUSE-SLE-Module-Basesystem-15-2019-570,SUSE-SLE-Module-Development-Tools-OBS-15-2019-570,SUSE-SLE-Module-Server-Applications-15-2019-570 SKIP SUSE-RU-2019:0575-1 as SUSE-SLE-SERVER-12-SP4-2019-575 is not security or has no CVEs. patches: SUSE-2019-575,SUSE-SLE-SERVER-12-SP3-2019-575,SUSE-SLE-SERVER-12-SP4-2019-575 SKIP SUSE-RU-2019:0577-1 as SUSE-SLE-Module-Server-Applications-15-2019-577 is not security or has no CVEs. patches: SUSE-2019-577,SUSE-SLE-Module-Basesystem-15-2019-577,SUSE-SLE-Module-Development-Tools-OBS-15-2019-577,SUSE-SLE-Module-Server-Applications-15-2019-577 SKIP SUSE-RU-2019:0583-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-583 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-583,SUSE-2019-583,SUSE-OpenStack-Cloud-8-2019-583,SUSE-OpenStack-Cloud-Crowbar-8-2019-583 SKIP SUSE-RU-2019:0584-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-584 is not security or has no CVEs. patches: SUSE-2019-584,SUSE-OpenStack-Cloud-Crowbar-8-2019-584 SKIP SUSE-RU-2019:0589-1 as SUSE-SUSE-Manager-Server-3.2-2019-589 is not security or has no CVEs. patches: SUSE-2019-589,SUSE-SUSE-Manager-Proxy-3.2-2019-589,SUSE-SUSE-Manager-Server-3.2-2019-589 SKIP SUSE-RU-2019:0591-1 as SUSE-SLE-Manager-Tools-15-2019-591 is not security or has no CVEs. patches: SUSE-2019-591,SUSE-SLE-Manager-Tools-15-2019-591,SUSE-SLE-Module-Development-Tools-OBS-15-2019-591 SKIP SUSE-RU-2019:0592-1 as SUSE-SUSE-Manager-Server-3.2-2019-592 is not security or has no CVEs. patches: SUSE-2019-592,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-592,SUSE-SLE-Manager-Tools-12-2019-592,SUSE-SLE-Module-Adv-Systems-Management-12-2019-592,SUSE-SLE-POS-12-SP2-2019-592,SUSE-SUSE-Manager-Proxy-3.0-2019-592,SUSE-SUSE-Manager-Proxy-3.1-2019-592,SUSE-SUSE-Manager-Proxy-3.2-2019-592,SUSE-SUSE-Manager-Server-3.0-2019-592,SUSE-SUSE-Manager-Server-3.1-2019-592,SUSE-SUSE-Manager-Server-3.2-2019-592 SKIP SUSE-RU-2019:0593-1 as SUSE-SUSE-Manager-Server-3.0-2019-593 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-593,SUSE-2019-593,SUSE-OpenStack-Cloud-8-2019-593,SUSE-SLE-Manager-Tools-12-2019-593,SUSE-SUSE-Manager-Server-3.0-2019-593 SKIP SUSE-RU-2019:0597-1 as SUSE-SUSE-Manager-Server-3.2-2019-597 is not security or has no CVEs. patches: SUSE-2019-597,SUSE-SUSE-Manager-Proxy-3.2-2019-597,SUSE-SUSE-Manager-Server-3.2-2019-597 SKIP SUSE-RU-2019:0598-1 as SUSE-SLE-Module-Server-Applications-15-2019-598 is not security or has no CVEs. patches: SUSE-2019-598,SUSE-SLE-Module-Basesystem-15-2019-598,SUSE-SLE-Module-Server-Applications-15-2019-598 SKIP SUSE-RU-2019:0605-1 as SUSE-2019-605 is not security or has no CVEs. patches: SUSE-2019-605,SUSE-SLE-Module-Public-Cloud-15-2019-605 SKIP SUSE-RU-2019:0606-1 as SUSE-SLE-SERVER-12-SP4-2019-606 is not security or has no CVEs. patches: SUSE-2019-606,SUSE-SLE-SDK-12-SP3-2019-606,SUSE-SLE-SDK-12-SP4-2019-606,SUSE-SLE-SERVER-12-SP3-2019-606,SUSE-SLE-SERVER-12-SP4-2019-606 SKIP SUSE-RU-2019:0607-1 as SUSE-SLE-Live-Patching-12-SP4-2019-607 is not security or has no CVEs. patches: SUSE-2019-607,SUSE-SLE-Live-Patching-12-2019-607,SUSE-SLE-Live-Patching-12-SP3-2019-607,SUSE-SLE-Live-Patching-12-SP4-2019-607 SKIP SUSE-RU-2019:0608-1 as SUSE-SLE-Module-Development-Tools-15-2019-608 is not security or has no CVEs. patches: SUSE-2019-608,SUSE-SLE-Module-Basesystem-15-2019-608,SUSE-SLE-Module-Desktop-Applications-15-2019-608,SUSE-SLE-Module-Development-Tools-15-2019-608 SKIP SUSE-RU-2019:0612-1 as SUSE-OpenStack-Cloud-8-2019-612 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-612,SUSE-2019-612,SUSE-OpenStack-Cloud-8-2019-612 SKIP SUSE-RU-2019:0613-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-613 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-613,SUSE-2019-613,SUSE-OpenStack-Cloud-8-2019-613,SUSE-OpenStack-Cloud-Crowbar-8-2019-613 SKIP SUSE-RU-2019:0614-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-614 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-614,SUSE-2019-614,SUSE-OpenStack-Cloud-8-2019-614,SUSE-OpenStack-Cloud-Crowbar-8-2019-614 SKIP SUSE-RU-2019:0615-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-615 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-615,SUSE-2019-615,SUSE-OpenStack-Cloud-8-2019-615,SUSE-OpenStack-Cloud-Crowbar-8-2019-615 SKIP SUSE-RU-2019:0616-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-616 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-616,SUSE-2019-616,SUSE-OpenStack-Cloud-8-2019-616,SUSE-OpenStack-Cloud-Crowbar-8-2019-616 SKIP SUSE-RU-2019:0620-1 as SUSE-SLE-SERVER-12-SP4-2019-620 is not security or has no CVEs. patches: SUSE-2019-620,SUSE-SLE-DESKTOP-12-SP4-2019-620,SUSE-SLE-SERVER-12-SP4-2019-620 SKIP SUSE-RU-2019:0621-1 as SUSE-SLE-SDK-12-SP3-2019-621 is not security or has no CVEs. patches: SUSE-2019-621,SUSE-SLE-HA-12-SP3-2019-621,SUSE-SLE-SDK-12-SP3-2019-621 SKIP SUSE-RU-2019:0623-1 as SUSE-Storage-5-2019-623 is not security or has no CVEs. patches: SUSE-2019-623,SUSE-SLE-DESKTOP-12-SP3-2019-623,SUSE-SLE-DESKTOP-12-SP4-2019-623,SUSE-SLE-HA-12-SP3-2019-623,SUSE-SLE-HA-12-SP4-2019-623,SUSE-SLE-SDK-12-SP3-2019-623,SUSE-SLE-SDK-12-SP4-2019-623,SUSE-SLE-SERVER-12-SP3-2019-623,SUSE-SLE-SERVER-12-SP4-2019-623,SUSE-Storage-5-2019-623 SKIP SUSE-RU-2019:0625-1 as SUSE-SLE-Module-Server-Applications-15-2019-625 is not security or has no CVEs. patches: SUSE-2019-625,SUSE-SLE-Module-Server-Applications-15-2019-625 SKIP SUSE-RU-2019:0626-1 as SUSE-SLE-HA-12-SP3-2019-626 is not security or has no CVEs. patches: SUSE-2019-626,SUSE-SLE-HA-12-SP3-2019-626 SKIP SUSE-RU-2019:0640-1 as SUSE-SLE-Module-Basesystem-15-2019-640 is not security or has no CVEs. patches: SUSE-2019-640,SUSE-SLE-Module-Basesystem-15-2019-640 SKIP SUSE-RU-2019:0641-1 as SUSE-SLE-Module-Development-Tools-15-2019-641 is not security or has no CVEs. patches: SUSE-2019-641,SUSE-SLE-Module-Basesystem-15-2019-641,SUSE-SLE-Module-Development-Tools-15-2019-641,SUSE-SLE-Module-Development-Tools-OBS-15-2019-641 SKIP SUSE-RU-2019:0644-1 as SUSE-SLE-HA-12-SP3-2019-644 is not security or has no CVEs. patches: SUSE-2019-644,SUSE-SLE-HA-12-SP3-2019-644 SKIP SUSE-RU-2019:0652-1 as SUSE-SLE-SERVER-12-SP4-2019-652 is not security or has no CVEs. patches: SUSE-2019-652,SUSE-SLE-SERVER-12-SP4-2019-652 SKIP SUSE-RU-2019:0653-1 as SUSE-SLE-Product-WE-15-2019-653 is not security or has no CVEs. patches: SUSE-2019-653,SUSE-SLE-Module-Basesystem-15-2019-653,SUSE-SLE-Module-Development-Tools-15-2019-653,SUSE-SLE-Module-Development-Tools-OBS-15-2019-653,SUSE-SLE-Product-WE-15-2019-653 SKIP SUSE-RU-2019:0659-1 as SUSE-SLE-Module-Basesystem-15-2019-659 is not security or has no CVEs. patches: SUSE-2019-659,SUSE-SLE-Module-Basesystem-15-2019-659 SKIP SUSE-RU-2019:0660-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-660 is not security or has no CVEs. patches: SUSE-2019-660,SUSE-SLE-Module-Desktop-Applications-15-2019-660 SKIP SUSE-RU-2019:0661-1 as SUSE-SLE-SERVER-12-SP4-2019-661 is not security or has no CVEs. patches: SUSE-2019-661,SUSE-SLE-SDK-12-SP3-2019-661,SUSE-SLE-SDK-12-SP4-2019-661,SUSE-SLE-SERVER-12-SP3-2019-661,SUSE-SLE-SERVER-12-SP4-2019-661 SKIP SUSE-RU-2019:0662-1 as SUSE-SLE-SERVER-12-SP4-2019-662 is not security or has no CVEs. patches: SUSE-2019-662,SUSE-SLE-DESKTOP-12-SP4-2019-662,SUSE-SLE-HA-12-SP4-2019-662,SUSE-SLE-SDK-12-SP4-2019-662,SUSE-SLE-SERVER-12-SP4-2019-662 SKIP SUSE-RU-2019:0664-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2019-664 is not security or has no CVEs. patches: SUSE-2019-664,SUSE-SLE-Module-Basesystem-15-2019-664,SUSE-SLE-Module-Development-Tools-OBS-15-2019-664,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-664 SKIP SUSE-RU-2019:0665-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-665 is not security or has no CVEs. patches: SUSE-2019-665,SUSE-SLE-Module-Desktop-Applications-15-2019-665 SKIP SUSE-RU-2019:0666-1 as SUSE-SLE-SERVER-12-SP4-2019-666 is not security or has no CVEs. patches: SUSE-2019-666,SUSE-SLE-DESKTOP-12-SP4-2019-666,SUSE-SLE-SERVER-12-SP4-2019-666 SKIP SUSE-RU-2019:0667-1 as SUSE-SLE-SERVER-12-SP4-2019-667 is not security or has no CVEs. patches: SUSE-2019-667,SUSE-SLE-DESKTOP-12-SP4-2019-667,SUSE-SLE-SERVER-12-SP4-2019-667 SKIP SUSE-RU-2019:0675-1 as SUSE-SLE-HA-12-SP4-2019-675 is not security or has no CVEs. patches: SUSE-2019-675,SUSE-SLE-HA-12-SP4-2019-675 SKIP SUSE-RU-2019:0676-1 as SUSE-SLE-SDK-12-SP3-2019-676 is not security or has no CVEs. patches: SUSE-2019-676,SUSE-SLE-SDK-12-SP3-2019-676 SKIP SUSE-RU-2019:0677-1 as SUSE-SLE-Module-HPC-12-2019-677 is not security or has no CVEs. patches: SUSE-2019-677,SUSE-SLE-Module-HPC-12-2019-677 SKIP SUSE-RU-2019:0679-1 as SUSE-SLE-Module-Server-Applications-15-2019-679 is not security or has no CVEs. patches: SUSE-2019-679,SUSE-SLE-Module-Basesystem-15-2019-679,SUSE-SLE-Module-Development-Tools-OBS-15-2019-679,SUSE-SLE-Module-Server-Applications-15-2019-679 SKIP SUSE-RU-2019:0680-1 as SUSE-SLE-Product-HA-15-2019-680 is not security or has no CVEs. patches: SUSE-2019-680,SUSE-SLE-Product-HA-15-2019-680 SKIP SUSE-RU-2019:0681-1 as SUSE-SLE-SERVER-12-SP4-2019-681 is not security or has no CVEs. patches: SUSE-2019-681,SUSE-SLE-SERVER-12-SP4-2019-681 SKIP SUSE-RU-2019:0686-1 as SUSE-SLE-Product-HPC-15-2019-686 is not security or has no CVEs. patches: SUSE-2019-686,SUSE-SLE-Module-HPC-15-2019-686,SUSE-SLE-Product-HPC-15-2019-686 SKIP SUSE-RU-2019:0690-1 as SUSE-SLE-SERVER-12-SP4-2019-690 is not security or has no CVEs. patches: SUSE-2019-690,SUSE-SLE-SERVER-12-SP3-2019-690,SUSE-SLE-SERVER-12-SP4-2019-690 SKIP SUSE-RU-2019:0691-1 as SUSE-SLE-SERVER-12-SP4-2019-691 is not security or has no CVEs. patches: SUSE-2019-691,SUSE-SLE-SERVER-12-SP3-2019-691,SUSE-SLE-SERVER-12-SP4-2019-691 SKIP SUSE-RU-2019:0694-1 as SUSE-SLE-Module-Basesystem-15-2019-694 is not security or has no CVEs. patches: SUSE-2019-694,SUSE-SLE-INSTALLER-15-2019-694,SUSE-SLE-Module-Basesystem-15-2019-694 SKIP SUSE-RU-2019:0695-1 as SUSE-2019-695 is not security or has no CVEs. patches: SUSE-2019-695,SUSE-SLE-Module-Public-Cloud-12-2019-695 SKIP SUSE-RU-2019:0696-1 as SUSE-SLE-SERVER-12-SP3-2019-696 is not security or has no CVEs. patches: SUSE-2019-696,SUSE-SLE-DESKTOP-12-SP3-2019-696,SUSE-SLE-SERVER-12-SP3-2019-696 SKIP SUSE-RU-2019:0697-1 as SUSE-SLE-Module-Basesystem-15-2019-697 is not security or has no CVEs. patches: SUSE-2019-697,SUSE-SLE-Module-Basesystem-15-2019-697,SUSE-SLE-Module-Development-Tools-OBS-15-2019-697 SKIP SUSE-RU-2019:0698-1 as SUSE-SLE-Module-Basesystem-15-2019-698 is not security or has no CVEs. patches: SUSE-2019-698,SUSE-SLE-Module-Basesystem-15-2019-698 SKIP SUSE-RU-2019:0699-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-699 is not security or has no CVEs. patches: SUSE-2019-699,SUSE-SLE-Module-Basesystem-15-2019-699,SUSE-SLE-Module-Desktop-Applications-15-2019-699 SKIP SUSE-RU-2019:0700-1 as SUSE-SLE-Module-Server-Applications-15-2019-700 is not security or has no CVEs. patches: SUSE-2019-700,SUSE-SLE-Module-Basesystem-15-2019-700,SUSE-SLE-Module-Development-Tools-OBS-15-2019-700,SUSE-SLE-Module-Server-Applications-15-2019-700 SKIP SUSE-RU-2019:0701-1 as SUSE-Storage-4-2019-701 is not security or has no CVEs. patches: SUSE-2019-701,SUSE-OpenStack-Cloud-7-2019-701,SUSE-SLE-SAP-12-SP2-2019-701,SUSE-SLE-SERVER-12-SP2-2019-701,SUSE-SLE-SERVER-12-SP2-BCL-2019-701,SUSE-Storage-4-2019-701 SKIP SUSE-RU-2019:0702-1 as SUSE-SLE-Module-Basesystem-15-2019-702 is not security or has no CVEs. patches: SUSE-2019-702,SUSE-SLE-Module-Basesystem-15-2019-702 SKIP SUSE-RU-2019:0703-1 as SUSE-SLE-Product-WE-15-2019-703 is not security or has no CVEs. patches: SUSE-2019-703,SUSE-SLE-Module-Basesystem-15-2019-703,SUSE-SLE-Module-Desktop-Applications-15-2019-703,SUSE-SLE-Module-Development-Tools-OBS-15-2019-703,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-703,SUSE-SLE-Product-WE-15-2019-703 SKIP SUSE-RU-2019:0708-1 as SUSE-SLE-Module-Development-Tools-15-2019-708 is not security or has no CVEs. patches: SUSE-2019-708,SUSE-SLE-Module-Development-Tools-15-2019-708,SUSE-SLE-Module-Development-Tools-OBS-15-2019-708 SKIP SUSE-RU-2019:0713-1 as SUSE-SLE-Module-Development-Tools-15-2019-713 is not security or has no CVEs. patches: SUSE-2019-713,SUSE-SLE-Module-Basesystem-15-2019-713,SUSE-SLE-Module-Development-Tools-15-2019-713,SUSE-SLE-Module-Development-Tools-OBS-15-2019-713 SKIP SUSE-RU-2019:0714-1 as SUSE-Storage-4-2019-714 is not security or has no CVEs. patches: SUSE-2019-714,SUSE-OpenStack-Cloud-7-2019-714,SUSE-SLE-SAP-12-SP2-2019-714,SUSE-SLE-SERVER-12-SP2-2019-714,SUSE-Storage-4-2019-714 SKIP SUSE-RU-2019:0715-1 as SUSE-SLE-SERVER-12-SP3-2019-715 is not security or has no CVEs. patches: SUSE-2019-715,SUSE-SLE-SERVER-12-SP3-2019-715 SKIP SUSE-RU-2019:0717-1 as SUSE-SUSE-Manager-Server-3.2-2019-717 is not security or has no CVEs. patches: SUSE-2019-717,SUSE-SUSE-Manager-Proxy-3.2-2019-717,SUSE-SUSE-Manager-Server-3.2-2019-717 SKIP SUSE-RU-2019:0724-1 as SUSE-SLE-Module-Basesystem-15-2019-724 is not security or has no CVEs. patches: SUSE-2019-724,SUSE-SLE-Module-Basesystem-15-2019-724 SKIP SUSE-RU-2019:0729-1 as SUSE-SLE-Module-Server-Applications-15-2019-729 is not security or has no CVEs. patches: SUSE-2019-729,SUSE-SLE-Module-Server-Applications-15-2019-729 SKIP SUSE-RU-2019:0730-1 as SUSE-SLE-SERVER-12-SP4-2019-730 is not security or has no CVEs. patches: SUSE-2019-730,SUSE-SLE-DESKTOP-12-SP4-2019-730,SUSE-SLE-SDK-12-SP4-2019-730,SUSE-SLE-SERVER-12-SP4-2019-730 SKIP SUSE-RU-2019:0731-1 as SUSE-SLE-SERVER-12-SP3-2019-731 is not security or has no CVEs. patches: SUSE-2019-731,SUSE-SLE-SDK-12-SP3-2019-731,SUSE-SLE-SERVER-12-SP3-2019-731 SKIP SUSE-RU-2019:0733-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-733 is not security or has no CVEs. patches: SUSE-2019-733,SUSE-SLE-DESKTOP-12-SP4-2019-733,SUSE-SLE-DESKTOP-INSTALLER-12-SP4-2019-733,SUSE-SLE-SERVER-12-SP4-2019-733,SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-733 SKIP SUSE-RU-2019:0734-1 as SUSE-SLE-SERVER-12-SP4-2019-734 is not security or has no CVEs. patches: SUSE-2019-734,SUSE-SLE-DESKTOP-12-SP4-2019-734,SUSE-SLE-SAP-12-SP4-2019-734,SUSE-SLE-SERVER-12-SP4-2019-734 SKIP SUSE-RU-2019:0735-1 as SUSE-SLE-Module-Server-Applications-15-2019-735 is not security or has no CVEs. patches: SUSE-2019-735,SUSE-SLE-Module-Development-Tools-OBS-15-2019-735,SUSE-SLE-Module-Server-Applications-15-2019-735 SKIP SUSE-RU-2019:0737-1 as SUSE-SLE-SERVER-12-SP3-2019-737 is not security or has no CVEs. patches: SUSE-2019-737,SUSE-SLE-DESKTOP-12-SP3-2019-737,SUSE-SLE-SERVER-12-SP3-2019-737 SKIP SUSE-RU-2019:0749-1 as SUSE-SLE-Module-Basesystem-15-2019-749 is not security or has no CVEs. patches: SUSE-2019-749,SUSE-SLE-Module-Basesystem-15-2019-749,SUSE-SLE-Module-Development-Tools-OBS-15-2019-749 SKIP SUSE-RU-2019:0750-1 as SUSE-Storage-5-2019-750 is not security or has no CVEs. patches: SUSE-2019-750,SUSE-SLE-DESKTOP-12-SP3-2019-750,SUSE-SLE-DESKTOP-12-SP4-2019-750,SUSE-SLE-SDK-12-SP3-2019-750,SUSE-SLE-SDK-12-SP4-2019-750,SUSE-SLE-SERVER-12-SP3-2019-750,SUSE-SLE-SERVER-12-SP4-2019-750,SUSE-Storage-5-2019-750 SKIP SUSE-RU-2019:0779-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-779 is not security or has no CVEs. patches: SUSE-2019-779,SUSE-SLE-Module-Desktop-Applications-15-2019-779 SKIP SUSE-RU-2019:0780-1 as SUSE-SLE-Product-WE-15-2019-780 is not security or has no CVEs. patches: SUSE-2019-780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-780,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-780,SUSE-SLE-Product-WE-15-2019-780 SKIP SUSE-RU-2019:0782-1 as SUSE-SLE-Product-WE-15-2019-782 is not security or has no CVEs. patches: SUSE-2019-782,SUSE-SLE-Product-WE-15-2019-782 SKIP SUSE-RU-2019:0790-1 as SUSE-SLE-Module-Basesystem-15-2019-790 is not security or has no CVEs. patches: SUSE-2019-790,SUSE-SLE-Module-Basesystem-15-2019-790 SKIP SUSE-RU-2019:0791-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-791 is not security or has no CVEs. patches: SUSE-2019-791,SUSE-SLE-Module-Basesystem-15-2019-791,SUSE-SLE-Module-Desktop-Applications-15-2019-791,SUSE-SLE-Module-Development-Tools-OBS-15-2019-791 SKIP SUSE-RU-2019:0792-1 as SUSE-SLE-Module-Basesystem-15-2019-792 is not security or has no CVEs. patches: SUSE-2019-792,SUSE-SLE-Module-Basesystem-15-2019-792,SUSE-SLE-Module-Development-Tools-OBS-15-2019-792 SKIP SUSE-RU-2019:0794-1 as SUSE-SLE-SERVER-12-SP4-2019-794 is not security or has no CVEs. patches: SUSE-2019-794,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-794,SUSE-SLE-DESKTOP-12-SP3-2019-794,SUSE-SLE-DESKTOP-12-SP4-2019-794,SUSE-SLE-SDK-12-SP3-2019-794,SUSE-SLE-SDK-12-SP4-2019-794,SUSE-SLE-SERVER-12-SP3-2019-794,SUSE-SLE-SERVER-12-SP4-2019-794 SKIP SUSE-RU-2019:0794-2 as SUSE-Storage-4-2019-794 is not security or has no CVEs. patches: SUSE-2019-794,SUSE-OpenStack-Cloud-7-2019-794,SUSE-SLE-SAP-12-SP2-2019-794,SUSE-SLE-SERVER-12-SP2-2019-794,SUSE-SLE-SERVER-12-SP2-BCL-2019-794,SUSE-Storage-4-2019-794 SKIP SUSE-RU-2019:0796-1 as SUSE-SLE-SERVER-12-SP3-2019-796 is not security or has no CVEs. patches: SUSE-2019-796,SUSE-SLE-DESKTOP-12-SP3-2019-796,SUSE-SLE-SERVER-12-SP3-2019-796 SKIP SUSE-RU-2019:0797-1 as SUSE-SLE-SERVER-12-SP4-2019-797 is not security or has no CVEs. patches: SUSE-2019-797,SUSE-SLE-SDK-12-SP3-2019-797,SUSE-SLE-SDK-12-SP4-2019-797,SUSE-SLE-SERVER-12-SP3-2019-797,SUSE-SLE-SERVER-12-SP4-2019-797 SKIP SUSE-RU-2019:0798-1 as SUSE-SLE-SAP-INSTALLER-12-SP3-2019-798 is not security or has no CVEs. patches: SUSE-2019-798,SUSE-SLE-SAP-12-SP3-2019-798,SUSE-SLE-SAP-INSTALLER-12-SP3-2019-798 SKIP SUSE-RU-2019:0799-1 as SUSE-Storage-4-2019-799 is not security or has no CVEs. patches: SUSE-2019-799,SUSE-OpenStack-Cloud-7-2019-799,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-799,SUSE-SLE-DESKTOP-12-SP3-2019-799,SUSE-SLE-DESKTOP-12-SP4-2019-799,SUSE-SLE-SAP-12-SP1-2019-799,SUSE-SLE-SAP-12-SP2-2019-799,SUSE-SLE-SERVER-12-2019-799,SUSE-SLE-SERVER-12-SP1-2019-799,SUSE-SLE-SERVER-12-SP2-2019-799,SUSE-SLE-SERVER-12-SP2-BCL-2019-799,SUSE-SLE-SERVER-12-SP3-2019-799,SUSE-SLE-SERVER-12-SP4-2019-799,SUSE-Storage-4-2019-799 SKIP SUSE-RU-2019:0800-1 as SUSE-SLE-SERVER-12-SP4-2019-800 is not security or has no CVEs. patches: SUSE-2019-800,SUSE-SLE-DESKTOP-12-SP3-2019-800,SUSE-SLE-DESKTOP-12-SP4-2019-800,SUSE-SLE-SDK-12-SP3-2019-800,SUSE-SLE-SDK-12-SP4-2019-800,SUSE-SLE-SERVER-12-SP3-2019-800,SUSE-SLE-SERVER-12-SP4-2019-800 SKIP SUSE-RU-2019:0802-1 as SUSE-Storage-5-2019-802 is not security or has no CVEs. patches: SUSE-2019-802,SUSE-Storage-5-2019-802 SKIP SUSE-RU-2019:0810-1 as SUSE-SLE-SERVER-12-SP4-2019-810 is not security or has no CVEs. patches: SUSE-2019-810,SUSE-SLE-DESKTOP-12-SP4-2019-810,SUSE-SLE-SERVER-12-SP4-2019-810 SKIP SUSE-RU-2019:0811-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-811 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-811,SUSE-2019-811,SUSE-OpenStack-Cloud-8-2019-811,SUSE-OpenStack-Cloud-Crowbar-8-2019-811 SKIP SUSE-RU-2019:0812-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-812 is not security or has no CVEs. patches: SUSE-2019-812,SUSE-OpenStack-Cloud-8-2019-812,SUSE-OpenStack-Cloud-Crowbar-8-2019-812 SKIP SUSE-RU-2019:0816-1 as SUSE-SLE-SERVER-12-SP3-2019-816 is not security or has no CVEs. patches: SUSE-2019-816,SUSE-SLE-SERVER-12-SP3-2019-816 SKIP SUSE-RU-2019:0817-1 as SUSE-SLE-SERVER-12-SP3-2019-817 is not security or has no CVEs. patches: SUSE-2019-817,SUSE-SLE-SERVER-12-SP3-2019-817 SKIP SUSE-RU-2019:0819-1 as SUSE-SLE-Module-Server-Applications-15-2019-819 is not security or has no CVEs. patches: SUSE-2019-819,SUSE-SLE-Module-Basesystem-15-2019-819,SUSE-SLE-Module-Desktop-Applications-15-2019-819,SUSE-SLE-Module-Development-Tools-OBS-15-2019-819,SUSE-SLE-Module-Server-Applications-15-2019-819 SKIP SUSE-RU-2019:0820-1 as SUSE-SLE-SERVER-12-SP4-2019-820 is not security or has no CVEs. patches: SUSE-2019-820,SUSE-SLE-SERVER-12-SP4-2019-820 SKIP SUSE-RU-2019:0821-1 as SUSE-SLE-Module-Web-Scripting-15-2019-821 is not security or has no CVEs. patches: SUSE-2019-821,SUSE-SLE-Module-Development-Tools-OBS-15-2019-821,SUSE-SLE-Module-Web-Scripting-15-2019-821 SKIP SUSE-RU-2019:0822-1 as SUSE-SLE-SERVER-12-SP4-2019-822 is not security or has no CVEs. patches: SUSE-2019-822,SUSE-SLE-SERVER-12-SP3-2019-822,SUSE-SLE-SERVER-12-SP4-2019-822 SKIP SUSE-RU-2019:0836-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-836 is not security or has no CVEs. patches: SUSE-2019-836,SUSE-SLE-Module-Basesystem-15-2019-836,SUSE-SLE-Module-Desktop-Applications-15-2019-836,SUSE-SLE-Module-Development-Tools-OBS-15-2019-836 SKIP SUSE-RU-2019:0843-1 as SUSE-SLE-Product-WE-15-2019-843 is not security or has no CVEs. patches: SUSE-2019-843,SUSE-SLE-Product-WE-15-2019-843 SKIP SUSE-RU-2019:0847-1 as SUSE-SLE-SERVER-12-SP4-2019-847 is not security or has no CVEs. patches: SUSE-2019-847,SUSE-SLE-DESKTOP-12-SP3-2019-847,SUSE-SLE-DESKTOP-12-SP4-2019-847,SUSE-SLE-SDK-12-SP3-2019-847,SUSE-SLE-SDK-12-SP4-2019-847,SUSE-SLE-SERVER-12-SP3-2019-847,SUSE-SLE-SERVER-12-SP4-2019-847 SKIP SUSE-RU-2019:0848-1 as SUSE-SLE-SDK-12-SP4-2019-848 is not security or has no CVEs. patches: SUSE-2019-848,SUSE-SLE-HA-12-SP4-2019-848,SUSE-SLE-SDK-12-SP4-2019-848 SKIP SUSE-RU-2019:0849-1 as SUSE-SLE-Product-HA-15-2019-849 is not security or has no CVEs. patches: SUSE-2019-849,SUSE-SLE-Product-HA-15-2019-849 SKIP SUSE-RU-2019:0850-1 as SUSE-SLE-Module-Basesystem-15-2019-850 is not security or has no CVEs. patches: SUSE-2019-850,SUSE-SLE-Module-Basesystem-15-2019-850 SKIP SUSE-RU-2019:0851-1 as SUSE-Storage-4-2019-851 is not security or has no CVEs. patches: SUSE-2019-851,SUSE-OpenStack-Cloud-7-2019-851,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-851,SUSE-SLE-SAP-12-SP2-2019-851,SUSE-SLE-SERVER-12-SP2-2019-851,SUSE-SLE-SERVER-12-SP2-BCL-2019-851,SUSE-Storage-4-2019-851 SKIP SUSE-RU-2019:0858-1 as SUSE-SLE-Module-Basesystem-15-2019-858 is not security or has no CVEs. patches: SUSE-2019-858,SUSE-SLE-Module-Basesystem-15-2019-858 SKIP SUSE-RU-2019:0859-1 as SUSE-SLE-SERVER-12-SP3-2019-859 is not security or has no CVEs. patches: SUSE-2019-859,SUSE-SLE-DESKTOP-12-SP3-2019-859,SUSE-SLE-SERVER-12-SP3-2019-859 SKIP SUSE-RU-2019:0860-1 as SUSE-SLE-SERVER-12-SP4-2019-860 is not security or has no CVEs. patches: SUSE-2019-860,SUSE-SLE-Module-Public-Cloud-12-2019-860,SUSE-SLE-SERVER-12-SP3-2019-860,SUSE-SLE-SERVER-12-SP4-2019-860 SKIP SUSE-RU-2019:0862-1 as SUSE-SLE-Module-Basesystem-15-2019-862 is not security or has no CVEs. patches: SUSE-2019-862,SUSE-SLE-Module-Basesystem-15-2019-862 SKIP SUSE-RU-2019:0864-1 as SUSE-SLE-SERVER-12-SP4-2019-864 is not security or has no CVEs. patches: SUSE-2019-864,SUSE-SLE-DESKTOP-12-SP3-2019-864,SUSE-SLE-DESKTOP-12-SP4-2019-864,SUSE-SLE-SERVER-12-SP3-2019-864,SUSE-SLE-SERVER-12-SP4-2019-864 SKIP SUSE-RU-2019:0865-1 as SUSE-2019-865 is not security or has no CVEs. patches: SUSE-2019-865,SUSE-SLE-Module-Development-Tools-OBS-15-2019-865 SKIP SUSE-RU-2019:0866-1 as SUSE-SLE-Module-Server-Applications-15-2019-866 is not security or has no CVEs. patches: SUSE-2019-866,SUSE-SLE-Module-Basesystem-15-2019-866,SUSE-SLE-Module-Development-Tools-OBS-15-2019-866,SUSE-SLE-Module-Server-Applications-15-2019-866 SKIP SUSE-RU-2019:0867-1 as SUSE-SLE-SERVER-12-SP4-2019-867 is not security or has no CVEs. patches: SUSE-2019-867,SUSE-SLE-DESKTOP-12-SP4-2019-867,SUSE-SLE-SERVER-12-SP4-2019-867 SKIP SUSE-RU-2019:0868-1 as SUSE-SLE-HA-12-SP4-2019-868 is not security or has no CVEs. patches: SUSE-2019-868,SUSE-SLE-HA-12-SP4-2019-868 SKIP SUSE-RU-2019:0869-1 as SUSE-SLE-Module-Server-Applications-15-2019-869 is not security or has no CVEs. patches: SUSE-2019-869,SUSE-SLE-Module-Basesystem-15-2019-869,SUSE-SLE-Module-Server-Applications-15-2019-869 SKIP SUSE-RU-2019:0870-1 as SUSE-SLE-Module-Basesystem-15-2019-870 is not security or has no CVEs. patches: SUSE-2019-870,SUSE-SLE-Module-Basesystem-15-2019-870 SKIP SUSE-RU-2019:0874-1 as SUSE-SLE-SERVER-12-SP4-2019-874 is not security or has no CVEs. patches: SUSE-2019-874,SUSE-SLE-SERVER-12-SP4-2019-874 SKIP SUSE-RU-2019:0877-1 as SUSE-SUSE-Manager-Server-3.1-2019-877 is not security or has no CVEs. patches: SUSE-2019-877,SUSE-SUSE-Manager-Proxy-3.1-2019-877,SUSE-SUSE-Manager-Server-3.1-2019-877 ERROR: notice SUSE-RU-2019:0879-1 has no valid patches out of: SUSE-2019-879,SUSE-SLE-Manager-Tools-12-BETA-2019-879 ERROR: notice SUSE-RU-2019:0880-1 has no valid patches out of: SUSE-2019-880,SUSE-SLE-Manager-Tools-12-BETA-2019-880 ERROR: notice SUSE-RU-2019:0883-1 has no valid patches out of: SUSE-2019-883,SUSE-SLE-Manager-Tools-15-BETA-2019-883 SKIP SUSE-RU-2019:0885-1 as SUSE-SLE-Module-Server-Applications-15-2019-885 is not security or has no CVEs. patches: SUSE-2019-885,SUSE-SLE-Module-Development-Tools-OBS-15-2019-885,SUSE-SLE-Module-Server-Applications-15-2019-885 SKIP SUSE-RU-2019:0886-1 as SUSE-SLE-Module-Server-Applications-15-2019-886 is not security or has no CVEs. patches: SUSE-2019-886,SUSE-SLE-Module-Basesystem-15-2019-886,SUSE-SLE-Module-Development-Tools-OBS-15-2019-886,SUSE-SLE-Module-Server-Applications-15-2019-886 SKIP SUSE-RU-2019:0887-1 as SUSE-SLE-Module-Containers-15-2019-887 is not security or has no CVEs. patches: SUSE-2019-887,SUSE-SLE-Module-Containers-15-2019-887 SKIP SUSE-RU-2019:0893-1 as SUSE-Storage-4-2019-893 is not security or has no CVEs. patches: SUSE-2019-893,SUSE-OpenStack-Cloud-7-2019-893,SUSE-SLE-Module-Public-Cloud-12-2019-893,SUSE-SLE-SAP-12-SP2-2019-893,SUSE-SLE-SERVER-12-SP1-2019-893,SUSE-SLE-SERVER-12-SP2-2019-893,SUSE-SLE-SERVER-12-SP2-BCL-2019-893,SUSE-SLE-SERVER-12-SP3-2019-893,SUSE-SLE-SERVER-12-SP4-2019-893,SUSE-Storage-4-2019-893 SKIP SUSE-RU-2019:0893-2 as SUSE-SLE-SAP-12-SP1-2019-893 is not security or has no CVEs. patches: SUSE-2019-893,SUSE-SLE-SAP-12-SP1-2019-893 SKIP SUSE-RU-2019:0894-1 as SUSE-SLE-Module-Development-Tools-15-2019-894 is not security or has no CVEs. patches: SUSE-2019-894,SUSE-SLE-Module-Basesystem-15-2019-894,SUSE-SLE-Module-Development-Tools-15-2019-894 SKIP SUSE-RU-2019:0895-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-895 is not security or has no CVEs. patches: SUSE-2019-895,SUSE-SLE-Module-Desktop-Applications-15-2019-895,SUSE-SLE-Module-Development-Tools-OBS-15-2019-895 SKIP SUSE-RU-2019:0902-1 as SUSE-SLE-SERVER-12-SP4-2019-902 is not security or has no CVEs. patches: SUSE-2019-902,SUSE-SLE-DESKTOP-12-SP3-2019-902,SUSE-SLE-DESKTOP-12-SP4-2019-902,SUSE-SLE-SDK-12-SP3-2019-902,SUSE-SLE-SDK-12-SP4-2019-902,SUSE-SLE-SERVER-12-SP3-2019-902,SUSE-SLE-SERVER-12-SP4-2019-902 SKIP SUSE-RU-2019:0905-1 as SUSE-SLE-Module-Development-Tools-15-2019-905 is not security or has no CVEs. patches: SUSE-2019-905,SUSE-SLE-Module-Basesystem-15-2019-905,SUSE-SLE-Module-Development-Tools-15-2019-905,SUSE-SLE-Module-Development-Tools-OBS-15-2019-905 SKIP SUSE-RU-2019:0906-1 as SUSE-SLE-SDK-12-SP3-2019-906 is not security or has no CVEs. patches: SUSE-2019-906,SUSE-SLE-HA-12-SP3-2019-906,SUSE-SLE-SDK-12-SP3-2019-906 SKIP SUSE-RU-2019:0907-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-907 is not security or has no CVEs. patches: SUSE-2019-907,SUSE-SLE-DESKTOP-12-SP3-2019-907,SUSE-SLE-SERVER-12-SP3-2019-907,SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-907 SKIP SUSE-RU-2019:0908-1 as SUSE-SLE-SERVER-12-SP4-2019-908 is not security or has no CVEs. patches: SUSE-2019-908,SUSE-SLE-SERVER-12-SP3-2019-908,SUSE-SLE-SERVER-12-SP4-2019-908 SKIP SUSE-RU-2019:0909-1 as SUSE-SLE-Module-Basesystem-15-2019-909 is not security or has no CVEs. patches: SUSE-2019-909,SUSE-SLE-Module-Basesystem-15-2019-909 SKIP SUSE-RU-2019:0910-1 as SUSE-Storage-5-2019-910 is not security or has no CVEs. patches: SUSE-2019-910,SUSE-OpenStack-Cloud-7-2019-910,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-910,SUSE-SLE-DESKTOP-12-SP3-2019-910,SUSE-SLE-DESKTOP-12-SP4-2019-910,SUSE-SLE-SAP-12-SP1-2019-910,SUSE-SLE-SAP-12-SP2-2019-910,SUSE-SLE-SDK-12-SP3-2019-910,SUSE-SLE-SDK-12-SP4-2019-910,SUSE-SLE-SERVER-12-SP1-2019-910,SUSE-SLE-SERVER-12-SP2-2019-910,SUSE-SLE-SERVER-12-SP2-BCL-2019-910,SUSE-SLE-SERVER-12-SP3-2019-910,SUSE-SLE-SERVER-12-SP4-2019-910,SUSE-SLE-WE-12-SP3-2019-910,SUSE-SLE-WE-12-SP4-2019-910,SUSE-Storage-4-2019-910,SUSE-Storage-5-2019-910 SKIP SUSE-RU-2019:0911-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-911 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-911,SUSE-2019-911,SUSE-OpenStack-Cloud-8-2019-911,SUSE-OpenStack-Cloud-Crowbar-8-2019-911 SKIP SUSE-RU-2019:0923-1 as SUSE-SLE-Module-Server-Applications-15-2019-923 is not security or has no CVEs. patches: SUSE-2019-923,SUSE-SLE-Module-Basesystem-15-2019-923,SUSE-SLE-Module-Desktop-Applications-15-2019-923,SUSE-SLE-Module-Development-Tools-OBS-15-2019-923,SUSE-SLE-Module-Server-Applications-15-2019-923 SKIP SUSE-RU-2019:0924-1 as SUSE-SLE-Module-Basesystem-15-2019-924 is not security or has no CVEs. patches: SUSE-2019-924,SUSE-SLE-Module-Basesystem-15-2019-924,SUSE-SLE-Module-Development-Tools-OBS-15-2019-924 SKIP SUSE-RU-2019:0930-1 as SUSE-SLE-SERVER-12-SP4-2019-930 is not security or has no CVEs. patches: SUSE-2019-930,SUSE-SLE-SERVER-12-SP3-2019-930,SUSE-SLE-SERVER-12-SP4-2019-930 SKIP SUSE-RU-2019:0932-1 as SUSE-SLE-SERVER-12-SP4-2019-932 is not security or has no CVEs. patches: SUSE-2019-932,SUSE-SLE-DESKTOP-12-SP4-2019-932,SUSE-SLE-SDK-12-SP4-2019-932,SUSE-SLE-SERVER-12-SP4-2019-932 SKIP SUSE-RU-2019:0933-1 as SUSE-SLE-SERVER-12-SP4-2019-933 is not security or has no CVEs. patches: SUSE-2019-933,SUSE-SLE-DESKTOP-12-SP4-2019-933,SUSE-SLE-SERVER-12-SP4-2019-933 SKIP SUSE-RU-2019:0935-1 as SUSE-SLE-SDK-12-SP4-2019-935 is not security or has no CVEs. patches: SUSE-2019-935,SUSE-SLE-SDK-12-SP3-2019-935,SUSE-SLE-SDK-12-SP4-2019-935 SKIP SUSE-RU-2019:0937-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-937 is not security or has no CVEs. patches: SUSE-2019-937,SUSE-SLE-Module-Basesystem-15-2019-937,SUSE-SLE-Module-Desktop-Applications-15-2019-937 SKIP SUSE-RU-2019:0938-1 as SUSE-SLE-Module-Basesystem-15-2019-938 is not security or has no CVEs. patches: SUSE-2019-938,SUSE-SLE-INSTALLER-15-2019-938,SUSE-SLE-Module-Basesystem-15-2019-938,SUSE-SLE-Module-Development-Tools-OBS-15-2019-938 SKIP SUSE-RU-2019:0939-1 as SUSE-SLE-SERVER-12-SP4-2019-939 is not security or has no CVEs. patches: SUSE-2019-939,SUSE-SLE-DESKTOP-12-SP3-2019-939,SUSE-SLE-DESKTOP-12-SP4-2019-939,SUSE-SLE-SERVER-12-SP3-2019-939,SUSE-SLE-SERVER-12-SP4-2019-939 SKIP SUSE-RU-2019:0942-1 as SUSE-SLE-SERVER-12-SP4-2019-942 is not security or has no CVEs. patches: SUSE-2019-942,SUSE-SLE-SERVER-12-SP4-2019-942 SKIP SUSE-RU-2019:0943-1 as SUSE-Storage-4-2019-943 is not security or has no CVEs. patches: SUSE-2019-943,SUSE-OpenStack-Cloud-7-2019-943,SUSE-SLE-SAP-12-SP2-2019-943,SUSE-SLE-SERVER-12-SP2-2019-943,SUSE-SLE-SERVER-12-SP3-2019-943,SUSE-Storage-4-2019-943 SKIP SUSE-RU-2019:0945-1 as SUSE-SLE-SERVER-12-SP3-2019-945 is not security or has no CVEs. patches: SUSE-2019-945,SUSE-SLE-DESKTOP-12-SP3-2019-945,SUSE-SLE-SERVER-12-SP3-2019-945 SKIP SUSE-RU-2019:0946-1 as SUSE-Storage-5-2019-946 is not security or has no CVEs. patches: SUSE-2019-946,SUSE-Storage-5-2019-946 SKIP SUSE-RU-2019:0947-1 as SUSE-SLE-Product-HA-15-2019-947 is not security or has no CVEs. patches: SUSE-2019-947,SUSE-SLE-Product-HA-15-2019-947 SKIP SUSE-RU-2019:0963-1 as SUSE-SLE-SERVER-12-SP4-2019-963 is not security or has no CVEs. patches: SUSE-2019-963,SUSE-SLE-DESKTOP-12-SP4-2019-963,SUSE-SLE-SERVER-12-SP4-2019-963 SKIP SUSE-RU-2019:0964-1 as SUSE-SLE-SERVER-12-SP4-2019-964 is not security or has no CVEs. patches: SUSE-2019-964,SUSE-SLE-SDK-12-SP3-2019-964,SUSE-SLE-SDK-12-SP4-2019-964,SUSE-SLE-SERVER-12-SP3-2019-964,SUSE-SLE-SERVER-12-SP4-2019-964 SKIP SUSE-RU-2019:0964-2 as SUSE-SLE-SERVER-12-SP2-BCL-2019-964 is not security or has no CVEs. patches: SUSE-2019-964,SUSE-SLE-SERVER-12-SP2-2019-964,SUSE-SLE-SERVER-12-SP2-BCL-2019-964 SKIP SUSE-RU-2019:0965-1 as SUSE-SLE-SDK-12-SP4-2019-965 is not security or has no CVEs. patches: SUSE-2019-965,SUSE-SLE-SDK-12-SP3-2019-965,SUSE-SLE-SDK-12-SP4-2019-965 SKIP SUSE-RU-2019:0966-1 as SUSE-SLE-Module-Basesystem-15-2019-966 is not security or has no CVEs. patches: SUSE-2019-966,SUSE-SLE-Module-Basesystem-15-2019-966 SKIP SUSE-RU-2019:0967-1 as SUSE-SLE-Module-Server-Applications-15-2019-967 is not security or has no CVEs. patches: SUSE-2019-967,SUSE-SLE-Module-Server-Applications-15-2019-967 SKIP SUSE-RU-2019:0969-1 as SUSE-SLE-Module-Basesystem-15-2019-969 is not security or has no CVEs. patches: SUSE-2019-969,SUSE-SLE-Module-Basesystem-15-2019-969 SKIP SUSE-RU-2019:0970-1 as SUSE-SLE-Module-Development-Tools-15-2019-970 is not security or has no CVEs. patches: SUSE-2019-970,SUSE-SLE-Module-Development-Tools-15-2019-970,SUSE-SLE-Module-Development-Tools-OBS-15-2019-970 SKIP SUSE-RU-2019:0975-1 as SUSE-SLE-Module-Basesystem-15-2019-975 is not security or has no CVEs. patches: SUSE-2019-975,SUSE-SLE-Module-Basesystem-15-2019-975 SKIP SUSE-RU-2019:0976-1 as SUSE-SLE-SERVER-12-SP4-2019-976 is not security or has no CVEs. patches: SUSE-2019-976,SUSE-SLE-SERVER-12-SP4-2019-976 SKIP SUSE-RU-2019:0978-1 as SUSE-SLE-Module-Development-Tools-15-2019-978 is not security or has no CVEs. patches: SUSE-2019-978,SUSE-SLE-Module-Development-Tools-15-2019-978 SKIP SUSE-RU-2019:0979-1 as SUSE-SLE-SERVER-12-SP4-2019-979 is not security or has no CVEs. patches: SUSE-2019-979,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-979,SUSE-SLE-DESKTOP-12-SP3-2019-979,SUSE-SLE-DESKTOP-12-SP4-2019-979,SUSE-SLE-SDK-12-SP3-2019-979,SUSE-SLE-SDK-12-SP4-2019-979,SUSE-SLE-SERVER-12-SP3-2019-979,SUSE-SLE-SERVER-12-SP4-2019-979 SKIP SUSE-RU-2019:0980-1 as SUSE-SLE-SERVER-12-SP3-2019-980 is not security or has no CVEs. patches: SUSE-2019-980,SUSE-SLE-DESKTOP-12-SP3-2019-980,SUSE-SLE-SERVER-12-SP3-2019-980 SKIP SUSE-RU-2019:0982-1 as SUSE-SUSE-Manager-Server-3.2-2019-982 is not security or has no CVEs. patches: SUSE-2019-982,SUSE-OpenStack-Cloud-7-2019-982,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-982,SUSE-SLE-DESKTOP-12-SP3-2019-982,SUSE-SLE-DESKTOP-12-SP4-2019-982,SUSE-SLE-Module-Public-Cloud-12-2019-982,SUSE-SLE-SERVER-12-SP3-2019-982,SUSE-SLE-SERVER-12-SP4-2019-982,SUSE-SUSE-Manager-Proxy-3.0-2019-982,SUSE-SUSE-Manager-Proxy-3.1-2019-982,SUSE-SUSE-Manager-Proxy-3.2-2019-982,SUSE-SUSE-Manager-Server-3.0-2019-982,SUSE-SUSE-Manager-Server-3.1-2019-982,SUSE-SUSE-Manager-Server-3.2-2019-982 SKIP SUSE-RU-2019:0986-1 as SUSE-SLE-Module-SAP-Applications-15-2019-986 is not security or has no CVEs. patches: SUSE-2019-986,SUSE-SLE-Module-SAP-Applications-15-2019-986 SKIP SUSE-RU-2019:0987-1 as SUSE-SLE-Product-SLED-15-2019-987 is not security or has no CVEs. patches: SUSE-2019-987,SUSE-SLE-Module-Development-Tools-OBS-15-2019-987,SUSE-SLE-Product-SLED-15-2019-987 SKIP SUSE-RU-2019:0991-1 as SUSE-SLE-HA-12-2019-991 is not security or has no CVEs. patches: SUSE-2019-991,SUSE-SLE-HA-12-2019-991 ERROR: notice SUSE-RU-2019:0992-1 has no valid patches out of: SUSE-2019-992,SUSE-SLE-Module-Development-Tools-OBS-15-2019-992 SKIP SUSE-RU-2019:0993-1 as SUSE-2019-993 is not security or has no CVEs. patches: SUSE-2019-993,SUSE-SLE-Module-Development-Tools-OBS-15-2019-993 SKIP SUSE-RU-2019:0994-1 as SUSE-SLE-Product-HA-15-2019-994 is not security or has no CVEs. patches: SUSE-2019-994,SUSE-SLE-Product-HA-15-2019-994 SKIP SUSE-RU-2019:0995-1 as SUSE-SLE-SERVER-12-SP3-2019-995 is not security or has no CVEs. patches: SUSE-2019-995,SUSE-SLE-SERVER-12-SP3-2019-995 SKIP SUSE-RU-2019:0998-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-998 is not security or has no CVEs. patches: SUSE-2019-998,SUSE-SLE-Module-Basesystem-15-2019-998,SUSE-SLE-Module-Desktop-Applications-15-2019-998 SKIP SUSE-RU-2019:1002-1 as SUSE-SLE-Module-Development-Tools-15-2019-1002 is not security or has no CVEs. patches: SUSE-2019-1002,SUSE-SLE-Module-Basesystem-15-2019-1002,SUSE-SLE-Module-Development-Tools-15-2019-1002 SKIP SUSE-RU-2019:1003-1 as SUSE-Storage-5-2019-1003 is not security or has no CVEs. patches: SUSE-2019-1003,SUSE-Storage-5-2019-1003 SKIP SUSE-RU-2019:1005-1 as SUSE-SLE-SERVER-12-SP4-2019-1005 is not security or has no CVEs. patches: SUSE-2019-1005,SUSE-SLE-DESKTOP-12-SP4-2019-1005,SUSE-SLE-SDK-12-SP4-2019-1005,SUSE-SLE-SERVER-12-SP4-2019-1005 SKIP SUSE-RU-2019:1007-1 as SUSE-SUSE-Manager-Server-3.2-2019-1007 is not security or has no CVEs. patches: SUSE-2019-1007,SUSE-SUSE-Manager-Proxy-3.2-2019-1007,SUSE-SUSE-Manager-Server-3.2-2019-1007 SKIP SUSE-RU-2019:1008-1 as SUSE-SUSE-Manager-Server-3.2-2019-1008 is not security or has no CVEs. patches: SUSE-2019-1008,SUSE-SUSE-Manager-Server-3.2-2019-1008 SKIP SUSE-RU-2019:1009-1 as SUSE-SUSE-Manager-Server-3.2-2019-1009 is not security or has no CVEs. patches: SUSE-2019-1009,SUSE-SLE-Manager-Tools-12-2019-1009,SUSE-SLE-Module-Adv-Systems-Management-12-2019-1009,SUSE-SLE-POS-12-SP2-2019-1009,SUSE-SUSE-Manager-Proxy-3.0-2019-1009,SUSE-SUSE-Manager-Proxy-3.1-2019-1009,SUSE-SUSE-Manager-Proxy-3.2-2019-1009,SUSE-SUSE-Manager-Server-3.0-2019-1009,SUSE-SUSE-Manager-Server-3.1-2019-1009,SUSE-SUSE-Manager-Server-3.2-2019-1009 SKIP SUSE-RU-2019:1016-1 as SUSE-SLE-Manager-Tools-15-2019-1016 is not security or has no CVEs. patches: SUSE-2019-1016,SUSE-SLE-Manager-Tools-15-2019-1016,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1016 SKIP SUSE-RU-2019:1017-1 as SUSE-SLE-Module-Server-Applications-15-2019-1017 is not security or has no CVEs. patches: SUSE-2019-1017,SUSE-SLE-Module-Basesystem-15-2019-1017,SUSE-SLE-Module-Server-Applications-15-2019-1017 SKIP SUSE-RU-2019:1020-1 as SUSE-SLE-SERVER-12-SP4-2019-1020 is not security or has no CVEs. patches: SUSE-2019-1020,SUSE-SLE-DESKTOP-12-SP4-2019-1020,SUSE-SLE-SERVER-12-SP4-2019-1020 SKIP SUSE-RU-2019:1021-1 as SUSE-SLE-SERVER-12-SP4-2019-1021 is not security or has no CVEs. patches: SUSE-2019-1021,SUSE-SLE-DESKTOP-12-SP4-2019-1021,SUSE-SLE-SERVER-12-SP4-2019-1021 SKIP SUSE-RU-2019:1022-1 as SUSE-SLE-Manager-Tools-15-2019-1022 is not security or has no CVEs. patches: SUSE-2019-1022,SUSE-SLE-Manager-Tools-15-2019-1022 SKIP SUSE-RU-2019:1023-1 as SUSE-SLE-Product-WE-15-2019-1023 is not security or has no CVEs. patches: SUSE-2019-1023,SUSE-SLE-Module-Basesystem-15-2019-1023,SUSE-SLE-Module-Desktop-Applications-15-2019-1023,SUSE-SLE-Module-Development-Tools-15-2019-1023,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1023,SUSE-SLE-Product-WE-15-2019-1023 SKIP SUSE-RU-2019:1024-1 as SUSE-SLE-Product-WE-15-2019-1024 is not security or has no CVEs. patches: SUSE-2019-1024,SUSE-SLE-Module-Desktop-Applications-15-2019-1024,SUSE-SLE-Product-WE-15-2019-1024 SKIP SUSE-RU-2019:1025-1 as SUSE-SLE-Module-Basesystem-15-2019-1025 is not security or has no CVEs. patches: SUSE-2019-1025,SUSE-SLE-Module-Basesystem-15-2019-1025 SKIP SUSE-RU-2019:1026-1 as SUSE-SLE-SERVER-12-SP3-2019-1026 is not security or has no CVEs. patches: SUSE-2019-1026,SUSE-SLE-DESKTOP-12-SP3-2019-1026,SUSE-SLE-SERVER-12-SP3-2019-1026 SKIP SUSE-RU-2019:1028-1 as SUSE-Storage-4-2019-1028 is not security or has no CVEs. patches: SUSE-2019-1028,SUSE-OpenStack-Cloud-7-2019-1028,SUSE-SLE-SAP-12-SP2-2019-1028,SUSE-SLE-SERVER-12-SP2-2019-1028,SUSE-SLE-SERVER-12-SP2-BCL-2019-1028,SUSE-Storage-4-2019-1028 SKIP SUSE-RU-2019:1029-1 as SUSE-SLE-WE-12-SP4-2019-1029 is not security or has no CVEs. patches: SUSE-2019-1029,SUSE-SLE-DESKTOP-12-SP3-2019-1029,SUSE-SLE-DESKTOP-12-SP4-2019-1029,SUSE-SLE-SDK-12-SP3-2019-1029,SUSE-SLE-SDK-12-SP4-2019-1029,SUSE-SLE-SERVER-12-SP3-2019-1029,SUSE-SLE-SERVER-12-SP4-2019-1029,SUSE-SLE-WE-12-SP3-2019-1029,SUSE-SLE-WE-12-SP4-2019-1029 SKIP SUSE-RU-2019:1032-1 as SUSE-SLE-SERVER-12-SP3-2019-1032 is not security or has no CVEs. patches: SUSE-2019-1032,SUSE-SLE-DESKTOP-12-SP3-2019-1032,SUSE-SLE-SERVER-12-SP3-2019-1032 SKIP SUSE-RU-2019:1034-1 as SUSE-SLE-Module-Containers-15-2019-1034 is not security or has no CVEs. patches: SUSE-2019-1034,SUSE-SLE-Module-Containers-15-2019-1034,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1034 SKIP SUSE-RU-2019:1035-1 as SUSE-SLE-SAP-12-SP4-2019-1035 is not security or has no CVEs. patches: SUSE-2019-1035,SUSE-SLE-SAP-12-SP3-2019-1035,SUSE-SLE-SAP-12-SP4-2019-1035 ERROR: notice SUSE-RU-2019:1043-1 has no valid patches out of: SUSE-2019-1043,SUSE-SLE-Manager-Tools-12-BETA-2019-1043 SKIP SUSE-RU-2019:1044-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-1044 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1044,SUSE-2019-1044,SUSE-OpenStack-Cloud-8-2019-1044,SUSE-OpenStack-Cloud-Crowbar-8-2019-1044 ERROR: notice SUSE-RU-2019:1045-1 has no valid patches out of: SUSE-2019-1045,SUSE-SLE-Manager-Tools-15-BETA-2019-1045 SKIP SUSE-RU-2019:1046-1 as SUSE-SLE-SERVER-12-SP1-2019-1046 is not security or has no CVEs. patches: SUSE-2019-1046,SUSE-SLE-SAP-12-SP1-2019-1046,SUSE-SLE-SERVER-12-2019-1046,SUSE-SLE-SERVER-12-SP1-2019-1046 SKIP SUSE-RU-2019:1048-1 as SUSE-SLE-Module-Containers-12-2019-1048 is not security or has no CVEs. patches: SUSE-2019-1048,SUSE-OpenStack-Cloud-6-LTSS-2019-1048,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1048,SUSE-SLE-Module-Containers-12-2019-1048 ERROR: notice SUSE-RU-2019:1049-1 has no valid patches out of: SUSE-2019-1049,SUSE-SLE-Manager-Tools-12-BETA-2019-1049 SKIP SUSE-RU-2019:1050-1 as SUSE-SLE-Module-SAP-Applications-15-2019-1050 is not security or has no CVEs. patches: SUSE-2019-1050,SUSE-SLE-Module-SAP-Applications-15-2019-1050 ERROR: notice SUSE-RU-2019:1051-1 has no valid patches out of: SUSE-2019-1051,SUSE-SLE-Manager-Tools-15-BETA-2019-1051 SKIP SUSE-RU-2019:1053-1 as SUSE-SLE-SERVER-12-SP4-2019-1053 is not security or has no CVEs. patches: SUSE-2019-1053,SUSE-SLE-SDK-12-SP4-2019-1053,SUSE-SLE-SERVER-12-SP4-2019-1053 SKIP SUSE-RU-2019:1054-1 as SUSE-SLE-Module-Development-Tools-15-2019-1054 is not security or has no CVEs. patches: SUSE-2019-1054,SUSE-SLE-Module-Development-Tools-15-2019-1054,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1054 SKIP SUSE-RU-2019:1087-1 as SUSE-SUSE-Manager-Server-3.0-2019-1087 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1087,SUSE-2019-1087,SUSE-OpenStack-Cloud-8-2019-1087,SUSE-SLE-Manager-Tools-12-2019-1087,SUSE-SUSE-Manager-Server-3.0-2019-1087 SKIP SUSE-RU-2019:1089-1 as SUSE-SLE-SAP-12-SP2-2019-1089 is not security or has no CVEs. patches: SUSE-2019-1089,SUSE-SLE-SAP-12-SP2-2019-1089 SKIP SUSE-RU-2019:1092-1 as SUSE-SLE-Product-HA-15-2019-1092 is not security or has no CVEs. patches: SUSE-2019-1092,SUSE-SLE-Product-HA-15-2019-1092 SKIP SUSE-RU-2019:1095-1 as SUSE-SLE-POS-12-SP2-2019-1095 is not security or has no CVEs. patches: SUSE-2019-1095,SUSE-SLE-POS-12-SP2-2019-1095 SKIP SUSE-RU-2019:1096-1 as SUSE-SUSE-Manager-Retail-3.1-2019-1096 is not security or has no CVEs. patches: SUSE-2019-1096,SUSE-SUSE-Manager-Retail-3.1-2019-1096 SKIP SUSE-RU-2019:1097-1 as SUSE-SLE-HA-12-SP4-2019-1097 is not security or has no CVEs. patches: SUSE-2019-1097,SUSE-SLE-HA-12-SP4-2019-1097 SKIP SUSE-RU-2019:1098-1 as SUSE-SLE-SERVER-12-SP4-2019-1098 is not security or has no CVEs. patches: SUSE-2019-1098,SUSE-SLE-SDK-12-SP4-2019-1098,SUSE-SLE-SERVER-12-SP4-2019-1098 SKIP SUSE-RU-2019:1099-1 as SUSE-SLE-Product-WE-15-2019-1099 is not security or has no CVEs. patches: SUSE-2019-1099,SUSE-SLE-Module-Desktop-Applications-15-2019-1099,SUSE-SLE-Product-WE-15-2019-1099 SKIP SUSE-RU-2019:1100-1 as SUSE-SLE-SERVER-12-SP4-2019-1100 is not security or has no CVEs. patches: SUSE-2019-1100,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1100,SUSE-SLE-DESKTOP-12-SP3-2019-1100,SUSE-SLE-DESKTOP-12-SP4-2019-1100,SUSE-SLE-SDK-12-SP3-2019-1100,SUSE-SLE-SDK-12-SP4-2019-1100,SUSE-SLE-SERVER-12-SP3-2019-1100,SUSE-SLE-SERVER-12-SP4-2019-1100 SKIP SUSE-RU-2019:1104-1 as SUSE-Storage-4-2019-1104 is not security or has no CVEs. patches: SUSE-2019-1104,SUSE-OpenStack-Cloud-7-2019-1104,SUSE-SLE-DESKTOP-12-SP3-2019-1104,SUSE-SLE-DESKTOP-12-SP4-2019-1104,SUSE-SLE-SAP-12-SP1-2019-1104,SUSE-SLE-SAP-12-SP2-2019-1104,SUSE-SLE-SDK-12-SP3-2019-1104,SUSE-SLE-SDK-12-SP4-2019-1104,SUSE-SLE-SERVER-12-2019-1104,SUSE-SLE-SERVER-12-SP1-2019-1104,SUSE-SLE-SERVER-12-SP2-2019-1104,SUSE-SLE-SERVER-12-SP2-BCL-2019-1104,SUSE-SLE-SERVER-12-SP3-2019-1104,SUSE-SLE-SERVER-12-SP4-2019-1104,SUSE-SLE-WE-12-SP3-2019-1104,SUSE-SLE-WE-12-SP4-2019-1104,SUSE-Storage-4-2019-1104 SKIP SUSE-RU-2019:1105-1 as SUSE-SLE-Module-Development-Tools-15-2019-1105 is not security or has no CVEs. patches: SUSE-2019-1105,SUSE-SLE-Module-Basesystem-15-2019-1105,SUSE-SLE-Module-Development-Tools-15-2019-1105,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1105 SKIP SUSE-RU-2019:1106-1 as SUSE-SLE-SERVER-12-2019-1106 is not security or has no CVEs. patches: SUSE-2019-1106,SUSE-SLE-SERVER-12-2019-1106 SKIP SUSE-RU-2019:1112-1 as SUSE-SLE-SERVER-12-SP4-2019-1112 is not security or has no CVEs. patches: SUSE-2019-1112,SUSE-SLE-DESKTOP-12-SP3-2019-1112,SUSE-SLE-DESKTOP-12-SP4-2019-1112,SUSE-SLE-SERVER-12-SP3-2019-1112,SUSE-SLE-SERVER-12-SP4-2019-1112 SKIP SUSE-RU-2019:1114-1 as SUSE-SLE-Module-Basesystem-15-2019-1114 is not security or has no CVEs. patches: SUSE-2019-1114,SUSE-SLE-Module-Basesystem-15-2019-1114 SKIP SUSE-RU-2019:1115-1 as SUSE-SLE-SERVER-12-SP4-2019-1115 is not security or has no CVEs. patches: SUSE-2019-1115,SUSE-SLE-DESKTOP-12-SP4-2019-1115,SUSE-SLE-SERVER-12-SP4-2019-1115 SKIP SUSE-RU-2019:1116-1 as SUSE-SLE-Product-WE-15-2019-1116 is not security or has no CVEs. patches: SUSE-2019-1116,SUSE-SLE-Module-Desktop-Applications-15-2019-1116,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1116,SUSE-SLE-Product-WE-15-2019-1116 SKIP SUSE-RU-2019:1117-1 as SUSE-SLE-SERVER-12-SP1-2019-1117 is not security or has no CVEs. patches: SUSE-2019-1117,SUSE-SLE-SAP-12-SP1-2019-1117,SUSE-SLE-SERVER-12-SP1-2019-1117 SKIP SUSE-RU-2019:11187-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-11187 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-11187,SUSE-OpenStack-Cloud-8-2019-11187,SUSE-OpenStack-Cloud-Crowbar-8-2019-11187 SKIP SUSE-RU-2019:1120-1 as SUSE-SLE-Module-Public-Cloud-12-2019-1120 is not security or has no CVEs. patches: SUSE-2019-1120,SUSE-SLE-Module-Public-Cloud-12-2019-1120 SKIP SUSE-RU-2019:1125-1 as SUSE-Storage-4-2019-1125 is not security or has no CVEs. patches: SUSE-2019-1125,SUSE-OpenStack-Cloud-7-2019-1125,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1125,SUSE-SLE-DESKTOP-12-SP3-2019-1125,SUSE-SLE-SAP-12-SP2-2019-1125,SUSE-SLE-SDK-12-SP3-2019-1125,SUSE-SLE-SERVER-12-SP2-2019-1125,SUSE-SLE-SERVER-12-SP2-BCL-2019-1125,SUSE-SLE-SERVER-12-SP3-2019-1125,SUSE-Storage-4-2019-1125 SKIP SUSE-RU-2019:1126-1 as SUSE-SLE-Module-Basesystem-15-2019-1126 is not security or has no CVEs. patches: SUSE-2019-1126,SUSE-SLE-Module-Basesystem-15-2019-1126 SKIP SUSE-RU-2019:1128-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1128 is not security or has no CVEs. patches: SUSE-2019-1128,SUSE-SLE-Module-Basesystem-15-2019-1128,SUSE-SLE-Module-Desktop-Applications-15-2019-1128 SKIP SUSE-RU-2019:1129-1 as SUSE-2019-1129 is not security or has no CVEs. patches: SUSE-2019-1129,SUSE-SLE-Module-Public-Cloud-12-2019-1129 SKIP SUSE-RU-2019:1130-1 as SUSE-2019-1130 is not security or has no CVEs. patches: SUSE-2019-1130,SUSE-SLE-Module-Public-Cloud-15-2019-1130 SKIP SUSE-RU-2019:1131-1 as SUSE-SLE-SERVER-12-SP4-2019-1131 is not security or has no CVEs. patches: SUSE-2019-1131,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1131,SUSE-SLE-DESKTOP-12-SP3-2019-1131,SUSE-SLE-DESKTOP-12-SP4-2019-1131,SUSE-SLE-SDK-12-SP3-2019-1131,SUSE-SLE-SDK-12-SP4-2019-1131,SUSE-SLE-SERVER-12-SP3-2019-1131,SUSE-SLE-SERVER-12-SP4-2019-1131 SKIP SUSE-RU-2019:1132-1 as SUSE-Storage-5-2019-1132 is not security or has no CVEs. patches: SUSE-2019-1132,SUSE-SLE-DESKTOP-12-SP3-2019-1132,SUSE-SLE-DESKTOP-12-SP4-2019-1132,SUSE-SLE-SDK-12-SP3-2019-1132,SUSE-SLE-SDK-12-SP4-2019-1132,SUSE-SLE-SERVER-12-SP3-2019-1132,SUSE-SLE-SERVER-12-SP4-2019-1132,SUSE-Storage-5-2019-1132 SKIP SUSE-RU-2019:1133-1 as SUSE-SLE-SERVER-12-SP4-2019-1133 is not security or has no CVEs. patches: SUSE-2019-1133,SUSE-SLE-DESKTOP-12-SP3-2019-1133,SUSE-SLE-DESKTOP-12-SP4-2019-1133,SUSE-SLE-SERVER-12-SP3-2019-1133,SUSE-SLE-SERVER-12-SP4-2019-1133 SKIP SUSE-RU-2019:1134-1 as SUSE-SLE-Module-Basesystem-15-2019-1134 is not security or has no CVEs. patches: SUSE-2019-1134,SUSE-SLE-Module-Basesystem-15-2019-1134 SKIP SUSE-RU-2019:1135-1 as SUSE-2019-1135 is not security or has no CVEs. patches: SUSE-2019-1135,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1135 SKIP SUSE-RU-2019:1138-1 as SUSE-SLE-SERVER-12-SP4-2019-1138 is not security or has no CVEs. patches: SUSE-2019-1138,SUSE-SLE-DESKTOP-12-SP4-2019-1138,SUSE-SLE-SAP-12-SP4-2019-1138,SUSE-SLE-SERVER-12-SP4-2019-1138 SKIP SUSE-RU-2019:1140-1 as SUSE-SLE-SERVER-12-SP4-2019-1140 is not security or has no CVEs. patches: SUSE-2019-1140,SUSE-SLE-SERVER-12-SP3-2019-1140,SUSE-SLE-SERVER-12-SP4-2019-1140 SKIP SUSE-RU-2019:1142-1 as SUSE-SLE-HA-12-SP3-2019-1142 is not security or has no CVEs. patches: SUSE-2019-1142,SUSE-SLE-HA-12-SP1-2019-1142,SUSE-SLE-HA-12-SP2-2019-1142,SUSE-SLE-HA-12-SP3-2019-1142 SKIP SUSE-RU-2019:1143-1 as SUSE-SLE-SERVER-12-SP3-2019-1143 is not security or has no CVEs. patches: SUSE-2019-1143,SUSE-SLE-DESKTOP-12-SP3-2019-1143,SUSE-SLE-SDK-12-SP3-2019-1143,SUSE-SLE-SERVER-12-SP3-2019-1143 SKIP SUSE-RU-2019:1144-1 as SUSE-SLE-Product-HA-15-2019-1144 is not security or has no CVEs. patches: SUSE-2019-1144,SUSE-SLE-Product-HA-15-2019-1144 SKIP SUSE-RU-2019:1145-1 as SUSE-SLE-Module-Public-Cloud-15-2019-1145 is not security or has no CVEs. patches: SUSE-2019-1145,SUSE-SLE-Module-Public-Cloud-15-2019-1145 SKIP SUSE-RU-2019:1146-1 as SUSE-SLE-Module-Public-Cloud-12-2019-1146 is not security or has no CVEs. patches: SUSE-2019-1146,SUSE-SLE-Module-Public-Cloud-12-2019-1146 SKIP SUSE-RU-2019:1147-1 as SUSE-SLE-Module-Public-Cloud-15-2019-1147 is not security or has no CVEs. patches: SUSE-2019-1147,SUSE-SLE-Module-Public-Cloud-15-2019-1147 SKIP SUSE-RU-2019:1148-1 as SUSE-SLE-Module-Basesystem-15-2019-1148 is not security or has no CVEs. patches: SUSE-2019-1148,SUSE-SLE-Module-Basesystem-15-2019-1148 SKIP SUSE-RU-2019:1150-1 as SUSE-2019-1150 is not security or has no CVEs. patches: SUSE-2019-1150,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1150 SKIP SUSE-RU-2019:1151-1 as SUSE-2019-1151 is not security or has no CVEs. patches: SUSE-2019-1151,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1151 SKIP SUSE-RU-2019:1152-1 as SUSE-2019-1152 is not security or has no CVEs. patches: SUSE-2019-1152,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1152 SKIP SUSE-RU-2019:1153-1 as SUSE-SLE-SERVER-12-SP4-2019-1153 is not security or has no CVEs. patches: SUSE-2019-1153,SUSE-SLE-DESKTOP-12-SP4-2019-1153,SUSE-SLE-SDK-12-SP4-2019-1153,SUSE-SLE-SERVER-12-SP4-2019-1153 SKIP SUSE-RU-2019:1154-1 as SUSE-SLE-Module-Basesystem-15-2019-1154 is not security or has no CVEs. patches: SUSE-2019-1154,SUSE-SLE-Module-Basesystem-15-2019-1154 SKIP SUSE-RU-2019:1158-1 as SUSE-SLE-SERVER-12-SP4-2019-1158 is not security or has no CVEs. patches: SUSE-2019-1158,SUSE-SLE-DESKTOP-12-SP3-2019-1158,SUSE-SLE-DESKTOP-12-SP4-2019-1158,SUSE-SLE-SERVER-12-SP3-2019-1158,SUSE-SLE-SERVER-12-SP4-2019-1158 SKIP SUSE-RU-2019:1160-1 as SUSE-SLE-Module-Basesystem-15-2019-1160 is not security or has no CVEs. patches: SUSE-2019-1160,SUSE-SLE-Module-Basesystem-15-2019-1160 SKIP SUSE-RU-2019:1163-1 as SUSE-SLE-Product-HA-15-2019-1163 is not security or has no CVEs. patches: SUSE-2019-1163,SUSE-SLE-Product-HA-15-2019-1163 SKIP SUSE-RU-2019:1164-1 as SUSE-SLE-SERVER-12-SP4-2019-1164 is not security or has no CVEs. patches: SUSE-2019-1164,SUSE-SLE-DESKTOP-12-SP3-2019-1164,SUSE-SLE-DESKTOP-12-SP4-2019-1164,SUSE-SLE-SERVER-12-SP3-2019-1164,SUSE-SLE-SERVER-12-SP4-2019-1164 SKIP SUSE-RU-2019:1165-1 as SUSE-SLE-SERVER-12-SP4-2019-1165 is not security or has no CVEs. patches: SUSE-2019-1165,SUSE-SLE-DESKTOP-12-SP4-2019-1165,SUSE-SLE-SERVER-12-SP4-2019-1165 SKIP SUSE-RU-2019:1167-1 as SUSE-SLE-SERVER-12-2019-1167 is not security or has no CVEs. patches: SUSE-2019-1167,SUSE-SLE-SERVER-12-2019-1167 SKIP SUSE-RU-2019:1168-1 as SUSE-Storage-4-2019-1168 is not security or has no CVEs. patches: SUSE-2019-1168,SUSE-OpenStack-Cloud-7-2019-1168,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1168,SUSE-SLE-SAP-12-SP2-2019-1168,SUSE-SLE-SERVER-12-SP2-2019-1168,SUSE-SLE-SERVER-12-SP2-BCL-2019-1168,SUSE-Storage-4-2019-1168 SKIP SUSE-RU-2019:1169-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1169 is not security or has no CVEs. patches: SUSE-2019-1169,SUSE-SLE-Module-Desktop-Applications-15-2019-1169,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1169 SKIP SUSE-RU-2019:1170-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1170 is not security or has no CVEs. patches: SUSE-2019-1170,SUSE-SLE-DESKTOP-12-SP3-2019-1170,SUSE-SLE-SDK-12-SP3-2019-1170,SUSE-SLE-SERVER-12-SP3-2019-1170,SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1170 SKIP SUSE-RU-2019:1171-1 as SUSE-SLE-Module-Containers-12-2019-1171 is not security or has no CVEs. patches: SUSE-2019-1171,SUSE-SLE-Module-Containers-12-2019-1171 SKIP SUSE-RU-2019:1173-1 as SUSE-SLE-Module-Basesystem-15-2019-1173 is not security or has no CVEs. patches: SUSE-2019-1173,SUSE-SLE-Module-Basesystem-15-2019-1173,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1173 SKIP SUSE-RU-2019:1174-1 as SUSE-SLE-SERVER-12-SP4-2019-1174 is not security or has no CVEs. patches: SUSE-2019-1174,SUSE-SLE-DESKTOP-12-SP3-2019-1174,SUSE-SLE-DESKTOP-12-SP4-2019-1174,SUSE-SLE-SERVER-12-SP3-2019-1174,SUSE-SLE-SERVER-12-SP4-2019-1174 SKIP SUSE-RU-2019:1176-1 as SUSE-SLE-Module-Development-Tools-15-2019-1176 is not security or has no CVEs. patches: SUSE-2019-1176,SUSE-SLE-Module-Development-Tools-15-2019-1176 SKIP SUSE-RU-2019:1177-1 as SUSE-SLE-Module-Basesystem-15-2019-1177 is not security or has no CVEs. patches: SUSE-2019-1177,SUSE-SLE-Module-Basesystem-15-2019-1177 SKIP SUSE-RU-2019:1178-1 as SUSE-Storage-4-2019-1178 is not security or has no CVEs. patches: SUSE-2019-1178,SUSE-OpenStack-Cloud-7-2019-1178,SUSE-SLE-DESKTOP-12-SP3-2019-1178,SUSE-SLE-DESKTOP-12-SP4-2019-1178,SUSE-SLE-SAP-12-SP1-2019-1178,SUSE-SLE-SAP-12-SP2-2019-1178,SUSE-SLE-SDK-12-SP3-2019-1178,SUSE-SLE-SDK-12-SP4-2019-1178,SUSE-SLE-SERVER-12-2019-1178,SUSE-SLE-SERVER-12-SP1-2019-1178,SUSE-SLE-SERVER-12-SP2-2019-1178,SUSE-SLE-SERVER-12-SP2-BCL-2019-1178,SUSE-SLE-SERVER-12-SP3-2019-1178,SUSE-SLE-SERVER-12-SP4-2019-1178,SUSE-Storage-4-2019-1178 SKIP SUSE-RU-2019:1188-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1188 is not security or has no CVEs. patches: SUSE-2019-1188,SUSE-SLE-Module-Desktop-Applications-15-2019-1188,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1188 SKIP SUSE-RU-2019:1189-1 as SUSE-SLE-HA-12-SP4-2019-1189 is not security or has no CVEs. patches: SUSE-2019-1189,SUSE-SLE-HA-12-SP4-2019-1189 SKIP SUSE-RU-2019:1190-1 as SUSE-Storage-4-2019-1190 is not security or has no CVEs. patches: SUSE-2019-1190,SUSE-OpenStack-Cloud-7-2019-1190,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1190,SUSE-SLE-SAP-12-SP2-2019-1190,SUSE-SLE-SERVER-12-SP2-2019-1190,SUSE-SLE-SERVER-12-SP2-BCL-2019-1190,SUSE-Storage-4-2019-1190 SKIP SUSE-RU-2019:1191-1 as SUSE-SLE-SERVER-12-SP4-2019-1191 is not security or has no CVEs. patches: SUSE-2019-1191,SUSE-SLE-DESKTOP-12-SP4-2019-1191,SUSE-SLE-SERVER-12-SP4-2019-1191 SKIP SUSE-RU-2019:1192-1 as SUSE-SLE-SERVER-12-SP4-2019-1192 is not security or has no CVEs. patches: SUSE-2019-1192,SUSE-SLE-DESKTOP-12-SP3-2019-1192,SUSE-SLE-DESKTOP-12-SP4-2019-1192,SUSE-SLE-SERVER-12-SP3-2019-1192,SUSE-SLE-SERVER-12-SP4-2019-1192 SKIP SUSE-RU-2019:1197-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-1197 is not security or has no CVEs. patches: SUSE-2019-1197,SUSE-OpenStack-Cloud-Crowbar-8-2019-1197 SKIP SUSE-RU-2019:1198-1 as SUSE-SLE-SAP-12-SP1-2019-1198 is not security or has no CVEs. patches: SUSE-2019-1198,SUSE-SLE-SAP-12-SP1-2019-1198 SKIP SUSE-RU-2019:1199-1 as SUSE-SLE-Module-Server-Applications-15-2019-1199 is not security or has no CVEs. patches: SUSE-2019-1199,SUSE-SLE-Module-Server-Applications-15-2019-1199 SKIP SUSE-RU-2019:1199-2 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1199 is not security or has no CVEs. patches: SUSE-2019-1199,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1199 SKIP SUSE-RU-2019:1200-1 as SUSE-SLE-SERVER-12-SP3-2019-1200 is not security or has no CVEs. patches: SUSE-2019-1200,SUSE-SLE-SERVER-12-SP3-2019-1200 SKIP SUSE-RU-2019:1201-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-1201 is not security or has no CVEs. patches: SUSE-2019-1201,SUSE-OpenStack-Cloud-Crowbar-9-2019-1201 SKIP SUSE-RU-2019:1202-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1202 is not security or has no CVEs. patches: SUSE-2019-1202,SUSE-SLE-DESKTOP-12-SP3-2019-1202,SUSE-SLE-DESKTOP-INSTALLER-12-SP3-2019-1202,SUSE-SLE-SAP-INSTALLER-12-SP3-2019-1202,SUSE-SLE-SERVER-12-SP3-2019-1202,SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1202 SKIP SUSE-RU-2019:1222-1 as SUSE-SLE-Module-Basesystem-15-2019-1222 is not security or has no CVEs. patches: SUSE-2019-1222,SUSE-SLE-Module-Basesystem-15-2019-1222 SKIP SUSE-RU-2019:1223-1 as SUSE-SLE-SERVER-12-SP1-2019-1223 is not security or has no CVEs. patches: SUSE-2019-1223,SUSE-SLE-SAP-12-SP1-2019-1223,SUSE-SLE-SERVER-12-SP1-2019-1223 SKIP SUSE-RU-2019:1224-1 as SUSE-SLE-SERVER-12-SP4-2019-1224 is not security or has no CVEs. patches: SUSE-2019-1224,SUSE-SLE-DESKTOP-12-SP4-2019-1224,SUSE-SLE-SERVER-12-SP4-2019-1224 SKIP SUSE-RU-2019:1225-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-1225 is not security or has no CVEs. patches: SUSE-2019-1225,SUSE-OpenStack-Cloud-9-2019-1225,SUSE-OpenStack-Cloud-Crowbar-9-2019-1225 SKIP SUSE-RU-2019:1226-1 as SUSE-SLE-Module-Basesystem-15-2019-1226 is not security or has no CVEs. patches: SUSE-2019-1226,SUSE-SLE-Module-Basesystem-15-2019-1226 SKIP SUSE-RU-2019:1227-1 as SUSE-SLE-SERVER-12-SP4-2019-1227 is not security or has no CVEs. patches: SUSE-2019-1227,SUSE-SLE-DESKTOP-12-SP4-2019-1227,SUSE-SLE-SERVER-12-SP4-2019-1227 SKIP SUSE-RU-2019:1228-1 as SUSE-Storage-5-2019-1228 is not security or has no CVEs. patches: SUSE-2019-1228,SUSE-Storage-5-2019-1228 SKIP SUSE-RU-2019:1229-1 as SUSE-SLE-Module-Basesystem-15-2019-1229 is not security or has no CVEs. patches: SUSE-2019-1229,SUSE-SLE-Module-Basesystem-15-2019-1229 SKIP SUSE-RU-2019:1229-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1229 is not security or has no CVEs. patches: SUSE-2019-1229,SUSE-SLE-Module-Basesystem-15-SP1-2019-1229,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1229 SKIP SUSE-RU-2019:1230-1 as SUSE-SLE-SERVER-12-SP4-2019-1230 is not security or has no CVEs. patches: SUSE-2019-1230,SUSE-SLE-DESKTOP-12-SP3-2019-1230,SUSE-SLE-DESKTOP-12-SP4-2019-1230,SUSE-SLE-SDK-12-SP3-2019-1230,SUSE-SLE-SDK-12-SP4-2019-1230,SUSE-SLE-SERVER-12-SP3-2019-1230,SUSE-SLE-SERVER-12-SP4-2019-1230 SKIP SUSE-RU-2019:1231-1 as SUSE-SLE-SERVER-12-SP1-2019-1231 is not security or has no CVEs. patches: SUSE-2019-1231,SUSE-SLE-SAP-12-SP1-2019-1231,SUSE-SLE-SERVER-12-SP1-2019-1231 SKIP SUSE-RU-2019:1258-1 as SUSE-SLE-Module-Server-Applications-15-2019-1258 is not security or has no CVEs. patches: SUSE-2019-1258,SUSE-SLE-Module-Basesystem-15-2019-1258,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1258,SUSE-SLE-Module-Server-Applications-15-2019-1258 SKIP SUSE-RU-2019:1258-2 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1258 is not security or has no CVEs. patches: SUSE-2019-1258,SUSE-SLE-Module-Basesystem-15-SP1-2019-1258,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1258,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1258 SKIP SUSE-RU-2019:1259-1 as SUSE-SLE-SERVER-12-SP4-2019-1259 is not security or has no CVEs. patches: SUSE-2019-1259,SUSE-SLE-DESKTOP-12-SP3-2019-1259,SUSE-SLE-DESKTOP-12-SP4-2019-1259,SUSE-SLE-SERVER-12-SP3-2019-1259,SUSE-SLE-SERVER-12-SP4-2019-1259 SKIP SUSE-RU-2019:1260-1 as SUSE-SLE-Module-Basesystem-15-2019-1260 is not security or has no CVEs. patches: SUSE-2019-1260,SUSE-SLE-Module-Basesystem-15-2019-1260 SKIP SUSE-RU-2019:1261-1 as SUSE-SLE-Module-Basesystem-15-2019-1261 is not security or has no CVEs. patches: SUSE-2019-1261,SUSE-SLE-Module-Basesystem-15-2019-1261 SKIP SUSE-RU-2019:1273-1 as SUSE-SLE-SAP-12-2019-1273 is not security or has no CVEs. patches: SUSE-2019-1273,SUSE-SLE-SAP-12-2019-1273 SKIP SUSE-RU-2019:1274-1 as SUSE-SLE-Module-Development-Tools-15-2019-1274 is not security or has no CVEs. patches: SUSE-2019-1274,SUSE-SLE-Module-Development-Tools-15-2019-1274 SKIP SUSE-RU-2019:1274-2 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1274 is not security or has no CVEs. patches: SUSE-2019-1274,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1274 SKIP SUSE-RU-2019:1275-1 as SUSE-SLE-Module-Basesystem-15-2019-1275 is not security or has no CVEs. patches: SUSE-2019-1275,SUSE-SLE-Module-Basesystem-15-2019-1275,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1275 SKIP SUSE-RU-2019:1277-1 as SUSE-SLE-SERVER-12-SP4-2019-1277 is not security or has no CVEs. patches: SUSE-2019-1277,SUSE-SLE-DESKTOP-12-SP4-2019-1277,SUSE-SLE-SERVER-12-SP4-2019-1277 SKIP SUSE-RU-2019:1278-1 as SUSE-SLE-SERVER-12-SP4-2019-1278 is not security or has no CVEs. patches: SUSE-2019-1278,SUSE-SLE-DESKTOP-12-SP3-2019-1278,SUSE-SLE-DESKTOP-12-SP4-2019-1278,SUSE-SLE-SERVER-12-SP3-2019-1278,SUSE-SLE-SERVER-12-SP4-2019-1278 SKIP SUSE-RU-2019:1279-1 as SUSE-SLE-SERVER-12-SP4-2019-1279 is not security or has no CVEs. patches: SUSE-2019-1279,SUSE-SLE-SERVER-12-SP3-2019-1279,SUSE-SLE-SERVER-12-SP4-2019-1279 SKIP SUSE-RU-2019:1280-1 as SUSE-Storage-4-2019-1280 is not security or has no CVEs. patches: SUSE-2019-1280,SUSE-OpenStack-Cloud-7-2019-1280,SUSE-SLE-DESKTOP-12-SP3-2019-1280,SUSE-SLE-DESKTOP-12-SP4-2019-1280,SUSE-SLE-SAP-12-SP1-2019-1280,SUSE-SLE-SAP-12-SP2-2019-1280,SUSE-SLE-SDK-12-SP3-2019-1280,SUSE-SLE-SDK-12-SP4-2019-1280,SUSE-SLE-SERVER-12-2019-1280,SUSE-SLE-SERVER-12-SP1-2019-1280,SUSE-SLE-SERVER-12-SP2-2019-1280,SUSE-SLE-SERVER-12-SP2-BCL-2019-1280,SUSE-SLE-SERVER-12-SP3-2019-1280,SUSE-SLE-SERVER-12-SP4-2019-1280,SUSE-Storage-4-2019-1280 SKIP SUSE-RU-2019:1281-1 as SUSE-2019-1281 is not security or has no CVEs. patches: SUSE-2019-1281,SUSE-SLE-Module-Public-Cloud-12-2019-1281 SKIP SUSE-RU-2019:1282-1 as SUSE-2019-1282 is not security or has no CVEs. patches: SUSE-2019-1282,SUSE-SLE-Module-Public-Cloud-15-2019-1282 SKIP SUSE-RU-2019:1282-2 as SUSE-2019-1282 is not security or has no CVEs. patches: SUSE-2019-1282,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1282 SKIP SUSE-RU-2019:1292-1 as SUSE-SLE-Module-Public-Cloud-12-2019-1292 is not security or has no CVEs. patches: SUSE-2019-1292,SUSE-SLE-Module-Public-Cloud-12-2019-1292 SKIP SUSE-RU-2019:1293-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1293 is not security or has no CVEs. patches: SUSE-2019-1293,SUSE-SLE-Module-Desktop-Applications-15-2019-1293,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1293 SKIP SUSE-RU-2019:1294-1 as SUSE-SLE-Module-Basesystem-15-2019-1294 is not security or has no CVEs. patches: SUSE-2019-1294,SUSE-SLE-Module-Basesystem-15-2019-1294 SKIP SUSE-RU-2019:1294-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1294 is not security or has no CVEs. patches: SUSE-2019-1294,SUSE-SLE-Module-Basesystem-15-SP1-2019-1294,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1294 SKIP SUSE-RU-2019:1301-1 as SUSE-SLE-Module-Server-Applications-15-2019-1301 is not security or has no CVEs. patches: SUSE-2019-1301,SUSE-SLE-Module-Development-Tools-15-2019-1301,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1301,SUSE-SLE-Module-Server-Applications-15-2019-1301 SKIP SUSE-RU-2019:1301-2 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1301 is not security or has no CVEs. patches: SUSE-2019-1301,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1301,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1301,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1301 SKIP SUSE-RU-2019:1302-1 as SUSE-SLE-Product-HA-15-2019-1302 is not security or has no CVEs. patches: SUSE-2019-1302,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1302,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-1302,SUSE-SLE-Product-HA-15-2019-1302 SKIP SUSE-RU-2019:1302-2 as SUSE-SLE-Product-HA-15-SP1-2019-1302 is not security or has no CVEs. patches: SUSE-2019-1302,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1302,SUSE-SLE-Product-HA-15-SP1-2019-1302 SKIP SUSE-RU-2019:1309-1 as SUSE-SLE-SERVER-12-SP3-2019-1309 is not security or has no CVEs. patches: SUSE-2019-1309,SUSE-SLE-DESKTOP-12-SP3-2019-1309,SUSE-SLE-SERVER-12-SP3-2019-1309 SKIP SUSE-RU-2019:1310-1 as SUSE-SLE-Product-WE-15-2019-1310 is not security or has no CVEs. patches: SUSE-2019-1310,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1310,SUSE-SLE-Product-WE-15-2019-1310 SKIP SUSE-RU-2019:1311-1 as SUSE-SLE-Module-Server-Applications-15-2019-1311 is not security or has no CVEs. patches: SUSE-2019-1311,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1311,SUSE-SLE-Module-Server-Applications-15-2019-1311 SKIP SUSE-RU-2019:1312-1 as SUSE-SLE-Module-Development-Tools-15-2019-1312 is not security or has no CVEs. patches: SUSE-2019-1312,SUSE-SLE-Module-Basesystem-15-2019-1312,SUSE-SLE-Module-Development-Tools-15-2019-1312,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1312 SKIP SUSE-RU-2019:1312-2 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1312 is not security or has no CVEs. patches: SUSE-2019-1312,SUSE-SLE-Module-Basesystem-15-SP1-2019-1312,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1312,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1312 SKIP SUSE-RU-2019:1314-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2019-1314 is not security or has no CVEs. patches: SUSE-2019-1314,SUSE-SLE-Module-Basesystem-15-2019-1314,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1314,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-1314 SKIP SUSE-RU-2019:1314-2 as SUSE-SLE-Module-Legacy-15-SP1-2019-1314 is not security or has no CVEs. patches: SUSE-2019-1314,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1314,SUSE-SLE-Module-Legacy-15-SP1-2019-1314 SKIP SUSE-RU-2019:1315-1 as SUSE-SLE-SERVER-12-SP4-2019-1315 is not security or has no CVEs. patches: SUSE-2019-1315,SUSE-SLE-SDK-12-SP4-2019-1315,SUSE-SLE-SERVER-12-SP4-2019-1315 SKIP SUSE-RU-2019:1317-1 as SUSE-SLE-SERVER-12-SP4-2019-1317 is not security or has no CVEs. patches: SUSE-2019-1317,SUSE-SLE-SDK-12-SP4-2019-1317,SUSE-SLE-SERVER-12-SP4-2019-1317 SKIP SUSE-RU-2019:1318-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1318 is not security or has no CVEs. patches: SUSE-2019-1318,SUSE-SLE-Module-Basesystem-15-2019-1318,SUSE-SLE-Module-Desktop-Applications-15-2019-1318,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1318 SKIP SUSE-RU-2019:1318-2 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1318 is not security or has no CVEs. patches: SUSE-2019-1318,SUSE-SLE-Module-Basesystem-15-SP1-2019-1318,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1318,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1318 SKIP SUSE-RU-2019:1319-1 as SUSE-SLE-SERVER-12-SP4-2019-1319 is not security or has no CVEs. patches: SUSE-2019-1319,SUSE-SLE-DESKTOP-12-SP3-2019-1319,SUSE-SLE-DESKTOP-12-SP4-2019-1319,SUSE-SLE-SERVER-12-SP3-2019-1319,SUSE-SLE-SERVER-12-SP4-2019-1319 SKIP SUSE-RU-2019:1320-1 as SUSE-SLE-SERVER-12-SP3-2019-1320 is not security or has no CVEs. patches: SUSE-2019-1320,SUSE-SLE-SDK-12-SP3-2019-1320,SUSE-SLE-SERVER-12-SP3-2019-1320 SKIP SUSE-RU-2019:1327-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1327 is not security or has no CVEs. patches: SUSE-2019-1327,SUSE-SLE-Module-Desktop-Applications-15-2019-1327,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1327 SKIP SUSE-RU-2019:1327-2 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1327 is not security or has no CVEs. patches: SUSE-2019-1327,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1327,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1327 SKIP SUSE-RU-2019:1331-1 as SUSE-Storage-5-2019-1331 is not security or has no CVEs. patches: SUSE-2019-1331,SUSE-Storage-5-2019-1331 SKIP SUSE-RU-2019:1332-1 as SUSE-SLE-Module-Server-Applications-15-2019-1332 is not security or has no CVEs. patches: SUSE-2019-1332,SUSE-SLE-Module-HPC-15-2019-1332,SUSE-SLE-Module-Server-Applications-15-2019-1332 SKIP SUSE-RU-2019:1333-1 as SUSE-SLE-SERVER-12-SP3-2019-1333 is not security or has no CVEs. patches: SUSE-2019-1333,SUSE-SLE-DESKTOP-12-SP3-2019-1333,SUSE-SLE-SERVER-12-SP3-2019-1333 SKIP SUSE-RU-2019:1334-1 as SUSE-SLE-SERVER-12-SP4-2019-1334 is not security or has no CVEs. patches: SUSE-2019-1334,SUSE-SLE-SERVER-12-SP3-2019-1334,SUSE-SLE-SERVER-12-SP4-2019-1334 ERROR: notice SUSE-RU-2019:1335-1 has no valid patches out of: SUSE-2019-1335,SUSE-SLE-Module-SAP-Applications-15-2019-1335 SKIP SUSE-RU-2019:1335-2 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1207 is not security or has no CVEs. patches: SUSE-2019-1335,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1207 SKIP SUSE-RU-2019:1336-1 as SUSE-SLE-Product-HA-15-2019-1336 is not security or has no CVEs. patches: SUSE-2019-1336,SUSE-SLE-Product-HA-15-2019-1336 SKIP SUSE-RU-2019:1337-1 as SUSE-SLE-Module-Basesystem-15-2019-1337 is not security or has no CVEs. patches: SUSE-2019-1337,SUSE-SLE-INSTALLER-15-2019-1337,SUSE-SLE-Module-Basesystem-15-2019-1337 SKIP SUSE-RU-2019:1341-1 as SUSE-SLE-HA-12-SP2-2019-1341 is not security or has no CVEs. patches: SUSE-2019-1341,SUSE-SLE-HA-12-SP2-2019-1341 SKIP SUSE-RU-2019:1342-1 as SUSE-SLE-Module-Public-Cloud-12-2019-1342 is not security or has no CVEs. patches: SUSE-2019-1342,SUSE-SLE-Module-Public-Cloud-12-2019-1342 SKIP SUSE-RU-2019:1344-1 as SUSE-SLE-Module-Public-Cloud-15-2019-1344 is not security or has no CVEs. patches: SUSE-2019-1344,SUSE-SLE-Module-Public-Cloud-15-2019-1344 SKIP SUSE-RU-2019:1350-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1350 is not security or has no CVEs. patches: SUSE-2019-1350,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-1350,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-1350,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1350 SKIP SUSE-RU-2019:1350-2 as SUSE-2019-1350 is not security or has no CVEs. patches: SUSE-2019-1350,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1350 SKIP SUSE-RU-2019:1355-1 as SUSE-2019-1355 is not security or has no CVEs. patches: SUSE-2019-1355,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1355 SKIP SUSE-RU-2019:1358-1 as SUSE-SLE-Module-Basesystem-15-2019-1358 is not security or has no CVEs. patches: SUSE-2019-1358,SUSE-SLE-Module-Basesystem-15-2019-1358 SKIP SUSE-RU-2019:1358-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1358 is not security or has no CVEs. patches: SUSE-2019-1358,SUSE-SLE-Module-Basesystem-15-SP1-2019-1358 SKIP SUSE-RU-2019:1361-2 as SUSE-2019-1361 is not security or has no CVEs. patches: SUSE-2019-1361,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1361 SKIP SUSE-RU-2019:1366-1 as SUSE-SLE-SERVER-12-SP3-2019-1366 is not security or has no CVEs. patches: SUSE-2019-1366,SUSE-SLE-SERVER-12-SP3-2019-1366 SKIP SUSE-RU-2019:1367-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1367 is not security or has no CVEs. patches: SUSE-2019-1367,SUSE-SLE-Module-Basesystem-15-SP1-2019-1367 SKIP SUSE-RU-2019:1370-1 as SUSE-SLE-HA-12-SP3-2019-1370 is not security or has no CVEs. patches: SUSE-2019-1370,SUSE-SLE-HA-12-SP3-2019-1370 SKIP SUSE-RU-2019:1375-1 as SUSE-SLE-HA-12-SP4-2019-1375 is not security or has no CVEs. patches: SUSE-2019-1375,SUSE-SLE-HA-12-SP4-2019-1375 SKIP SUSE-RU-2019:1376-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1376 is not security or has no CVEs. patches: SUSE-2019-1376,SUSE-SLE-Module-Desktop-Applications-15-2019-1376,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1376 SKIP SUSE-RU-2019:1376-2 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1376 is not security or has no CVEs. patches: SUSE-2019-1376,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1376,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1376 SKIP SUSE-RU-2019:1376-3 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1925 is not security or has no CVEs. patches: SUSE-2019-1376,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1925,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1925,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1925 SKIP SUSE-RU-2019:1380-1 as SUSE-SLE-Module-Basesystem-15-2019-1380 is not security or has no CVEs. patches: SUSE-2019-1380,SUSE-SLE-Module-Basesystem-15-2019-1380 SKIP SUSE-RU-2019:1380-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1380 is not security or has no CVEs. patches: SUSE-2019-1380,SUSE-SLE-Module-Basesystem-15-SP1-2019-1380 SKIP SUSE-RU-2019:1383-1 as SUSE-SLE-Module-Basesystem-15-2019-1383 is not security or has no CVEs. patches: SUSE-2019-1383,SUSE-SLE-Module-Basesystem-15-2019-1383 SKIP SUSE-RU-2019:1383-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1383 is not security or has no CVEs. patches: SUSE-2019-1383,SUSE-SLE-Module-Basesystem-15-SP1-2019-1383 SKIP SUSE-RU-2019:1384-1 as SUSE-Storage-4-2019-1384 is not security or has no CVEs. patches: SUSE-2019-1384,SUSE-OpenStack-Cloud-7-2019-1384,SUSE-SLE-DESKTOP-12-SP3-2019-1384,SUSE-SLE-DESKTOP-12-SP4-2019-1384,SUSE-SLE-SAP-12-SP1-2019-1384,SUSE-SLE-SAP-12-SP2-2019-1384,SUSE-SLE-SERVER-12-2019-1384,SUSE-SLE-SERVER-12-SP1-2019-1384,SUSE-SLE-SERVER-12-SP2-2019-1384,SUSE-SLE-SERVER-12-SP3-2019-1384,SUSE-SLE-SERVER-12-SP4-2019-1384,SUSE-Storage-4-2019-1384 SKIP SUSE-RU-2019:1387-1 as SUSE-SLE-Product-WE-15-SP1-2019-1387 is not security or has no CVEs. patches: SUSE-2019-1387,SUSE-SLE-Product-WE-15-2019-1387,SUSE-SLE-Product-WE-15-SP1-2019-1387 SKIP SUSE-RU-2019:13922-1 as slessp3-ntp-13922 is not security or has no CVEs. patches: sleposp3-ntp-13922,slessp3-ntp-13922 SKIP SUSE-RU-2019:13925-1 as slessp4-elilo-13925 is not security or has no CVEs. patches: slessp4-elilo-13925 SKIP SUSE-RU-2019:13928-1 as slessp4-timezone-13928 is not security or has no CVEs. patches: sdksp4-timezone-13928,slessp4-timezone-13928 SKIP SUSE-RU-2019:13929-1 as slessp4-xorg-x11-libxcb-13929 is not security or has no CVEs. patches: sdksp4-xorg-x11-libxcb-13929,slessp4-xorg-x11-libxcb-13929 SKIP SUSE-RU-2019:1393-1 as SUSE-SLE-Module-Development-Tools-15-2019-1393 is not security or has no CVEs. patches: SUSE-2019-1393,SUSE-SLE-Module-Development-Tools-15-2019-1393 SKIP SUSE-RU-2019:1393-2 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1393 is not security or has no CVEs. patches: SUSE-2019-1393,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1393 SKIP SUSE-RU-2019:13930-1 as pubclsp3-regionServiceClientConfigEC2-13930 is not security or has no CVEs. patches: pubclsp3-regionServiceClientConfigEC2-13930 SKIP SUSE-RU-2019:13935-1 as slessp4-wodim-13935 is not security or has no CVEs. patches: sdksp4-wodim-13935,slessp4-wodim-13935 SKIP SUSE-RU-2019:13936-1 as slessp4-mkinitrd-13936 is not security or has no CVEs. patches: slessp4-mkinitrd-13936 SKIP SUSE-RU-2019:13939-1 as slessp4-openssh-13939 is not security or has no CVEs. patches: slessp4-openssh-13939 SKIP SUSE-RU-2019:1394-1 as SUSE-SLE-Module-Basesystem-15-2019-1394 is not security or has no CVEs. patches: SUSE-2019-1394,SUSE-SLE-Module-Basesystem-15-2019-1394 SKIP SUSE-RU-2019:13940-1 as slessp4-php53-13940 is not security or has no CVEs. patches: sdksp4-php53-13940,slessp4-php53-13940 SKIP SUSE-RU-2019:13941-1 as slessp4-openssl-certs-13941 is not security or has no CVEs. patches: sleposp3-openssl-certs-13941,slessp3-openssl-certs-13941,slessp4-openssl-certs-13941 SKIP SUSE-RU-2019:13942-1 as slessp4-microcode_ctl-13942 is not security or has no CVEs. patches: slessp4-microcode_ctl-13942 SKIP SUSE-RU-2019:13949-1 as slertesp4-kernel-rt-20190131-13949 is not security or has no CVEs. patches: slertesp4-kernel-rt-20190131-13949 SKIP SUSE-RU-2019:1395-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1395 is not security or has no CVEs. patches: SUSE-2019-1395,SUSE-SLE-Module-Desktop-Applications-15-2019-1395 SKIP SUSE-RU-2019:1395-2 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1395 is not security or has no CVEs. patches: SUSE-2019-1395,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1395,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1395 SKIP SUSE-RU-2019:13954-1 as slesctsp4-salt-201901-13954 is not security or has no CVEs. patches: slesctsp3-salt-201901-13954,slesctsp4-salt-201901-13954 SKIP SUSE-RU-2019:13955-1 as slesctsp4-client-tools-201901-13955 is not security or has no CVEs. patches: slesctsp3-client-tools-201901-13955,slesctsp4-client-tools-201901-13955 SKIP SUSE-RU-2019:13959-1 as sdksp4-build-13959 is not security or has no CVEs. patches: sdksp4-build-13959 SKIP SUSE-RU-2019:1396-1 as SUSE-Storage-5-2019-1396 is not security or has no CVEs. patches: SUSE-2019-1396,SUSE-Storage-5-2019-1396 SKIP SUSE-RU-2019:13960-1 as sleslms13-slms-13960 is not security or has no CVEs. patches: sleslms13-slms-13960 SKIP SUSE-RU-2019:13963-1 as slehasp4-sbd-13963 is not security or has no CVEs. patches: slehasp4-sbd-13963 SKIP SUSE-RU-2019:13966-1 as slessp4-krb5-13966 is not security or has no CVEs. patches: sdksp4-krb5-13966,sleposp3-krb5-13966,slessp4-krb5-13966 SKIP SUSE-RU-2019:13967-1 as slessp4-openCryptoki-13967 is not security or has no CVEs. patches: sdksp4-openCryptoki-13967,slessp4-openCryptoki-13967 SKIP SUSE-RU-2019:13968-1 as slessp4-multipath-tools-13968 is not security or has no CVEs. patches: slessp4-multipath-tools-13968 SKIP SUSE-RU-2019:1397-1 as SUSE-SLE-SERVER-12-SP4-2019-1397 is not security or has no CVEs. patches: SUSE-2019-1397,SUSE-SLE-DESKTOP-12-SP3-2019-1397,SUSE-SLE-DESKTOP-12-SP4-2019-1397,SUSE-SLE-SDK-12-SP3-2019-1397,SUSE-SLE-SDK-12-SP4-2019-1397,SUSE-SLE-SERVER-12-SP3-2019-1397,SUSE-SLE-SERVER-12-SP4-2019-1397 ERROR: notice SUSE-RU-2019:13973-1 has no valid patches out of: suse-ubu184ct-salt-201903-13973 ERROR: notice SUSE-RU-2019:13974-1 has no valid patches out of: suse-ubu164ct-salt-201903-13974 SKIP SUSE-RU-2019:13980-1 as slessp4-arpwatch-13980 is not security or has no CVEs. patches: sdksp4-arpwatch-13980,sleposp3-arpwatch-13980,slessp4-arpwatch-13980 SKIP SUSE-RU-2019:13983-1 as slessp4-augeas-13983 is not security or has no CVEs. patches: sdksp4-augeas-13983,sleposp3-augeas-13983,slessp4-augeas-13983 SKIP SUSE-RU-2019:13986-1 as slessp4-mkinitrd-13986 is not security or has no CVEs. patches: slessp4-mkinitrd-13986 SKIP SUSE-RU-2019:13988-1 as slehasp4-sbd-13988 is not security or has no CVEs. patches: slehasp4-sbd-13988 SKIP SUSE-RU-2019:1399-1 as SUSE-SLE-Module-SAP-Applications-15-2019-1399 is not security or has no CVEs. patches: SUSE-2019-1399,SUSE-SLE-Module-SAP-Applications-15-2019-1399 SKIP SUSE-RU-2019:13996-1 as slessp4-timezone-13996 is not security or has no CVEs. patches: sdksp4-timezone-13996,sleposp3-timezone-13996,slessp4-timezone-13996 SKIP SUSE-RU-2019:14000-1 as sdksp4-netatalk-14000 is not security or has no CVEs. patches: sdksp4-netatalk-14000 SKIP SUSE-RU-2019:14006-1 as slessp4-open-vm-tools-14006 is not security or has no CVEs. patches: slessp4-open-vm-tools-14006 SKIP SUSE-RU-2019:14007-1 as slessp4-krb5-14007 is not security or has no CVEs. patches: sdksp4-krb5-14007,sleposp3-krb5-14007,slessp4-krb5-14007 SKIP SUSE-RU-2019:1402-1 as SUSE-SLE-SDK-12-SP3-2019-1402 is not security or has no CVEs. patches: SUSE-2019-1402,SUSE-SLE-SDK-12-SP3-2019-1402 SKIP SUSE-RU-2019:1402-2 as SUSE-SLE-SERVER-12-SP3-2019-1402 is not security or has no CVEs. patches: SUSE-2019-1402,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1402,SUSE-SLE-DESKTOP-12-SP3-2019-1402,SUSE-SLE-SDK-12-SP3-2019-1402,SUSE-SLE-SERVER-12-SP3-2019-1402 ERROR: notice SUSE-RU-2019:14021-1 has no valid patches out of: suse-ubu164ct-salt-201904-14021 ERROR: notice SUSE-RU-2019:14022-1 has no valid patches out of: suse-ubu184ct-salt-201904-14022 SKIP SUSE-RU-2019:14023-1 as slesctsp4-salt-201904-14023 is not security or has no CVEs. patches: slesctsp3-salt-201904-14023,slesctsp4-salt-201904-14023 SKIP SUSE-RU-2019:14029-1 as slessp4-open-vm-tools-14029 is not security or has no CVEs. patches: slessp4-open-vm-tools-14029 SKIP SUSE-RU-2019:1403-1 as SUSE-SLE-Module-Basesystem-15-2019-1403 is not security or has no CVEs. patches: SUSE-2019-1403,SUSE-SLE-Module-Basesystem-15-2019-1403,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1403,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1403 SKIP SUSE-RU-2019:1403-2 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1403 is not security or has no CVEs. patches: SUSE-2019-1403,SUSE-SLE-Module-Basesystem-15-2019-1403,SUSE-SLE-Module-Basesystem-15-SP1-2019-1403 SKIP SUSE-RU-2019:14034-1 as sleposp3-POS_Image3-14034 is not security or has no CVEs. patches: sleposp3-POS_Image3-14034 SKIP SUSE-RU-2019:14037-1 as slessp4-glibc-14037 is not security or has no CVEs. patches: sleposp3-glibc-14037,slessp4-glibc-14037 SKIP SUSE-RU-2019:14041-1 as slessp4-systemtap-14041 is not security or has no CVEs. patches: sleposp3-systemtap-14041,slessp4-systemtap-14041 SKIP SUSE-RU-2019:14070-1 as slessp4-xfsprogs-14070 is not security or has no CVEs. patches: sleposp3-xfsprogs-14070,slessp4-xfsprogs-14070 SKIP SUSE-RU-2019:14072-1 as slehasp4-drbd-14072 is not security or has no CVEs. patches: slehasp4-drbd-14072 SKIP SUSE-RU-2019:14081-1 as slessp4-mdadm-14081 is not security or has no CVEs. patches: slessp4-mdadm-14081 SKIP SUSE-RU-2019:14087-1 as slessp4-pure-ftpd-14087 is not security or has no CVEs. patches: sleposp3-pure-ftpd-14087,slessp4-pure-ftpd-14087 SKIP SUSE-RU-2019:1409-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2019-1409 is not security or has no CVEs. patches: SUSE-2019-1409,SUSE-SLE-Live-Patching-12-2019-1410,SUSE-SLE-Live-Patching-12-SP3-2019-1410,SUSE-SLE-Live-Patching-12-SP4-2019-1410,SUSE-SLE-Module-Live-Patching-15-2019-1409,SUSE-SLE-Module-Live-Patching-15-SP1-2019-1409 SKIP SUSE-RU-2019:14093-1 as slessp4-xz-14093 is not security or has no CVEs. patches: sleposp3-xz-14093,slessp4-xz-14093 SKIP SUSE-RU-2019:14103-1 as slesctsp4-client-tools-201905-14103 is not security or has no CVEs. patches: slesctsp3-client-tools-201905-14103,slesctsp4-client-tools-201905-14103 SKIP SUSE-RU-2019:14107-1 as slesctsp4-salt-201905-14107 is not security or has no CVEs. patches: slesctsp3-salt-201905-14107,slesctsp4-salt-201905-14107 ERROR: notice SUSE-RU-2019:14108-1 has no valid patches out of: suse-ubu184ct-salt-201905-14108 ERROR: notice SUSE-RU-2019:14109-1 has no valid patches out of: suse-ubu164ct-salt-201905-14109 SKIP SUSE-RU-2019:1412-1 as SUSE-SLE-Module-Basesystem-15-2019-1412 is not security or has no CVEs. patches: SUSE-2019-1412,SUSE-SLE-Module-Basesystem-15-2019-1412 SKIP SUSE-RU-2019:14128-1 as slesmtsp3-smt-14128 is not security or has no CVEs. patches: slesmtsp3-smt-14128 SKIP SUSE-RU-2019:14129-1 as slessp4-openssh-14129 is not security or has no CVEs. patches: slessp4-openssh-14129 SKIP SUSE-RU-2019:1413-1 as SUSE-SLE-Module-Basesystem-15-2019-1413 is not security or has no CVEs. patches: SUSE-2019-1413,SUSE-SLE-Module-Basesystem-15-2019-1413 SKIP SUSE-RU-2019:14130-1 as sleposp3-openssh-14130 is not security or has no CVEs. patches: sleposp3-openssh-14130 SKIP SUSE-RU-2019:14137-1 as slessp4-timezone-14137 is not security or has no CVEs. patches: sleposp3-timezone-14137,slessp4-timezone-14137 SKIP SUSE-RU-2019:1414-1 as SUSE-Storage-4-2019-1414 is not security or has no CVEs. patches: SUSE-2019-1414,SUSE-OpenStack-Cloud-7-2019-1414,SUSE-SLE-DESKTOP-12-SP3-2019-1414,SUSE-SLE-DESKTOP-12-SP4-2019-1414,SUSE-SLE-SAP-12-SP2-2019-1414,SUSE-SLE-SERVER-12-SP2-2019-1414,SUSE-SLE-SERVER-12-SP2-BCL-2019-1414,SUSE-SLE-SERVER-12-SP3-2019-1414,SUSE-SLE-SERVER-12-SP4-2019-1414,SUSE-SLE-WE-12-SP3-2019-1414,SUSE-Storage-4-2019-1414 SKIP SUSE-RU-2019:1415-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1415 is not security or has no CVEs. patches: SUSE-2019-1415,SUSE-SLE-Module-Basesystem-15-2019-1415,SUSE-SLE-Module-Basesystem-15-SP1-2019-1415 SKIP SUSE-RU-2019:1416-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1416 is not security or has no CVEs. patches: SUSE-2019-1416,SUSE-SLE-Module-Basesystem-15-SP1-2019-1416 SKIP SUSE-RU-2019:14164-1 as slesctsp4-salt-201907-14164 is not security or has no CVEs. patches: slesctsp3-salt-201907-14164,slesctsp4-salt-201907-14164 ERROR: notice SUSE-RU-2019:14165-1 has no valid patches out of: suse-ubu164ct-salt-201907-14165 ERROR: notice SUSE-RU-2019:14168-1 has no valid patches out of: suse-ubu184ct-salt-201907-14168 SKIP SUSE-RU-2019:1417-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1417 is not security or has no CVEs. patches: SUSE-2019-1417,SUSE-SLE-Module-Basesystem-15-2019-1417,SUSE-SLE-Module-Basesystem-15-SP1-2019-1417,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1417,SUSE-SLE-Module-Python2-15-SP1-2019-1417,SUSE-SLE-Module-Server-Applications-15-2019-1417,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1417 SKIP SUSE-RU-2019:1417-2 as SUSE-2019-1417 is not security or has no CVEs. patches: SUSE-2019-1417,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1417 SKIP SUSE-RU-2019:1417-3 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1880 is not security or has no CVEs. patches: SUSE-2019-1417,SUSE-SLE-Module-Basesystem-15-SP2-2020-1880,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1880,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1880,SUSE-SLE-Module-Python2-15-SP2-2020-1880,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1880 SKIP SUSE-RU-2019:14183-1 as slessp4-microcode_ctl-14183 is not security or has no CVEs. patches: sleposp3-microcode_ctl-14183,slessp4-microcode_ctl-14183 ERROR: notice SUSE-RU-2019:14185-1 has no valid patches out of: suse-ubu164ct-salt-201909-14185 ERROR: notice SUSE-RU-2019:14186-1 has no valid patches out of: suse-ubu184ct-salt-201909-14186 SKIP SUSE-RU-2019:14189-1 as slessp4-tcsh-14189 is not security or has no CVEs. patches: sleposp3-tcsh-14189,slessp4-tcsh-14189 SKIP SUSE-RU-2019:14200-1 as slessp4-timezone-14200 is not security or has no CVEs. patches: sleposp3-timezone-14200,slessp4-timezone-14200 ERROR: notice SUSE-RU-2019:14209-1 has no valid patches out of: suse-ubu184ct-salt-201910-14209 ERROR: notice SUSE-RU-2019:14211-1 has no valid patches out of: suse-ubu164ct-salt-201910-14211 SKIP SUSE-RU-2019:14213-1 as slesctsp4-client-tools-201910-14213 is not security or has no CVEs. patches: slesctsp3-client-tools-201910-14213,slesctsp4-client-tools-201910-14213 SKIP SUSE-RU-2019:14219-1 as slessp4-crash-14219 is not security or has no CVEs. patches: slessp4-crash-14219 SKIP SUSE-RU-2019:14234-1 as slessp4-ghostscript-library-14234 is not security or has no CVEs. patches: sleposp3-ghostscript-library-14234,slessp4-ghostscript-library-14234 SKIP SUSE-RU-2019:14238-1 as slessp4-tar-14238 is not security or has no CVEs. patches: sleposp3-tar-14238,slessp4-tar-14238 ERROR: notice SUSE-RU-2019:14240-1 has no valid patches out of: suse-ubu184ct-salt-beta-201912-14240 ERROR: notice SUSE-RU-2019:14241-1 has no valid patches out of: suse-ubu184ct-client-tools-beta-201912-14241 ERROR: notice SUSE-RU-2019:14242-1 has no valid patches out of: suse-ubu164ct-salt-beta-201912-14242 ERROR: notice SUSE-RU-2019:14243-1 has no valid patches out of: suse-ubu164ct-client-tools-beta-201912-14243 ERROR: notice SUSE-RU-2019:14248-1 has no valid patches out of: slesctsp3-salt-beta-201912-14248,slesctsp4-salt-beta-201912-14248 SKIP SUSE-RU-2019:14250-1 as slessp4-suseRegister-14250 is not security or has no CVEs. patches: slessp4-suseRegister-14250 SKIP SUSE-RU-2019:14251-1 as sleposp3-suseRegister-14251 is not security or has no CVEs. patches: sleposp3-suseRegister-14251 ERROR: notice SUSE-RU-2019:14253-1 has no valid patches out of: suse-ubu184ct-client-tools-201911-14253 SKIP SUSE-RU-2019:14254-1 as slesctsp4-client-tools-201911-14254 is not security or has no CVEs. patches: slesctsp3-client-tools-201911-14254,slesctsp4-client-tools-201911-14254 ERROR: notice SUSE-RU-2019:14255-1 has no valid patches out of: suse-ubu184ct-salt-201911-14255 ERROR: notice SUSE-RU-2019:14256-1 has no valid patches out of: suse-ubu164ct-salt-201911-14256 SKIP SUSE-RU-2019:14262-1 as slessp4-mutt-14262 is not security or has no CVEs. patches: sleposp3-mutt-14262,slessp4-mutt-14262 SKIP SUSE-RU-2019:1429-1 as SUSE-Storage-5-2019-1429 is not security or has no CVEs. patches: SUSE-2019-1429,SUSE-Storage-5-2019-1429 SKIP SUSE-RU-2019:1430-1 as SUSE-SLE-SAP-12-SP4-2019-1430 is not security or has no CVEs. patches: SUSE-2019-1430,SUSE-SLE-SAP-12-SP4-2019-1430 SKIP SUSE-RU-2019:1431-1 as SUSE-Storage-4-2019-1431 is not security or has no CVEs. patches: SUSE-2019-1431,SUSE-OpenStack-Cloud-7-2019-1431,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1431,SUSE-SLE-DESKTOP-12-SP3-2019-1431,SUSE-SLE-DESKTOP-12-SP4-2019-1431,SUSE-SLE-SAP-12-SP1-2019-1431,SUSE-SLE-SAP-12-SP2-2019-1431,SUSE-SLE-SDK-12-SP3-2019-1431,SUSE-SLE-SDK-12-SP4-2019-1431,SUSE-SLE-SERVER-12-2019-1431,SUSE-SLE-SERVER-12-SP1-2019-1431,SUSE-SLE-SERVER-12-SP2-2019-1431,SUSE-SLE-SERVER-12-SP2-BCL-2019-1431,SUSE-SLE-SERVER-12-SP3-2019-1431,SUSE-SLE-SERVER-12-SP4-2019-1431,SUSE-Storage-4-2019-1431 SKIP SUSE-RU-2019:1434-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1434 is not security or has no CVEs. patches: SUSE-2019-1434,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1434,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-1434,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-1434,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1434 SKIP SUSE-RU-2019:1436-1 as SUSE-SLE-Product-HA-15-2019-1436 is not security or has no CVEs. patches: SUSE-2019-1436,SUSE-SLE-Module-Basesystem-15-2019-1436,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1436,SUSE-SLE-Product-HA-15-2019-1436 SKIP SUSE-RU-2019:1445-1 as SUSE-SLE-Product-HA-15-2019-1445 is not security or has no CVEs. patches: SUSE-2019-1445,SUSE-SLE-Product-HA-15-2019-1445 SKIP SUSE-RU-2019:1447-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1447 is not security or has no CVEs. patches: SUSE-2019-1447,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1447 SKIP SUSE-RU-2019:1451-1 as SUSE-SLE-HA-12-SP4-2019-1451 is not security or has no CVEs. patches: SUSE-2019-1451,SUSE-SLE-HA-12-SP4-2019-1451 SKIP SUSE-RU-2019:1464-1 as SUSE-SLE-SERVER-12-SP4-2019-1464 is not security or has no CVEs. patches: SUSE-2019-1464,SUSE-SLE-DESKTOP-12-SP4-2019-1464,SUSE-SLE-SERVER-12-SP4-2019-1464 SKIP SUSE-RU-2019:1466-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1466 is not security or has no CVEs. patches: SUSE-2019-1466,SUSE-SLE-Module-Desktop-Applications-15-2019-1466,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1466 SKIP SUSE-RU-2019:1467-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1467 is not security or has no CVEs. patches: SUSE-2019-1467,SUSE-SLE-Module-Desktop-Applications-15-2019-1467,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1467,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1467,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1467 SKIP SUSE-RU-2019:1469-1 as SUSE-SLE-SERVER-12-SP4-2019-1469 is not security or has no CVEs. patches: SUSE-2019-1469,SUSE-SLE-DESKTOP-12-SP3-2019-1469,SUSE-SLE-DESKTOP-12-SP4-2019-1469,SUSE-SLE-SDK-12-SP3-2019-1469,SUSE-SLE-SDK-12-SP4-2019-1469,SUSE-SLE-SERVER-12-SP3-2019-1469,SUSE-SLE-SERVER-12-SP4-2019-1469 SKIP SUSE-RU-2019:1470-1 as SUSE-SLE-Module-Basesystem-15-2019-1470 is not security or has no CVEs. patches: SUSE-2019-1470,SUSE-SLE-Module-Basesystem-15-2019-1470 SKIP SUSE-RU-2019:1470-2 as SUSE-2019-1470 is not security or has no CVEs. patches: SUSE-2019-1470,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1470,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1470 SKIP SUSE-RU-2019:1471-1 as SUSE-SLE-Module-Basesystem-15-2019-1471 is not security or has no CVEs. patches: SUSE-2019-1471,SUSE-SLE-Module-Basesystem-15-2019-1471 SKIP SUSE-RU-2019:1472-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1472 is not security or has no CVEs. patches: SUSE-2019-1472,SUSE-SLE-Module-Desktop-Applications-15-2019-1472,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1472 SKIP SUSE-RU-2019:1473-1 as SUSE-SLE-SERVER-12-SP4-2019-1473 is not security or has no CVEs. patches: SUSE-2019-1473,SUSE-SLE-DESKTOP-12-SP3-2019-1473,SUSE-SLE-DESKTOP-12-SP4-2019-1473,SUSE-SLE-SERVER-12-SP3-2019-1473,SUSE-SLE-SERVER-12-SP4-2019-1473 SKIP SUSE-RU-2019:1474-1 as SUSE-SLE-SERVER-12-SP3-2019-1474 is not security or has no CVEs. patches: SUSE-2019-1474,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1474,SUSE-SLE-DESKTOP-12-SP3-2019-1474,SUSE-SLE-SERVER-12-SP3-2019-1474 SKIP SUSE-RU-2019:1475-1 as SUSE-SLE-SERVER-12-SP4-2019-1475 is not security or has no CVEs. patches: SUSE-2019-1475,SUSE-SLE-DESKTOP-12-SP4-2019-1475,SUSE-SLE-SERVER-12-SP4-2019-1475 SKIP SUSE-RU-2019:1481-1 as SUSE-SLE-SERVER-12-SP4-2019-1481 is not security or has no CVEs. patches: SUSE-2019-1481,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1481,SUSE-SLE-DESKTOP-12-SP3-2019-1481,SUSE-SLE-DESKTOP-12-SP4-2019-1481,SUSE-SLE-SDK-12-SP3-2019-1481,SUSE-SLE-SDK-12-SP4-2019-1481,SUSE-SLE-SERVER-12-SP3-2019-1481,SUSE-SLE-SERVER-12-SP4-2019-1481 SKIP SUSE-RU-2019:1482-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1482 is not security or has no CVEs. patches: SUSE-2019-1482,SUSE-SLE-Module-Basesystem-15-SP1-2019-1482 SKIP SUSE-RU-2019:1483-1 as SUSE-SLE-Module-Basesystem-15-2019-1483 is not security or has no CVEs. patches: SUSE-2019-1483,SUSE-SLE-Module-Basesystem-15-2019-1483 SKIP SUSE-RU-2019:1484-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1484 is not security or has no CVEs. patches: SUSE-2019-1484,SUSE-SLE-Module-Basesystem-15-2019-1484,SUSE-SLE-Module-Basesystem-15-SP1-2019-1484,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1484 SKIP SUSE-RU-2019:1485-1 as SUSE-SLE-SERVER-12-SP4-2019-1485 is not security or has no CVEs. patches: SUSE-2019-1485,SUSE-SLE-DESKTOP-12-SP3-2019-1485,SUSE-SLE-DESKTOP-12-SP4-2019-1485,SUSE-SLE-SDK-12-SP3-2019-1485,SUSE-SLE-SDK-12-SP4-2019-1485,SUSE-SLE-SERVER-12-SP3-2019-1485,SUSE-SLE-SERVER-12-SP4-2019-1485 SKIP SUSE-RU-2019:1491-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1491 is not security or has no CVEs. patches: SUSE-2019-1491,SUSE-SLE-Module-Basesystem-15-2019-1491,SUSE-SLE-Module-Basesystem-15-SP1-2019-1491,SUSE-SLE-Module-Desktop-Applications-15-2019-1491,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1491,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1491,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1491 SKIP SUSE-RU-2019:1492-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1492 is not security or has no CVEs. patches: SUSE-2019-1492,SUSE-SLE-Module-Basesystem-15-2019-1492,SUSE-SLE-Module-Basesystem-15-SP1-2019-1492,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1492,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1492 SKIP SUSE-RU-2019:1493-1 as SUSE-SLE-SERVER-12-SP4-2019-1493 is not security or has no CVEs. patches: SUSE-2019-1493,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1493,SUSE-SLE-DESKTOP-12-SP3-2019-1493,SUSE-SLE-DESKTOP-12-SP4-2019-1493,SUSE-SLE-SDK-12-SP3-2019-1493,SUSE-SLE-SDK-12-SP4-2019-1493,SUSE-SLE-SERVER-12-SP3-2019-1493,SUSE-SLE-SERVER-12-SP4-2019-1493 SKIP SUSE-RU-2019:1494-1 as SUSE-SLE-Product-WE-15-2019-1494 is not security or has no CVEs. patches: SUSE-2019-1494,SUSE-SLE-Module-Desktop-Applications-15-2019-1494,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1494,SUSE-SLE-Product-WE-15-2019-1494 SKIP SUSE-RU-2019:1496-1 as SUSE-SLE-HA-12-SP4-2019-1496 is not security or has no CVEs. patches: SUSE-2019-1496,SUSE-SLE-HA-12-SP4-2019-1496 SKIP SUSE-RU-2019:1497-1 as SUSE-SLE-SERVER-12-SP4-2019-1497 is not security or has no CVEs. patches: SUSE-2019-1497,SUSE-SLE-SDK-12-SP3-2019-1497,SUSE-SLE-SDK-12-SP4-2019-1497,SUSE-SLE-SERVER-12-SP3-2019-1497,SUSE-SLE-SERVER-12-SP4-2019-1497 SKIP SUSE-RU-2019:1498-1 as SUSE-SLE-Module-Basesystem-15-2019-1498 is not security or has no CVEs. patches: SUSE-2019-1498,SUSE-SLE-INSTALLER-15-2019-1498,SUSE-SLE-Module-Basesystem-15-2019-1498,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1498 SKIP SUSE-RU-2019:1499-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1499 is not security or has no CVEs. patches: SUSE-2019-1499,SUSE-SLE-Module-Basesystem-15-2019-1499,SUSE-SLE-Module-Basesystem-15-SP1-2019-1499,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1499,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1499 SKIP SUSE-RU-2019:1500-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1500 is not security or has no CVEs. patches: SUSE-2019-1500,SUSE-SLE-DESKTOP-12-SP3-2019-1500,SUSE-SLE-DESKTOP-INSTALLER-12-SP3-2019-1500,SUSE-SLE-SAP-INSTALLER-12-SP3-2019-1500,SUSE-SLE-SERVER-12-SP3-2019-1500,SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1500 SKIP SUSE-RU-2019:1501-1 as SUSE-SLE-SERVER-12-SP4-2019-1501 is not security or has no CVEs. patches: SUSE-2019-1501,SUSE-SLE-SDK-12-SP4-2019-1501,SUSE-SLE-SERVER-12-SP4-2019-1501 SKIP SUSE-RU-2019:1502-1 as SUSE-SLE-Module-Server-Applications-15-2019-1502 is not security or has no CVEs. patches: SUSE-2019-1502,SUSE-SLE-Module-Basesystem-15-2019-1502,SUSE-SLE-Module-Basesystem-15-SP1-2019-1502,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1502,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1502,SUSE-SLE-Module-Python2-15-SP1-2019-1502,SUSE-SLE-Module-Server-Applications-15-2019-1502 SKIP SUSE-RU-2019:1503-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-1503 is not security or has no CVEs. patches: SUSE-2019-1503,SUSE-SLE-Module-Basesystem-15-2019-1503,SUSE-SLE-Module-Desktop-Applications-15-2019-1503 SKIP SUSE-RU-2019:1504-1 as SUSE-SLE-SERVER-12-SP3-2019-1504 is not security or has no CVEs. patches: SUSE-2019-1504,SUSE-SLE-DESKTOP-12-SP3-2019-1504,SUSE-SLE-SERVER-12-SP3-2019-1504 SKIP SUSE-RU-2019:1505-1 as SUSE-SLE-SERVER-12-SP4-2019-1505 is not security or has no CVEs. patches: SUSE-2019-1505,SUSE-SLE-DESKTOP-12-SP4-2019-1505,SUSE-SLE-SERVER-12-SP4-2019-1505 SKIP SUSE-RU-2019:1506-1 as SUSE-SLE-SERVER-12-SP1-2019-1506 is not security or has no CVEs. patches: SUSE-2019-1506,SUSE-SLE-SAP-12-SP1-2019-1506,SUSE-SLE-SERVER-12-2019-1506,SUSE-SLE-SERVER-12-SP1-2019-1506 SKIP SUSE-RU-2019:1512-1 as SUSE-SLE-SERVER-12-SP4-2019-1512 is not security or has no CVEs. patches: SUSE-2019-1512,SUSE-SLE-SERVER-12-SP4-2019-1512 SKIP SUSE-RU-2019:1513-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1513 is not security or has no CVEs. patches: SUSE-2019-1513,SUSE-SLE-Module-Basesystem-15-SP1-2019-1513 SKIP SUSE-RU-2019:1516-1 as SUSE-SLE-SERVER-12-SP4-2019-1516 is not security or has no CVEs. patches: SUSE-2019-1516,SUSE-SLE-DESKTOP-12-SP4-2019-1516,SUSE-SLE-SDK-12-SP4-2019-1516,SUSE-SLE-SERVER-12-SP4-2019-1516 SKIP SUSE-RU-2019:1517-1 as SUSE-Storage-5-2019-1517 is not security or has no CVEs. patches: SUSE-2019-1517,SUSE-Storage-5-2019-1517 SKIP SUSE-RU-2019:1519-1 as SUSE-SLE-SERVER-12-SP4-2019-1519 is not security or has no CVEs. patches: SUSE-2019-1519,SUSE-SLE-DESKTOP-12-SP3-2019-1519,SUSE-SLE-DESKTOP-12-SP4-2019-1519,SUSE-SLE-SERVER-12-SP3-2019-1519,SUSE-SLE-SERVER-12-SP4-2019-1519 SKIP SUSE-RU-2019:1520-1 as SUSE-SLE-HA-12-SP2-2019-1520 is not security or has no CVEs. patches: SUSE-2019-1520,SUSE-SLE-HA-12-SP2-2019-1520 SKIP SUSE-RU-2019:1537-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1537 is not security or has no CVEs. patches: SUSE-2019-1537,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1537,SUSE-SLE-Module-Server-Applications-15-2019-1537,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1537 SKIP SUSE-RU-2019:1540-1 as SUSE-SLE-SERVER-12-SP4-2019-1540 is not security or has no CVEs. patches: SUSE-2019-1540,SUSE-SLE-DESKTOP-12-SP4-2019-1540,SUSE-SLE-SERVER-12-SP4-2019-1540 SKIP SUSE-RU-2019:1541-1 as SUSE-SLE-Module-Basesystem-15-2019-1541 is not security or has no CVEs. patches: SUSE-2019-1541,SUSE-SLE-Module-Basesystem-15-2019-1541 SKIP SUSE-RU-2019:1542-1 as SUSE-SLE-Module-Public-Cloud-15-2019-1542 is not security or has no CVEs. patches: SUSE-2019-1542,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1542,SUSE-SLE-Module-Public-Cloud-15-2019-1542 SKIP SUSE-RU-2019:1543-1 as SUSE-SLE-SERVER-12-SP4-2019-1543 is not security or has no CVEs. patches: SUSE-2019-1543,SUSE-SLE-DESKTOP-12-SP4-2019-1543,SUSE-SLE-SERVER-12-SP4-2019-1543 SKIP SUSE-RU-2019:1544-1 as SUSE-SLE-SERVER-12-SP4-2019-1544 is not security or has no CVEs. patches: SUSE-2019-1544,SUSE-SLE-DESKTOP-12-SP4-2019-1544,SUSE-SLE-SAP-12-SP4-2019-1544,SUSE-SLE-SERVER-12-SP4-2019-1544 SKIP SUSE-RU-2019:1548-1 as SUSE-SLE-SERVER-12-SP4-2019-1548 is not security or has no CVEs. patches: SUSE-2019-1548,SUSE-SLE-SERVER-12-SP4-2019-1548 SKIP SUSE-RU-2019:1549-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-1549 is not security or has no CVEs. patches: SUSE-2019-1549,SUSE-SLE-DESKTOP-12-SP4-2019-1549,SUSE-SLE-DESKTOP-INSTALLER-12-SP4-2019-1549,SUSE-SLE-SERVER-12-SP4-2019-1549,SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-1549 SKIP SUSE-RU-2019:1555-1 as SUSE-SLE-Product-HA-15-SP1-2019-1555 is not security or has no CVEs. patches: SUSE-2019-1555,SUSE-SLE-Product-HA-15-SP1-2019-1555 SKIP SUSE-RU-2019:1556-1 as SUSE-SLE-SERVER-12-SP4-2019-1556 is not security or has no CVEs. patches: SUSE-2019-1556,SUSE-SLE-DESKTOP-12-SP4-2019-1556,SUSE-SLE-SERVER-12-SP4-2019-1556 SKIP SUSE-RU-2019:1557-1 as SUSE-SLE-SERVER-12-SP4-2019-1557 is not security or has no CVEs. patches: SUSE-2019-1557,SUSE-SLE-DESKTOP-12-SP3-2019-1557,SUSE-SLE-DESKTOP-12-SP4-2019-1557,SUSE-SLE-SERVER-12-SP3-2019-1557,SUSE-SLE-SERVER-12-SP4-2019-1557 SKIP SUSE-RU-2019:1558-1 as SUSE-SLE-Product-WE-15-SP1-2019-1558 is not security or has no CVEs. patches: SUSE-2019-1558,SUSE-SLE-Module-Desktop-Applications-15-2019-1558,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1558,SUSE-SLE-Product-WE-15-2019-1558,SUSE-SLE-Product-WE-15-SP1-2019-1558 SKIP SUSE-RU-2019:1559-1 as SUSE-SLE-WE-12-SP4-2019-1559 is not security or has no CVEs. patches: SUSE-2019-1559,SUSE-SLE-DESKTOP-12-SP3-2019-1559,SUSE-SLE-DESKTOP-12-SP4-2019-1559,SUSE-SLE-SDK-12-SP3-2019-1559,SUSE-SLE-SDK-12-SP4-2019-1559,SUSE-SLE-SERVER-12-SP3-2019-1559,SUSE-SLE-SERVER-12-SP4-2019-1559,SUSE-SLE-WE-12-SP3-2019-1559,SUSE-SLE-WE-12-SP4-2019-1559 SKIP SUSE-RU-2019:1560-1 as SUSE-SLE-Module-Public-Cloud-15-2019-1560 is not security or has no CVEs. patches: SUSE-2019-1560,SUSE-SLE-Module-Public-Cloud-15-2019-1560 SKIP SUSE-RU-2019:1560-2 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1560 is not security or has no CVEs. patches: SUSE-2019-1560,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1560 SKIP SUSE-RU-2019:1564-1 as SUSE-SLE-Module-Server-Applications-15-2019-1564 is not security or has no CVEs. patches: SUSE-2019-1564,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1564,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1564,SUSE-SLE-Module-Server-Applications-15-2019-1564 SKIP SUSE-RU-2019:1565-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1565 is not security or has no CVEs. patches: SUSE-2019-1565,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1565,SUSE-SLE-Module-Public-Cloud-15-2019-1565,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1565 SKIP SUSE-RU-2019:1567-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1567 is not security or has no CVEs. patches: SUSE-2019-1567,SUSE-SLE-Module-Basesystem-15-SP1-2019-1567 SKIP SUSE-RU-2019:1568-1 as SUSE-SLE-SERVER-12-SP4-2019-1568 is not security or has no CVEs. patches: SUSE-2019-1568,SUSE-SLE-Module-Public-Cloud-12-2019-1568,SUSE-SLE-SERVER-12-SP3-2019-1568,SUSE-SLE-SERVER-12-SP4-2019-1568 SKIP SUSE-RU-2019:1571-1 as SUSE-SLE-Module-Public-Cloud-12-2019-1571 is not security or has no CVEs. patches: SUSE-2019-1571,SUSE-SLE-Module-Public-Cloud-12-2019-1571 SKIP SUSE-RU-2019:1572-1 as SUSE-SLE-SERVER-12-SP4-2019-1572 is not security or has no CVEs. patches: SUSE-2019-1572,SUSE-SLE-DESKTOP-12-SP3-2019-1572,SUSE-SLE-DESKTOP-12-SP4-2019-1572,SUSE-SLE-SERVER-12-SP3-2019-1572,SUSE-SLE-SERVER-12-SP4-2019-1572 SKIP SUSE-RU-2019:1573-1 as SUSE-SLE-SERVER-12-SP4-2019-1573 is not security or has no CVEs. patches: SUSE-2019-1573,SUSE-SLE-SDK-12-SP3-2019-1573,SUSE-SLE-SDK-12-SP4-2019-1573,SUSE-SLE-SERVER-12-SP3-2019-1573,SUSE-SLE-SERVER-12-SP4-2019-1573 SKIP SUSE-RU-2019:1575-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1575 is not security or has no CVEs. patches: SUSE-2019-1575,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-1575 SKIP SUSE-RU-2019:1577-1 as SUSE-SLE-Module-Basesystem-15-2019-1577 is not security or has no CVEs. patches: SUSE-2019-1577,SUSE-SLE-Module-Basesystem-15-2019-1577 SKIP SUSE-RU-2019:1589-1 as SUSE-SLE-SERVER-12-SP4-2019-1589 is not security or has no CVEs. patches: SUSE-2019-1589,SUSE-SLE-DESKTOP-12-SP4-2019-1589,SUSE-SLE-SERVER-12-SP4-2019-1589 SKIP SUSE-RU-2019:1590-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1590 is not security or has no CVEs. patches: SUSE-2019-1590,SUSE-SLE-Module-Basesystem-15-SP1-2019-1590 SKIP SUSE-RU-2019:1611-1 as SUSE-SLE-HA-12-SP4-2019-1611 is not security or has no CVEs. patches: SUSE-2019-1611,SUSE-SLE-HA-12-SP4-2019-1611 SKIP SUSE-RU-2019:1612-1 as SUSE-SLE-HA-12-SP3-2019-1612 is not security or has no CVEs. patches: SUSE-2019-1612,SUSE-SLE-HA-12-SP3-2019-1612 SKIP SUSE-RU-2019:1613-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1613 is not security or has no CVEs. patches: SUSE-2019-1613,SUSE-SLE-Module-Basesystem-15-SP1-2019-1613,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1613 SKIP SUSE-RU-2019:1614-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1614 is not security or has no CVEs. patches: SUSE-2019-1614,SUSE-SLE-Module-Basesystem-15-SP1-2019-1614 SKIP SUSE-RU-2019:1615-1 as SUSE-SLE-Module-Development-Tools-15-2019-1615 is not security or has no CVEs. patches: SUSE-2019-1615,SUSE-SLE-Module-Development-Tools-15-2019-1615,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1615 SKIP SUSE-RU-2019:1616-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1616 is not security or has no CVEs. patches: SUSE-2019-1616,SUSE-SLE-Module-Basesystem-15-2019-1616,SUSE-SLE-Module-Basesystem-15-SP1-2019-1616 SKIP SUSE-RU-2019:1617-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1617 is not security or has no CVEs. patches: SUSE-2019-1617,SUSE-SLE-Module-Basesystem-15-SP1-2019-1617 SKIP SUSE-RU-2019:1618-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1618 is not security or has no CVEs. patches: SUSE-2019-1618,SUSE-SLE-Module-Basesystem-15-SP1-2019-1618 SKIP SUSE-RU-2019:1619-1 as SUSE-SLE-WE-12-SP4-2019-1619 is not security or has no CVEs. patches: SUSE-2019-1619,SUSE-SLE-DESKTOP-12-SP3-2019-1619,SUSE-SLE-DESKTOP-12-SP4-2019-1619,SUSE-SLE-SDK-12-SP3-2019-1619,SUSE-SLE-SDK-12-SP4-2019-1619,SUSE-SLE-SERVER-12-SP3-2019-1619,SUSE-SLE-SERVER-12-SP4-2019-1619,SUSE-SLE-WE-12-SP3-2019-1619,SUSE-SLE-WE-12-SP4-2019-1619 SKIP SUSE-RU-2019:1620-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1620 is not security or has no CVEs. patches: SUSE-2019-1620,SUSE-SLE-Module-Basesystem-15-SP1-2019-1620 SKIP SUSE-RU-2019:1621-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1621 is not security or has no CVEs. patches: SUSE-2019-1621,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1621,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1621,SUSE-SLE-Module-Server-Applications-15-2019-1621,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1621 SKIP SUSE-RU-2019:1622-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1622 is not security or has no CVEs. patches: SUSE-2019-1622,SUSE-SLE-Module-RT-15-SP1-2019-1622,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1622 SKIP SUSE-RU-2019:1623-1 as SUSE-SLE-SERVER-12-SP4-2019-1623 is not security or has no CVEs. patches: SUSE-2019-1623,SUSE-SLE-DESKTOP-12-SP4-2019-1623,SUSE-SLE-SERVER-12-SP4-2019-1623 SKIP SUSE-RU-2019:1624-1 as SUSE-SLE-SERVER-12-SP3-2019-1624 is not security or has no CVEs. patches: SUSE-2019-1624,SUSE-SLE-DESKTOP-12-SP3-2019-1624,SUSE-SLE-SERVER-12-SP3-2019-1624 SKIP SUSE-RU-2019:1626-1 as SUSE-SLE-Module-Public-Cloud-12-2019-1626 is not security or has no CVEs. patches: SUSE-2019-1626,SUSE-SLE-Module-Public-Cloud-12-2019-1626 SKIP SUSE-RU-2019:1627-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1627 is not security or has no CVEs. patches: SUSE-2019-1627,SUSE-SLE-Module-Basesystem-15-2019-1627,SUSE-SLE-Module-Basesystem-15-SP1-2019-1627 SKIP SUSE-RU-2019:1628-1 as SUSE-Storage-5-2019-1628 is not security or has no CVEs. patches: SUSE-2019-1628,SUSE-SLE-DESKTOP-12-SP3-2019-1628,SUSE-SLE-DESKTOP-12-SP4-2019-1628,SUSE-SLE-HA-12-SP3-2019-1628,SUSE-SLE-HA-12-SP4-2019-1628,SUSE-SLE-SDK-12-SP3-2019-1628,SUSE-SLE-SDK-12-SP4-2019-1628,SUSE-SLE-SERVER-12-SP3-2019-1628,SUSE-SLE-SERVER-12-SP4-2019-1628,SUSE-Storage-5-2019-1628 SKIP SUSE-RU-2019:1630-1 as SUSE-SLE-SERVER-12-SP4-2019-1630 is not security or has no CVEs. patches: SUSE-2019-1630,SUSE-SLE-DESKTOP-12-SP3-2019-1630,SUSE-SLE-DESKTOP-12-SP4-2019-1630,SUSE-SLE-SERVER-12-SP3-2019-1630,SUSE-SLE-SERVER-12-SP4-2019-1630 SKIP SUSE-RU-2019:1631-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1631 is not security or has no CVEs. patches: SUSE-2019-1631,SUSE-SLE-Module-Basesystem-15-2019-1631,SUSE-SLE-Module-Basesystem-15-SP1-2019-1631,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1631 SKIP SUSE-RU-2019:1632-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1632 is not security or has no CVEs. patches: SUSE-2019-1632,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1632,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1632 SKIP SUSE-RU-2019:1633-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1633 is not security or has no CVEs. patches: SUSE-2019-1633,SUSE-SLE-Module-Basesystem-15-SP1-2019-1633,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1633,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1633,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1633 SKIP SUSE-RU-2019:1634-1 as SUSE-SLE-Product-HA-15-2019-1634 is not security or has no CVEs. patches: SUSE-2019-1634,SUSE-SLE-Product-HA-15-2019-1634 SKIP SUSE-RU-2019:1635-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1635 is not security or has no CVEs. patches: SUSE-2019-1635,SUSE-SLE-Module-Basesystem-15-SP1-2019-1635,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1635,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1635 SKIP SUSE-RU-2019:1639-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1639 is not security or has no CVEs. patches: SUSE-2019-1639,SUSE-SLE-Module-Basesystem-15-SP1-2019-1639 SKIP SUSE-RU-2019:1640-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1640 is not security or has no CVEs. patches: SUSE-2019-1640,SUSE-SLE-Module-Basesystem-15-SP1-2019-1640,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1640 SKIP SUSE-RU-2019:1641-1 as SUSE-SLE-SDK-12-SP4-2019-1641 is not security or has no CVEs. patches: SUSE-2019-1641,SUSE-SLE-SDK-12-SP3-2019-1641,SUSE-SLE-SDK-12-SP4-2019-1641 SKIP SUSE-RU-2019:1642-1 as SUSE-SLE-Module-RT-15-SP1-2019-1642 is not security or has no CVEs. patches: SUSE-2019-1642,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1642,SUSE-SLE-Module-RT-15-SP1-2019-1642 SKIP SUSE-RU-2019:1646-1 as SUSE-SLE-Product-WE-15-SP1-2019-1646 is not security or has no CVEs. patches: SUSE-2019-1646,SUSE-SLE-Product-WE-15-2019-1646,SUSE-SLE-Product-WE-15-SP1-2019-1646 SKIP SUSE-RU-2019:1647-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1647 is not security or has no CVEs. patches: SUSE-2019-1647,SUSE-SLE-Module-Basesystem-15-SP1-2019-1647 SKIP SUSE-RU-2019:1688-1 as SUSE-SLE-POS-12-SP2-2019-1688 is not security or has no CVEs. patches: SUSE-2019-1688,SUSE-SLE-POS-12-SP2-2019-1688 SKIP SUSE-RU-2019:1691-1 as SUSE-SLE-Module-Basesystem-15-2019-1691 is not security or has no CVEs. patches: SUSE-2019-1691,SUSE-SLE-Manager-Tools-15-2019-1691,SUSE-SLE-Module-Basesystem-15-2019-1691,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1691,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1691 SKIP SUSE-RU-2019:1695-1 as SUSE-SUSE-Manager-Server-3.2-2019-1695 is not security or has no CVEs. patches: SUSE-2019-1695,SUSE-SLE-Manager-Tools-12-2019-1695,SUSE-SUSE-Manager-Proxy-3.1-2019-1695,SUSE-SUSE-Manager-Proxy-3.2-2019-1695,SUSE-SUSE-Manager-Server-3.1-2019-1695,SUSE-SUSE-Manager-Server-3.2-2019-1695 SKIP SUSE-RU-2019:1695-2 as SUSE-SLE-SERVER-12-SP5-2020-1912 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1912,SUSE-2019-1695,SUSE-OpenStack-Cloud-8-2020-1912,SUSE-OpenStack-Cloud-9-2020-1912,SUSE-OpenStack-Cloud-Crowbar-8-2020-1912,SUSE-OpenStack-Cloud-Crowbar-9-2020-1912,SUSE-SLE-SAP-12-SP3-2020-1912,SUSE-SLE-SAP-12-SP4-2020-1912,SUSE-SLE-SERVER-12-SP3-2020-1912,SUSE-SLE-SERVER-12-SP3-BCL-2020-1912,SUSE-SLE-SERVER-12-SP4-LTSS-2020-1912,SUSE-SLE-SERVER-12-SP5-2020-1912,SUSE-Storage-5-2020-1912 SKIP SUSE-RU-2019:1698-1 as SUSE-SLE-Module-Python2-15-SP1-2019-1698 is not security or has no CVEs. patches: SUSE-2019-1698,SUSE-SLE-Module-Basesystem-15-SP1-2019-1698,SUSE-SLE-Module-Python2-15-SP1-2019-1698 SKIP SUSE-RU-2019:1699-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1699 is not security or has no CVEs. patches: SUSE-2019-1699,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1699,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-1699,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-1699,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1699 SKIP SUSE-RU-2019:1700-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1700 is not security or has no CVEs. patches: SUSE-2019-1700,SUSE-SLE-Module-Basesystem-15-SP1-2019-1700,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1700 SKIP SUSE-RU-2019:1701-1 as SUSE-SLE-SERVER-12-SP4-2019-1701 is not security or has no CVEs. patches: SUSE-2019-1701,SUSE-SLE-DESKTOP-12-SP3-2019-1701,SUSE-SLE-DESKTOP-12-SP4-2019-1701,SUSE-SLE-SDK-12-SP3-2019-1701,SUSE-SLE-SDK-12-SP4-2019-1701,SUSE-SLE-SERVER-12-SP3-2019-1701,SUSE-SLE-SERVER-12-SP4-2019-1701 SKIP SUSE-RU-2019:1702-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1702 is not security or has no CVEs. patches: SUSE-2019-1702,SUSE-SLE-Module-Basesystem-15-SP1-2019-1702 SKIP SUSE-RU-2019:1706-1 as SUSE-SUSE-Manager-Server-3.2-2019-1706 is not security or has no CVEs. patches: SUSE-2019-1706,SUSE-SUSE-Manager-Proxy-3.2-2019-1706,SUSE-SUSE-Manager-Server-3.2-2019-1706 SKIP SUSE-RU-2019:1710-1 as SUSE-SLE-Module-Server-Applications-15-2019-1710 is not security or has no CVEs. patches: SUSE-2019-1710,SUSE-SLE-Manager-Tools-15-2019-1710,SUSE-SLE-Module-Basesystem-15-2019-1710,SUSE-SLE-Module-Server-Applications-15-2019-1710 SKIP SUSE-RU-2019:1713-1 as SUSE-SUSE-Manager-Server-3.2-2019-1713 is not security or has no CVEs. patches: SUSE-2019-1713,SUSE-SLE-Manager-Tools-12-2019-1713,SUSE-SLE-Module-Adv-Systems-Management-12-2019-1713,SUSE-SLE-POS-12-SP2-2019-1713,SUSE-SUSE-Manager-Proxy-3.1-2019-1713,SUSE-SUSE-Manager-Proxy-3.2-2019-1713,SUSE-SUSE-Manager-Server-3.1-2019-1713,SUSE-SUSE-Manager-Server-3.2-2019-1713 SKIP SUSE-RU-2019:1714-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1714 is not security or has no CVEs. patches: SUSE-2019-1714,SUSE-SLE-Module-Basesystem-15-SP1-2019-1714,SUSE-SLE-Module-Python2-15-SP1-2019-1714,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1714 SKIP SUSE-RU-2019:1715-1 as SUSE-SLE-SERVER-12-SP4-2019-1715 is not security or has no CVEs. patches: SUSE-2019-1715,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1715,SUSE-SLE-DESKTOP-12-SP3-2019-1715,SUSE-SLE-DESKTOP-12-SP4-2019-1715,SUSE-SLE-Module-Public-Cloud-12-2019-1715,SUSE-SLE-SDK-12-SP3-2019-1715,SUSE-SLE-SDK-12-SP4-2019-1715,SUSE-SLE-SERVER-12-SP3-2019-1715,SUSE-SLE-SERVER-12-SP4-2019-1715 SKIP SUSE-RU-2019:1720-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1720 is not security or has no CVEs. patches: SUSE-2019-1720,SUSE-SLE-Module-Server-Applications-15-2019-1720,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1720 SKIP SUSE-RU-2019:1723-1 as SUSE-SLE-HA-12-SP3-2019-1723 is not security or has no CVEs. patches: SUSE-2019-1723,SUSE-SLE-HA-12-SP3-2019-1723 SKIP SUSE-RU-2019:1726-1 as SUSE-SLE-SERVER-12-SP4-2019-1726 is not security or has no CVEs. patches: SUSE-2019-1726,SUSE-SLE-DESKTOP-12-SP3-2019-1726,SUSE-SLE-DESKTOP-12-SP4-2019-1726,SUSE-SLE-SERVER-12-SP3-2019-1726,SUSE-SLE-SERVER-12-SP4-2019-1726 SKIP SUSE-RU-2019:1727-1 as SUSE-Storage-5-2019-1727 is not security or has no CVEs. patches: SUSE-2019-1727,SUSE-SLE-DESKTOP-12-SP3-2019-1727,SUSE-SLE-DESKTOP-12-SP4-2019-1727,SUSE-SLE-SDK-12-SP3-2019-1727,SUSE-SLE-SDK-12-SP4-2019-1727,SUSE-SLE-SERVER-12-SP3-2019-1727,SUSE-SLE-SERVER-12-SP4-2019-1727,SUSE-Storage-5-2019-1727 SKIP SUSE-RU-2019:1728-1 as SUSE-SLE-Module-Legacy-15-SP1-2019-1728 is not security or has no CVEs. patches: SUSE-2019-1728,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1728,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1728,SUSE-SLE-Module-Legacy-15-2019-1728,SUSE-SLE-Module-Legacy-15-SP1-2019-1728 SKIP SUSE-RU-2019:1729-1 as SUSE-SLE-SERVER-12-SP4-2019-1729 is not security or has no CVEs. patches: SUSE-2019-1729,SUSE-SLE-DESKTOP-12-SP4-2019-1729,SUSE-SLE-SDK-12-SP4-2019-1729,SUSE-SLE-SERVER-12-SP4-2019-1729 SKIP SUSE-RU-2019:1730-1 as SUSE-2019-1730 is not security or has no CVEs. patches: SUSE-2019-1730,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1730,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1730 SKIP SUSE-RU-2019:1732-1 as SUSE-2019-1732 is not security or has no CVEs. patches: SUSE-2019-1732,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1732,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1732 SKIP SUSE-RU-2019:1735-1 as SUSE-SLE-HA-12-SP3-2019-1735 is not security or has no CVEs. patches: SUSE-2019-1735,SUSE-SLE-HA-12-SP3-2019-1735 SKIP SUSE-RU-2019:1736-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1736 is not security or has no CVEs. patches: SUSE-2019-1736,SUSE-SLE-Module-Basesystem-15-SP1-2019-1736 SKIP SUSE-RU-2019:1737-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1737 is not security or has no CVEs. patches: SUSE-2019-1737,SUSE-SLE-Module-Basesystem-15-SP1-2019-1737,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1737,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1737 SKIP SUSE-RU-2019:1738-1 as SUSE-SLE-Module-Server-Applications-15-2019-1738 is not security or has no CVEs. patches: SUSE-2019-1738,SUSE-SLE-Module-Basesystem-15-2019-1738,SUSE-SLE-Module-Server-Applications-15-2019-1738 SKIP SUSE-RU-2019:1739-1 as SUSE-SLE-SERVER-12-SP4-2019-1739 is not security or has no CVEs. patches: SUSE-2019-1739,SUSE-SLE-DESKTOP-12-SP4-2019-1739,SUSE-SLE-SDK-12-SP4-2019-1739,SUSE-SLE-SERVER-12-SP4-2019-1739 SKIP SUSE-RU-2019:1741-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1741 is not security or has no CVEs. patches: SUSE-2019-1741,SUSE-SLE-Module-Desktop-Applications-15-2019-1741,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1741,SUSE-SLE-Module-Development-Tools-15-2019-1741,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1741 SKIP SUSE-RU-2019:1742-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1742 is not security or has no CVEs. patches: SUSE-2019-1742,SUSE-SLE-Module-Basesystem-15-2019-1742,SUSE-SLE-Module-Basesystem-15-SP1-2019-1742,SUSE-SLE-Module-Desktop-Applications-15-2019-1742,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1742,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1742 SKIP SUSE-RU-2019:1743-1 as SUSE-SLE-SERVER-12-SP4-2019-1743 is not security or has no CVEs. patches: SUSE-2019-1743,SUSE-SLE-SERVER-12-SP3-2019-1743,SUSE-SLE-SERVER-12-SP4-2019-1743 SKIP SUSE-RU-2019:1747-1 as SUSE-SLE-Product-HA-15-SP1-2019-1747 is not security or has no CVEs. patches: SUSE-2019-1747,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1747,SUSE-SLE-Product-HA-15-2019-1747,SUSE-SLE-Product-HA-15-SP1-2019-1747 SKIP SUSE-RU-2019:1751-1 as SUSE-SLE-HA-12-SP4-2019-1751 is not security or has no CVEs. patches: SUSE-2019-1751,SUSE-SLE-HA-12-SP4-2019-1751 SKIP SUSE-RU-2019:1752-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1752 is not security or has no CVEs. patches: SUSE-2019-1752,SUSE-SLE-Module-Desktop-Applications-15-2019-1752,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1752 SKIP SUSE-RU-2019:1753-1 as SUSE-SLE-HA-12-SP4-2019-1753 is not security or has no CVEs. patches: SUSE-2019-1753,SUSE-SLE-HA-12-SP4-2019-1753 SKIP SUSE-RU-2019:1754-1 as SUSE-SLE-SERVER-12-SP3-2019-1754 is not security or has no CVEs. patches: SUSE-2019-1754,SUSE-SLE-DESKTOP-12-SP3-2019-1754,SUSE-SLE-SDK-12-SP3-2019-1754,SUSE-SLE-SERVER-12-SP3-2019-1754 SKIP SUSE-RU-2019:1756-1 as SUSE-SLE-HA-12-SP3-2019-1756 is not security or has no CVEs. patches: SUSE-2019-1756,SUSE-SLE-HA-12-SP3-2019-1756 SKIP SUSE-RU-2019:1757-1 as SUSE-SLE-Module-Basesystem-15-2019-1757 is not security or has no CVEs. patches: SUSE-2019-1757,SUSE-SLE-Module-Basesystem-15-2019-1757 SKIP SUSE-RU-2019:1758-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-1758 is not security or has no CVEs. patches: SUSE-2019-1758,SUSE-OpenStack-Cloud-9-2019-1758,SUSE-OpenStack-Cloud-Crowbar-9-2019-1758 SKIP SUSE-RU-2019:1762-1 as SUSE-Storage-4-2019-1762 is not security or has no CVEs. patches: SUSE-2019-1762,SUSE-OpenStack-Cloud-7-2019-1762,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1762,SUSE-SLE-DESKTOP-12-SP3-2019-1762,SUSE-SLE-SAP-12-SP2-2019-1762,SUSE-SLE-SERVER-12-SP2-2019-1762,SUSE-SLE-SERVER-12-SP2-BCL-2019-1762,SUSE-SLE-SERVER-12-SP3-2019-1762,SUSE-Storage-4-2019-1762 SKIP SUSE-RU-2019:1763-1 as SUSE-SLE-SERVER-12-SP4-2019-1763 is not security or has no CVEs. patches: SUSE-2019-1763,SUSE-SLE-DESKTOP-12-SP4-2019-1763,SUSE-SLE-SDK-12-SP4-2019-1763,SUSE-SLE-SERVER-12-SP4-2019-1763 SKIP SUSE-RU-2019:1764-1 as SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1764 is not security or has no CVEs. patches: SUSE-2019-1764,SUSE-SLE-DESKTOP-12-SP3-2019-1764,SUSE-SLE-SERVER-12-SP3-2019-1764,SUSE-SLE-SERVER-INSTALLER-12-SP3-2019-1764 SKIP SUSE-RU-2019:1778-1 as SUSE-SLE-SERVER-12-SP4-2019-1778 is not security or has no CVEs. patches: SUSE-2019-1778,SUSE-SLE-SDK-12-SP4-2019-1778,SUSE-SLE-SERVER-12-SP4-2019-1778 SKIP SUSE-RU-2019:1779-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1779 is not security or has no CVEs. patches: SUSE-2019-1779,SUSE-SLE-Module-Basesystem-15-SP1-2019-1779,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1779 SKIP SUSE-RU-2019:1780-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1780 is not security or has no CVEs. patches: SUSE-2019-1780,SUSE-SLE-Module-Basesystem-15-2019-1780,SUSE-SLE-Module-Basesystem-15-SP1-2019-1780,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1780,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1780 SKIP SUSE-RU-2019:1781-1 as SUSE-SLE-SAP-12-SP4-2019-1781 is not security or has no CVEs. patches: SUSE-2019-1781,SUSE-SLE-SAP-12-SP4-2019-1781 SKIP SUSE-RU-2019:1782-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1782 is not security or has no CVEs. patches: SUSE-2019-1782,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1782 SKIP SUSE-RU-2019:1788-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1788 is not security or has no CVEs. patches: SUSE-2019-1788,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1788,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-1788,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-1788,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-1788 ERROR: notice SUSE-RU-2019:1793-1 has no valid patches out of: SUSE-2019-1793,SUSE-SLE-DESKTOP-12-SP4-2019-1793,SUSE-SLE-DESKTOP-12-SP5-2019-1793,SUSE-SLE-SERVER-12-SP5-2019-1793 ERROR: notice SUSE-RU-2019:1793-2 has no valid patches out of: SUSE-2019-1793,SUSE-SLE-DESKTOP-12-SP5-2019-1793,SUSE-SLE-SERVER-12-SP5-2019-1793 SKIP SUSE-RU-2019:1795-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1795 is not security or has no CVEs. patches: SUSE-2019-1795,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1795 SKIP SUSE-RU-2019:1796-1 as SUSE-SLE-Module-SAP-Applications-15-2019-1796 is not security or has no CVEs. patches: SUSE-2019-1796,SUSE-SLE-Module-SAP-Applications-15-2019-1796 SKIP SUSE-RU-2019:1797-1 as SUSE-SLE-SERVER-12-SP4-2019-1797 is not security or has no CVEs. patches: SUSE-2019-1797,SUSE-SLE-DESKTOP-12-SP4-2019-1797,SUSE-SLE-SERVER-12-SP4-2019-1797 SKIP SUSE-RU-2019:1798-1 as SUSE-SLE-Module-Server-Applications-15-2019-1798 is not security or has no CVEs. patches: SUSE-2019-1798,SUSE-SLE-Module-Basesystem-15-2019-1798,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1798,SUSE-SLE-Module-Server-Applications-15-2019-1798 SKIP SUSE-RU-2019:1799-1 as SUSE-SLE-SERVER-12-SP4-2019-1799 is not security or has no CVEs. patches: SUSE-2019-1799,SUSE-SLE-DESKTOP-12-SP4-2019-1799,SUSE-SLE-SDK-12-SP4-2019-1799,SUSE-SLE-SERVER-12-SP4-2019-1799 SKIP SUSE-RU-2019:1800-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1800 is not security or has no CVEs. patches: SUSE-2019-1800,SUSE-SLE-Module-Basesystem-15-SP1-2019-1800 SKIP SUSE-RU-2019:1801-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1801 is not security or has no CVEs. patches: SUSE-2019-1801,SUSE-SLE-Module-Basesystem-15-SP1-2019-1801 SKIP SUSE-RU-2019:1805-1 as SUSE-SUSE-Manager-Server-3.2-2019-1805 is not security or has no CVEs. patches: SUSE-2019-1805,SUSE-SLE-Manager-Tools-12-2019-1805,SUSE-SLE-Module-Adv-Systems-Management-12-2019-1805,SUSE-SLE-Module-Public-Cloud-12-2019-1805,SUSE-SLE-POS-12-SP2-2019-1805,SUSE-SUSE-Manager-Proxy-3.2-2019-1805,SUSE-SUSE-Manager-Server-3.2-2019-1805 SKIP SUSE-RU-2019:1807-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1807 is not security or has no CVEs. patches: SUSE-2019-1807,SUSE-SLE-Module-Basesystem-15-2019-1807,SUSE-SLE-Module-Basesystem-15-SP1-2019-1807,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1807,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1807 SKIP SUSE-RU-2019:1808-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1808 is not security or has no CVEs. patches: SUSE-2019-1808,SUSE-SLE-Module-Basesystem-15-SP1-2019-1808,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1808 SKIP SUSE-RU-2019:1814-1 as SUSE-Storage-6-2019-1814 is not security or has no CVEs. patches: SUSE-2019-1814,SUSE-Storage-6-2019-1814 SKIP SUSE-RU-2019:1815-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1815 is not security or has no CVEs. patches: SUSE-2019-1815,SUSE-SLE-Module-Basesystem-15-2019-1815,SUSE-SLE-Module-Basesystem-15-SP1-2019-1815 SKIP SUSE-RU-2019:1816-1 as SUSE-SLE-SDK-12-SP4-2019-1816 is not security or has no CVEs. patches: SUSE-2019-1816,SUSE-SLE-SDK-12-SP4-2019-1816 SKIP SUSE-RU-2019:1817-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1817 is not security or has no CVEs. patches: SUSE-2019-1817,SUSE-SLE-Module-Basesystem-15-SP1-2019-1817 SKIP SUSE-RU-2019:1818-1 as SUSE-Storage-5-2019-1818 is not security or has no CVEs. patches: SUSE-2019-1818,SUSE-OpenStack-Cloud-7-2019-1818,SUSE-OpenStack-Cloud-8-2019-1818,SUSE-SLE-DESKTOP-12-SP4-2019-1818,SUSE-SLE-SAP-12-SP1-2019-1818,SUSE-SLE-SAP-12-SP2-2019-1818,SUSE-SLE-SAP-12-SP3-2019-1818,SUSE-SLE-SERVER-12-2019-1818,SUSE-SLE-SERVER-12-SP1-2019-1818,SUSE-SLE-SERVER-12-SP2-2019-1818,SUSE-SLE-SERVER-12-SP2-BCL-2019-1818,SUSE-SLE-SERVER-12-SP3-2019-1818,SUSE-SLE-SERVER-12-SP4-2019-1818,SUSE-Storage-4-2019-1818,SUSE-Storage-5-2019-1818 SKIP SUSE-RU-2019:1818-2 as SUSE-SLE-SERVER-12-SP3-BCL-2019-1818 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1818,SUSE-2019-1818,SUSE-OpenStack-Cloud-Crowbar-8-2019-1818,SUSE-SLE-SERVER-12-SP3-2019-1818,SUSE-SLE-SERVER-12-SP3-BCL-2019-1818 SKIP SUSE-RU-2019:1818-3 as SUSE-Storage-5-2019-1818 is not security or has no CVEs. patches: SUSE-2019-1818,SUSE-Storage-5-2019-1818 SKIP SUSE-RU-2019:1822-1 as SUSE-SLE-Manager-Tools-15-2019-1822 is not security or has no CVEs. patches: SUSE-2019-1822,SUSE-SLE-Manager-Tools-15-2019-1822,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1822 ERROR: notice SUSE-RU-2019:1836-1 has no valid patches out of: SUSE-2019-1836,SUSE-SLE-DESKTOP-12-SP5-2019-1836,SUSE-SLE-SERVER-12-SP5-2019-1836 ERROR: notice SUSE-RU-2019:1839-1 has no valid patches out of: SUSE-2019-1839,SUSE-SLE-DESKTOP-12-SP5-2019-1839,SUSE-SLE-SERVER-12-SP5-2019-1839 ERROR: notice SUSE-RU-2019:1841-1 has no valid patches out of: SUSE-2019-1841,SUSE-SLE-DESKTOP-12-SP5-2019-1841,SUSE-SLE-SERVER-12-SP5-2019-1841 ERROR: notice SUSE-RU-2019:1842-1 has no valid patches out of: SUSE-2019-1842,SUSE-SLE-DESKTOP-12-SP5-2019-1842,SUSE-SLE-SERVER-12-SP5-2019-1842 SKIP SUSE-RU-2019:1843-1 as SUSE-SLE-SERVER-12-SP3-2019-1843 is not security or has no CVEs. patches: SUSE-2019-1843,SUSE-SLE-SERVER-12-SP3-2019-1843 SKIP SUSE-RU-2019:1843-2 as SUSE-Storage-5-2019-1843 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1843,SUSE-2019-1843,SUSE-OpenStack-Cloud-8-2019-1843,SUSE-OpenStack-Cloud-Crowbar-8-2019-1843,SUSE-SLE-SAP-12-SP3-2019-1843,SUSE-Storage-5-2019-1843 SKIP SUSE-RU-2019:1844-1 as SUSE-SLE-SERVER-12-SP4-2019-1844 is not security or has no CVEs. patches: SUSE-2019-1844,SUSE-SLE-DESKTOP-12-SP4-2019-1844,SUSE-SLE-SDK-12-SP4-2019-1844,SUSE-SLE-SERVER-12-SP4-2019-1844 SKIP SUSE-RU-2019:1844-2 as SUSE-Storage-5-2019-1844 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1844,SUSE-2019-1844,SUSE-OpenStack-Cloud-7-2019-1844,SUSE-OpenStack-Cloud-8-2019-1844,SUSE-OpenStack-Cloud-Crowbar-8-2019-1844,SUSE-SLE-SAP-12-SP1-2019-1844,SUSE-SLE-SAP-12-SP2-2019-1844,SUSE-SLE-SAP-12-SP3-2019-1844,SUSE-SLE-SERVER-12-SP1-2019-1844,SUSE-SLE-SERVER-12-SP2-2019-1844,SUSE-SLE-SERVER-12-SP2-BCL-2019-1844,SUSE-SLE-SERVER-12-SP3-2019-1844,SUSE-SLE-SERVER-12-SP3-BCL-2019-1844,SUSE-Storage-4-2019-1844,SUSE-Storage-5-2019-1844 SKIP SUSE-RU-2019:1845-1 as SUSE-SLE-SERVER-12-SP4-2019-1845 is not security or has no CVEs. patches: SUSE-2019-1845,SUSE-SLE-DESKTOP-12-SP4-2019-1845,SUSE-SLE-SERVER-12-SP4-2019-1845 SKIP SUSE-RU-2019:1853-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1853 is not security or has no CVEs. patches: SUSE-2019-1853,SUSE-SLE-Module-Basesystem-15-2019-1853,SUSE-SLE-Module-Basesystem-15-SP1-2019-1853,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1853,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1853 SKIP SUSE-RU-2019:1857-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1857 is not security or has no CVEs. patches: SUSE-2019-1857,SUSE-SLE-Module-Basesystem-15-SP1-2019-1857,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1857,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1857 SKIP SUSE-RU-2019:1863-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1863 is not security or has no CVEs. patches: SUSE-2019-1863,SUSE-SLE-Module-Basesystem-15-SP1-2019-1863 SKIP SUSE-RU-2019:1864-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-1864 is not security or has no CVEs. patches: SUSE-2019-1864,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1864 SKIP SUSE-RU-2019:1865-1 as SUSE-SLE-SERVER-12-SP1-2019-1865 is not security or has no CVEs. patches: SUSE-2019-1865,SUSE-SLE-SAP-12-SP1-2019-1865,SUSE-SLE-SERVER-12-SP1-2019-1865 SKIP SUSE-RU-2019:1873-1 as SUSE-SLE-SAP-12-SP4-2019-1873 is not security or has no CVEs. patches: SUSE-2019-1873,SUSE-SLE-SAP-12-SP4-2019-1873 SKIP SUSE-RU-2019:1874-1 as SUSE-SLE-SAP-12-SP3-2019-1874 is not security or has no CVEs. patches: SUSE-2019-1874,SUSE-SLE-SAP-12-SP3-2019-1874 SKIP SUSE-RU-2019:1875-1 as SUSE-SLE-Product-WE-15-SP1-2019-1875 is not security or has no CVEs. patches: SUSE-2019-1875,SUSE-SLE-Module-Desktop-Applications-15-2019-1875,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1875,SUSE-SLE-Product-WE-15-2019-1875,SUSE-SLE-Product-WE-15-SP1-2019-1875 SKIP SUSE-RU-2019:1876-1 as SUSE-SLE-SAP-12-SP4-2019-1876 is not security or has no CVEs. patches: SUSE-2019-1876,SUSE-SLE-SAP-12-SP2-2019-1876,SUSE-SLE-SAP-12-SP3-2019-1876,SUSE-SLE-SAP-12-SP4-2019-1876 SKIP SUSE-RU-2019:1892-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1892 is not security or has no CVEs. patches: SUSE-2019-1892,SUSE-SLE-Module-Basesystem-15-2019-1892,SUSE-SLE-Module-Basesystem-15-SP1-2019-1892,SUSE-SLE-Module-Server-Applications-15-2019-1892,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1892 SKIP SUSE-RU-2019:1898-1 as SUSE-SLE-SERVER-12-SP4-2019-1898 is not security or has no CVEs. patches: SUSE-2019-1898,SUSE-SLE-DESKTOP-12-SP4-2019-1898,SUSE-SLE-SERVER-12-SP4-2019-1898 SKIP SUSE-RU-2019:1899-1 as SUSE-SLE-HA-12-SP3-2019-1899 is not security or has no CVEs. patches: SUSE-2019-1899,SUSE-SLE-HA-12-SP3-2019-1899 SKIP SUSE-RU-2019:1900-1 as SUSE-SLE-SERVER-12-SP4-2019-1900 is not security or has no CVEs. patches: SUSE-2019-1900,SUSE-SLE-DESKTOP-12-SP4-2019-1900,SUSE-SLE-SERVER-12-SP4-2019-1900 SKIP SUSE-RU-2019:1901-1 as SUSE-SLE-SERVER-12-SP4-2019-1901 is not security or has no CVEs. patches: SUSE-2019-1901,SUSE-SLE-SERVER-12-SP4-2019-1901 SKIP SUSE-RU-2019:1902-1 as SUSE-SLE-SERVER-12-SP1-2019-1902 is not security or has no CVEs. patches: SUSE-2019-1902,SUSE-SLE-SAP-12-SP1-2019-1902,SUSE-SLE-SERVER-12-SP1-2019-1902 SKIP SUSE-RU-2019:1904-1 as SUSE-Storage-5-2019-1904 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1904,SUSE-2019-1904,SUSE-OpenStack-Cloud-7-2019-1904,SUSE-OpenStack-Cloud-8-2019-1904,SUSE-OpenStack-Cloud-Crowbar-8-2019-1904,SUSE-SLE-DESKTOP-12-SP4-2019-1904,SUSE-SLE-DESKTOP-12-SP5-2019-1904,SUSE-SLE-SAP-12-SP2-2019-1904,SUSE-SLE-SAP-12-SP3-2019-1904,SUSE-SLE-SERVER-12-SP2-2019-1904,SUSE-SLE-SERVER-12-SP2-BCL-2019-1904,SUSE-SLE-SERVER-12-SP3-2019-1904,SUSE-SLE-SERVER-12-SP3-BCL-2019-1904,SUSE-SLE-SERVER-12-SP4-2019-1904,SUSE-SLE-SERVER-12-SP5-2019-1904,SUSE-Storage-4-2019-1904,SUSE-Storage-5-2019-1904 SKIP SUSE-RU-2019:1904-2 as SUSE-Storage-5-2019-1904 is not security or has no CVEs. patches: SUSE-2019-1904,SUSE-Storage-5-2019-1904 SKIP SUSE-RU-2019:1908-1 as SUSE-SLE-Module-Server-Applications-15-2019-1908 is not security or has no CVEs. patches: SUSE-2019-1908,SUSE-SLE-Module-Basesystem-15-2019-1908,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1908,SUSE-SLE-Module-Server-Applications-15-2019-1908 SKIP SUSE-RU-2019:1911-1 as SUSE-Storage-5-2019-1911 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-1911,SUSE-2019-1911,SUSE-OpenStack-Cloud-8-2019-1911,SUSE-OpenStack-Cloud-Crowbar-8-2019-1911,SUSE-SLE-SAP-12-SP3-2019-1911,SUSE-SLE-SERVER-12-SP3-2019-1911,SUSE-SLE-SERVER-12-SP3-BCL-2019-1911,SUSE-Storage-5-2019-1911 SKIP SUSE-RU-2019:1911-2 as SUSE-Storage-5-2019-1911 is not security or has no CVEs. patches: SUSE-2019-1911,SUSE-Storage-5-2019-1911 SKIP SUSE-RU-2019:1912-1 as SUSE-Storage-4-2019-1912 is not security or has no CVEs. patches: SUSE-2019-1912,SUSE-OpenStack-Cloud-7-2019-1912,SUSE-SLE-SAP-12-SP2-2019-1912,SUSE-SLE-SERVER-12-SP2-2019-1912,SUSE-SLE-SERVER-12-SP2-BCL-2019-1912,SUSE-Storage-4-2019-1912 SKIP SUSE-RU-2019:1913-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1913 is not security or has no CVEs. patches: SUSE-2019-1913,SUSE-SLE-Module-Desktop-Applications-15-2019-1913,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1913 SKIP SUSE-RU-2019:1914-1 as SUSE-SLE-Product-WE-15-SP1-2019-1914 is not security or has no CVEs. patches: SUSE-2019-1914,SUSE-SLE-Module-Basesystem-15-2019-1914,SUSE-SLE-Module-Basesystem-15-SP1-2019-1914,SUSE-SLE-Module-Desktop-Applications-15-2019-1914,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-1914,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1914,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1914,SUSE-SLE-Product-WE-15-2019-1914,SUSE-SLE-Product-WE-15-SP1-2019-1914 SKIP SUSE-RU-2019:1915-1 as SUSE-SLE-DESKTOP-12-SP4-2019-1915 is not security or has no CVEs. patches: SUSE-2019-1915,SUSE-SLE-DESKTOP-12-SP4-2019-1915,SUSE-SLE-SDK-12-SP4-2019-1915,SUSE-SLE-SERVER-12-SP4-2019-1915 SKIP SUSE-RU-2019:1915-2 as SUSE-Storage-5-2020-1577 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1577,SUSE-2019-1915,SUSE-OpenStack-Cloud-7-2020-1577,SUSE-OpenStack-Cloud-8-2020-1577,SUSE-OpenStack-Cloud-Crowbar-8-2020-1577,SUSE-SLE-SAP-12-SP2-2020-1577,SUSE-SLE-SAP-12-SP3-2020-1577,SUSE-SLE-SERVER-12-SP2-2020-1577,SUSE-SLE-SERVER-12-SP2-BCL-2020-1577,SUSE-SLE-SERVER-12-SP3-2020-1577,SUSE-SLE-SERVER-12-SP3-BCL-2020-1577,SUSE-Storage-5-2020-1577 SKIP SUSE-RU-2019:1916-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1916 is not security or has no CVEs. patches: SUSE-2019-1916,SUSE-SLE-Module-SAP-Applications-15-2019-1916,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-1916 SKIP SUSE-RU-2019:1917-1 as SUSE-SLE-Product-HA-15-SP1-2019-1917 is not security or has no CVEs. patches: SUSE-2019-1917,SUSE-SLE-Product-HA-15-SP1-2019-1917 SKIP SUSE-RU-2019:1918-1 as SUSE-SLE-HA-12-SP4-2019-1918 is not security or has no CVEs. patches: SUSE-2019-1918,SUSE-SLE-HA-12-SP4-2019-1918 SKIP SUSE-RU-2019:1919-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1919 is not security or has no CVEs. patches: SUSE-2019-1919,SUSE-SLE-Module-Basesystem-15-SP1-2019-1919,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1919,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1919 SKIP SUSE-RU-2019:1920-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1920 is not security or has no CVEs. patches: SUSE-2019-1920,SUSE-SLE-Module-Basesystem-15-SP1-2019-1920 SKIP SUSE-RU-2019:1957-1 as SUSE-SLE-SERVER-12-SP4-2019-1957 is not security or has no CVEs. patches: SUSE-2019-1957,SUSE-SLE-DESKTOP-12-SP4-2019-1957,SUSE-SLE-SERVER-12-SP4-2019-1957 SKIP SUSE-RU-2019:1959-1 as SUSE-SLE-HA-12-SP2-2019-1959 is not security or has no CVEs. patches: SUSE-2019-1959,SUSE-SLE-HA-12-SP2-2019-1959 SKIP SUSE-RU-2019:1965-1 as SUSE-SUSE-Manager-Server-3.2-2019-1965 is not security or has no CVEs. patches: SUSE-2019-1965,SUSE-SUSE-Manager-Proxy-3.2-2019-1965,SUSE-SUSE-Manager-Server-3.2-2019-1965 SKIP SUSE-RU-2019:1966-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1966 is not security or has no CVEs. patches: SUSE-2019-1966,SUSE-SLE-Module-Basesystem-15-2019-1966,SUSE-SLE-Module-Basesystem-15-SP1-2019-1966,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1966,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1966,SUSE-SLE-Module-Server-Applications-15-2019-1966,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1966 SKIP SUSE-RU-2019:1967-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1967 is not security or has no CVEs. patches: SUSE-2019-1967,SUSE-SLE-Module-Basesystem-15-2019-1967,SUSE-SLE-Module-Basesystem-15-SP1-2019-1967,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1967,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1967 ERROR: notice SUSE-RU-2019:1968-1 has no valid patches out of: SUSE-2019-1968,SUSE-SLE-DESKTOP-12-SP5-2019-1968,SUSE-SLE-SERVER-12-SP5-2019-1968 SKIP SUSE-RU-2019:1969-1 as SUSE-SLE-SERVER-12-SP4-2019-1969 is not security or has no CVEs. patches: SUSE-2019-1969,SUSE-SLE-DESKTOP-12-SP4-2019-1969,SUSE-SLE-SERVER-12-SP4-2019-1969 SKIP SUSE-RU-2019:1970-1 as SUSE-SUSE-Manager-Server-3.2-2019-1970 is not security or has no CVEs. patches: SUSE-2019-1970,SUSE-SUSE-Manager-Proxy-3.2-2019-1970,SUSE-SUSE-Manager-Server-3.2-2019-1970 SKIP SUSE-RU-2019:1974-1 as SUSE-SLE-SAP-12-SP4-2019-1974 is not security or has no CVEs. patches: SUSE-2019-1974,SUSE-SLE-SAP-12-SP1-2019-1974,SUSE-SLE-SAP-12-SP2-2019-1974,SUSE-SLE-SAP-12-SP3-2019-1974,SUSE-SLE-SAP-12-SP4-2019-1974 SKIP SUSE-RU-2019:1975-1 as SUSE-SLE-SERVER-12-SP4-2019-1975 is not security or has no CVEs. patches: SUSE-2019-1975,SUSE-SLE-DESKTOP-12-SP4-2019-1975,SUSE-SLE-SDK-12-SP4-2019-1975,SUSE-SLE-SERVER-12-SP4-2019-1975 SKIP SUSE-RU-2019:1976-1 as SUSE-SLE-Product-HA-15-2019-1976 is not security or has no CVEs. patches: SUSE-2019-1976,SUSE-SLE-Product-HA-15-2019-1976 SKIP SUSE-RU-2019:1977-1 as SUSE-SLE-SERVER-12-SP4-2019-1977 is not security or has no CVEs. patches: SUSE-2019-1977,SUSE-SLE-SERVER-12-SP4-2019-1977 SKIP SUSE-RU-2019:1978-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1978 is not security or has no CVEs. patches: SUSE-2019-1978,SUSE-SLE-Module-Basesystem-15-SP1-2019-1978 SKIP SUSE-RU-2019:1979-1 as SUSE-SLE-SERVER-12-SP4-2019-1979 is not security or has no CVEs. patches: SUSE-2019-1979,SUSE-SLE-DESKTOP-12-SP4-2019-1979,SUSE-SLE-SAP-12-SP4-2019-1979,SUSE-SLE-SERVER-12-SP4-2019-1979 SKIP SUSE-RU-2019:1980-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1980 is not security or has no CVEs. patches: SUSE-2019-1980,SUSE-SLE-Module-Basesystem-15-SP1-2019-1980 SKIP SUSE-RU-2019:1981-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1981 is not security or has no CVEs. patches: SUSE-2019-1981,SUSE-SLE-Module-Basesystem-15-2019-1981,SUSE-SLE-Module-Basesystem-15-SP1-2019-1981,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1981,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1981 SKIP SUSE-RU-2019:1982-1 as SUSE-SLE-Module-Basesystem-15-2019-1982 is not security or has no CVEs. patches: SUSE-2019-1982,SUSE-SLE-Module-Basesystem-15-2019-1982 SKIP SUSE-RU-2019:1983-1 as SUSE-SLE-SERVER-12-SP4-2019-1983 is not security or has no CVEs. patches: SUSE-2019-1983,SUSE-SLE-DESKTOP-12-SP4-2019-1983,SUSE-SLE-SDK-12-SP4-2019-1983,SUSE-SLE-SERVER-12-SP4-2019-1983 SKIP SUSE-RU-2019:1984-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1984 is not security or has no CVEs. patches: SUSE-2019-1984,SUSE-SLE-Module-Basesystem-15-SP1-2019-1984,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1984 SKIP SUSE-RU-2019:1985-1 as SUSE-SLE-Module-Basesystem-15-2019-1985 is not security or has no CVEs. patches: SUSE-2019-1985,SUSE-SLE-Module-Basesystem-15-2019-1985 SKIP SUSE-RU-2019:1986-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1986 is not security or has no CVEs. patches: SUSE-2019-1986,SUSE-SLE-Module-Basesystem-15-SP1-2019-1986,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1986 SKIP SUSE-RU-2019:1986-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-1986 is not security or has no CVEs. patches: SUSE-2019-1986,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-1986 SKIP SUSE-RU-2019:1987-1 as SUSE-SLE-SERVER-12-SP4-2019-1987 is not security or has no CVEs. patches: SUSE-2019-1987,SUSE-SLE-DESKTOP-12-SP4-2019-1987,SUSE-SLE-SERVER-12-SP4-2019-1987 SKIP SUSE-RU-2019:1988-1 as SUSE-SLE-SERVER-12-SP4-2019-1988 is not security or has no CVEs. patches: SUSE-2019-1988,SUSE-SLE-DESKTOP-12-SP4-2019-1988,SUSE-SLE-SDK-12-SP4-2019-1988,SUSE-SLE-SERVER-12-SP4-2019-1988 SKIP SUSE-RU-2019:1991-1 as SUSE-SLE-SAP-12-SP2-2019-1991 is not security or has no CVEs. patches: SUSE-2019-1991,SUSE-SLE-SAP-12-SP2-2019-1991 SKIP SUSE-RU-2019:1992-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1992 is not security or has no CVEs. patches: SUSE-2019-1992,SUSE-SLE-Module-Basesystem-15-SP1-2019-1992 SKIP SUSE-RU-2019:1993-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-1993 is not security or has no CVEs. patches: SUSE-2019-1993,SUSE-SLE-Module-Basesystem-15-SP1-2019-1993 SKIP SUSE-RU-2019:1994-1 as SUSE-SLE-Module-Python2-15-SP1-2019-1994 is not security or has no CVEs. patches: SUSE-2019-1994,SUSE-SLE-Module-Basesystem-15-2019-1994,SUSE-SLE-Module-Basesystem-15-SP1-2019-1994,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1994,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1994,SUSE-SLE-Module-Python2-15-SP1-2019-1994 SKIP SUSE-RU-2019:1996-1 as SUSE-SLE-SERVER-12-SP4-2019-1996 is not security or has no CVEs. patches: SUSE-2019-1996,SUSE-SLE-DESKTOP-12-SP4-2019-1996,SUSE-SLE-SERVER-12-SP4-2019-1996 SKIP SUSE-RU-2019:1997-1 as SUSE-SLE-WE-12-SP4-2019-1997 is not security or has no CVEs. patches: SUSE-2019-1997,SUSE-SLE-DESKTOP-12-SP4-2019-1997,SUSE-SLE-SDK-12-SP4-2019-1997,SUSE-SLE-SERVER-12-SP4-2019-1997,SUSE-SLE-WE-12-SP4-2019-1997 SKIP SUSE-RU-2019:1998-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-1998 is not security or has no CVEs. patches: SUSE-2019-1998,SUSE-SLE-Module-Basesystem-15-2019-1998,SUSE-SLE-Module-Basesystem-15-SP1-2019-1998,SUSE-SLE-Module-Server-Applications-15-2019-1998,SUSE-SLE-Module-Server-Applications-15-SP1-2019-1998 SKIP SUSE-RU-2019:1999-1 as SUSE-SLE-SERVER-12-SP4-2019-1999 is not security or has no CVEs. patches: SUSE-2019-1999,SUSE-SLE-SDK-12-SP4-2019-1999,SUSE-SLE-SERVER-12-SP4-2019-1999 SKIP SUSE-RU-2019:2000-1 as SUSE-SLE-Module-Containers-12-2019-2000 is not security or has no CVEs. patches: SUSE-2019-2000,SUSE-SLE-Module-Containers-12-2019-2000 SKIP SUSE-RU-2019:2001-1 as SUSE-SLE-Module-Containers-15-SP1-2019-2001 is not security or has no CVEs. patches: SUSE-2019-2001,SUSE-SLE-Module-Containers-15-2019-2001,SUSE-SLE-Module-Containers-15-SP1-2019-2001,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2001,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2001 SKIP SUSE-RU-2019:2015-1 as SUSE-SLE-SERVER-12-SP4-2019-2015 is not security or has no CVEs. patches: SUSE-2019-2015,SUSE-SLE-SDK-12-SP4-2019-2015,SUSE-SLE-SERVER-12-SP4-2019-2015 SKIP SUSE-RU-2019:2016-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2016 is not security or has no CVEs. patches: SUSE-2019-2016,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2016 SKIP SUSE-RU-2019:2017-1 as SUSE-SLE-WE-12-SP4-2019-2017 is not security or has no CVEs. patches: SUSE-2019-2017,SUSE-SLE-DESKTOP-12-SP4-2019-2017,SUSE-SLE-WE-12-SP4-2019-2017 SKIP SUSE-RU-2019:2025-1 as SUSE-Storage-5-2019-2025 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2025,SUSE-2019-2025,SUSE-OpenStack-Cloud-7-2019-2025,SUSE-OpenStack-Cloud-8-2019-2025,SUSE-OpenStack-Cloud-Crowbar-8-2019-2025,SUSE-SLE-DESKTOP-12-SP4-2019-2025,SUSE-SLE-DESKTOP-12-SP5-2019-2025,SUSE-SLE-SAP-12-SP1-2019-2025,SUSE-SLE-SAP-12-SP2-2019-2025,SUSE-SLE-SAP-12-SP3-2019-2025,SUSE-SLE-SDK-12-SP4-2019-2025,SUSE-SLE-SDK-12-SP5-2019-2025,SUSE-SLE-SERVER-12-SP1-2019-2025,SUSE-SLE-SERVER-12-SP2-2019-2025,SUSE-SLE-SERVER-12-SP2-BCL-2019-2025,SUSE-SLE-SERVER-12-SP3-2019-2025,SUSE-SLE-SERVER-12-SP3-BCL-2019-2025,SUSE-SLE-SERVER-12-SP4-2019-2025,SUSE-SLE-SERVER-12-SP5-2019-2025,SUSE-Storage-4-2019-2025,SUSE-Storage-5-2019-2025 SKIP SUSE-RU-2019:2025-2 as SUSE-Storage-5-2019-2025 is not security or has no CVEs. patches: SUSE-2019-2025,SUSE-Storage-5-2019-2025 SKIP SUSE-RU-2019:2026-1 as SUSE-Storage-5-2019-2026 is not security or has no CVEs. patches: SUSE-2019-2026,SUSE-OpenStack-Cloud-7-2019-2026,SUSE-OpenStack-Cloud-8-2019-2026,SUSE-SLE-DESKTOP-12-SP4-2019-2026,SUSE-SLE-DESKTOP-12-SP5-2019-2026,SUSE-SLE-Module-Public-Cloud-12-2019-2026,SUSE-SLE-SAP-12-SP1-2019-2026,SUSE-SLE-SAP-12-SP2-2019-2026,SUSE-SLE-SAP-12-SP3-2019-2026,SUSE-SLE-SERVER-12-SP1-2019-2026,SUSE-SLE-SERVER-12-SP2-2019-2026,SUSE-SLE-SERVER-12-SP2-BCL-2019-2026,SUSE-SLE-SERVER-12-SP3-2019-2026,SUSE-SLE-SERVER-12-SP3-BCL-2019-2026,SUSE-SLE-SERVER-12-SP4-2019-2026,SUSE-SLE-SERVER-12-SP5-2019-2026,SUSE-Storage-4-2019-2026,SUSE-Storage-5-2019-2026 SKIP SUSE-RU-2019:2026-2 as SUSE-Storage-5-2019-2026 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2026,SUSE-2019-2026,SUSE-OpenStack-Cloud-Crowbar-8-2019-2026,SUSE-Storage-5-2019-2026 SKIP SUSE-RU-2019:2037-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2037 is not security or has no CVEs. patches: SUSE-2019-2037,SUSE-SLE-Module-Basesystem-15-SP1-2019-2037 SKIP SUSE-RU-2019:2039-1 as SUSE-SLE-Product-WE-15-SP1-2019-2039 is not security or has no CVEs. patches: SUSE-2019-2039,SUSE-SLE-Product-WE-15-2019-2039,SUSE-SLE-Product-WE-15-SP1-2019-2039 SKIP SUSE-RU-2019:2040-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2040 is not security or has no CVEs. patches: SUSE-2019-2040,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2040 SKIP SUSE-RU-2019:2044-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2044 is not security or has no CVEs. patches: SUSE-2019-2044,SUSE-SLE-Module-Basesystem-15-SP1-2019-2044,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2044,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2044,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2044 SKIP SUSE-RU-2019:2054-1 as SUSE-SLE-SERVER-12-SP4-2019-2054 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2054,SUSE-2019-2054,SUSE-OpenStack-Cloud-8-2019-2054,SUSE-OpenStack-Cloud-Crowbar-8-2019-2054,SUSE-SLE-DESKTOP-12-SP4-2019-2054,SUSE-SLE-SDK-12-SP4-2019-2054,SUSE-SLE-SERVER-12-SP4-2019-2054 SKIP SUSE-RU-2019:2058-1 as SUSE-SLE-SAP-12-SP4-2019-2058 is not security or has no CVEs. patches: SUSE-2019-2058,SUSE-SLE-SAP-12-SP4-2019-2058 SKIP SUSE-RU-2019:2059-1 as SUSE-Storage-4-2019-2059 is not security or has no CVEs. patches: SUSE-2019-2059,SUSE-OpenStack-Cloud-7-2019-2059,SUSE-SLE-SAP-12-SP2-2019-2059,SUSE-SLE-SERVER-12-SP2-2019-2059,SUSE-SLE-SERVER-12-SP2-BCL-2019-2059,SUSE-Storage-4-2019-2059 SKIP SUSE-RU-2019:2060-1 as SUSE-SLE-Product-WE-15-SP1-2019-2060 is not security or has no CVEs. patches: SUSE-2019-2060,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2060,SUSE-SLE-Product-WE-15-2019-2060,SUSE-SLE-Product-WE-15-SP1-2019-2060 SKIP SUSE-RU-2019:2061-1 as SUSE-SLE-Product-HA-15-SP1-2019-2061 is not security or has no CVEs. patches: SUSE-2019-2061,SUSE-SLE-Product-HA-15-2019-2061,SUSE-SLE-Product-HA-15-SP1-2019-2061 SKIP SUSE-RU-2019:2062-1 as SUSE-Storage-6-2019-2062 is not security or has no CVEs. patches: SUSE-2019-2062,SUSE-Storage-6-2019-2062 SKIP SUSE-RU-2019:2063-1 as SUSE-Storage-5-2019-2063 is not security or has no CVEs. patches: SUSE-2019-2063,SUSE-Storage-5-2019-2063 SKIP SUSE-RU-2019:2075-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2075 is not security or has no CVEs. patches: SUSE-2019-2075,SUSE-OpenStack-Cloud-9-2019-2075,SUSE-OpenStack-Cloud-Crowbar-9-2019-2075 SKIP SUSE-RU-2019:2076-1 as SUSE-SLE-SERVER-12-SP4-2019-2076 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2076,SUSE-2019-2076,SUSE-OpenStack-Cloud-7-2019-2076,SUSE-OpenStack-Cloud-8-2019-2076,SUSE-OpenStack-Cloud-9-2019-2076,SUSE-OpenStack-Cloud-Crowbar-8-2019-2076,SUSE-OpenStack-Cloud-Crowbar-9-2019-2076,SUSE-SLE-DESKTOP-12-SP4-2019-2076,SUSE-SLE-SERVER-12-SP4-2019-2076 SKIP SUSE-RU-2019:2076-2 as SUSE-Storage-5-2019-2076 is not security or has no CVEs. patches: SUSE-2019-2076,SUSE-OpenStack-Cloud-6-LTSS-2019-2076,SUSE-SLE-DESKTOP-12-SP5-2019-2076,SUSE-SLE-SAP-12-SP1-2019-2076,SUSE-SLE-SAP-12-SP2-2019-2076,SUSE-SLE-SAP-12-SP3-2019-2076,SUSE-SLE-SERVER-12-SP1-2019-2076,SUSE-SLE-SERVER-12-SP2-2019-2076,SUSE-SLE-SERVER-12-SP2-BCL-2019-2076,SUSE-SLE-SERVER-12-SP3-2019-2076,SUSE-SLE-SERVER-12-SP3-BCL-2019-2076,SUSE-SLE-SERVER-12-SP5-2019-2076,SUSE-Storage-4-2019-2076,SUSE-Storage-5-2019-2076 SKIP SUSE-RU-2019:2077-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2077 is not security or has no CVEs. patches: SUSE-2019-2077,SUSE-SLE-Module-Basesystem-15-2019-2077,SUSE-SLE-Module-Basesystem-15-SP1-2019-2077 SKIP SUSE-RU-2019:2082-1 as SUSE-Storage-5-2019-2082 is not security or has no CVEs. patches: SUSE-2019-2082,SUSE-OpenStack-Cloud-7-2019-2082,SUSE-OpenStack-Cloud-8-2019-2082,SUSE-SLE-DESKTOP-12-SP4-2019-2082,SUSE-SLE-SAP-12-SP2-2019-2082,SUSE-SLE-SAP-12-SP3-2019-2082,SUSE-SLE-SERVER-12-SP2-2019-2082,SUSE-SLE-SERVER-12-SP2-BCL-2019-2082,SUSE-SLE-SERVER-12-SP3-2019-2082,SUSE-SLE-SERVER-12-SP3-BCL-2019-2082,SUSE-SLE-SERVER-12-SP4-2019-2082,SUSE-Storage-4-2019-2082,SUSE-Storage-5-2019-2082 SKIP SUSE-RU-2019:2082-2 as SUSE-Storage-5-2019-2082 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2082,SUSE-2019-2082,SUSE-OpenStack-Cloud-Crowbar-8-2019-2082,SUSE-Storage-5-2019-2082 SKIP SUSE-RU-2019:2083-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2083 is not security or has no CVEs. patches: SUSE-2019-2083,SUSE-SLE-Module-Basesystem-15-SP1-2019-2083,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2083 SKIP SUSE-RU-2019:2084-1 as SUSE-SLE-Module-Development-Tools-15-2019-2084 is not security or has no CVEs. patches: SUSE-2019-2084,SUSE-SLE-Module-Basesystem-15-2019-2084,SUSE-SLE-Module-Development-Tools-15-2019-2084 SKIP SUSE-RU-2019:2085-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2085 is not security or has no CVEs. patches: SUSE-2019-2085,SUSE-SLE-Module-Basesystem-15-2019-2085,SUSE-SLE-Module-Basesystem-15-SP1-2019-2085,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2085,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2085,SUSE-SLE-Module-Server-Applications-15-2019-2085,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2085 SKIP SUSE-RU-2019:2086-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2086 is not security or has no CVEs. patches: SUSE-2019-2086,SUSE-SLE-Module-Basesystem-15-2019-2086,SUSE-SLE-Module-Basesystem-15-SP1-2019-2086,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2086,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2086,SUSE-SLE-Module-Server-Applications-15-2019-2086,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2086 SKIP SUSE-RU-2019:2094-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2094 is not security or has no CVEs. patches: SUSE-2019-2094,SUSE-SLE-Module-Development-Tools-15-2019-2094,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2094,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2094,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2094 SKIP SUSE-RU-2019:2095-1 as SUSE-SLE-Module-Containers-15-SP1-2019-2095 is not security or has no CVEs. patches: SUSE-2019-2095,SUSE-SLE-Module-Containers-15-2019-2095,SUSE-SLE-Module-Containers-15-SP1-2019-2095 SKIP SUSE-RU-2019:2096-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2096 is not security or has no CVEs. patches: SUSE-2019-2096,SUSE-SLE-Module-Public-Cloud-15-2019-2096,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2096 SKIP SUSE-RU-2019:2097-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2097 is not security or has no CVEs. patches: SUSE-2019-2097,SUSE-SLE-Module-Basesystem-15-SP1-2019-2097,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2097 SKIP SUSE-RU-2019:2100-1 as SUSE-SLE-SERVER-12-SP4-2019-2100 is not security or has no CVEs. patches: SUSE-2019-2100,SUSE-SLE-DESKTOP-12-SP4-2019-2100,SUSE-SLE-SERVER-12-SP4-2019-2100 SKIP SUSE-RU-2019:2101-1 as SUSE-SLE-SERVER-12-SP4-2019-2101 is not security or has no CVEs. patches: SUSE-2019-2101,SUSE-SLE-DESKTOP-12-SP4-2019-2101,SUSE-SLE-SERVER-12-SP4-2019-2101 SKIP SUSE-RU-2019:2107-1 as SUSE-SLE-SERVER-12-SP4-2019-2107 is not security or has no CVEs. patches: SUSE-2019-2107,SUSE-SLE-DESKTOP-12-SP4-2019-2107,SUSE-SLE-SDK-12-SP4-2019-2107,SUSE-SLE-SERVER-12-SP4-2019-2107 SKIP SUSE-RU-2019:2108-1 as SUSE-Storage-6-2019-2108 is not security or has no CVEs. patches: SUSE-2019-2108,SUSE-SLE-Module-Basesystem-15-SP1-2019-2108,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2108,SUSE-Storage-6-2019-2108 SKIP SUSE-RU-2019:2109-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2109 is not security or has no CVEs. patches: SUSE-2019-2109,SUSE-SLE-Module-Basesystem-15-2019-2109,SUSE-SLE-Module-Basesystem-15-SP1-2019-2109,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2109,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2109,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2109 SKIP SUSE-RU-2019:2110-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2110 is not security or has no CVEs. patches: SUSE-2019-2110,SUSE-SLE-Module-Public-Cloud-12-2019-2110 SKIP SUSE-RU-2019:2112-1 as SUSE-Storage-5-2019-2112 is not security or has no CVEs. patches: SUSE-2019-2112,SUSE-Storage-5-2019-2112 SKIP SUSE-RU-2019:2116-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2116 is not security or has no CVEs. patches: SUSE-2019-2116,SUSE-SLE-Module-Basesystem-15-2019-2116,SUSE-SLE-Module-Basesystem-15-SP1-2019-2116,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2116,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2116 SKIP SUSE-RU-2019:2120-1 as SUSE-SLE-SERVER-12-SP4-2019-2120 is not security or has no CVEs. patches: SUSE-2019-2120,SUSE-SLE-DESKTOP-12-SP4-2019-2120,SUSE-SLE-SDK-12-SP4-2019-2120,SUSE-SLE-SERVER-12-SP4-2019-2120 SKIP SUSE-RU-2019:2122-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2019-2122 is not security or has no CVEs. patches: SUSE-2019-2122,SUSE-SLE-Live-Patching-12-2019-2123,SUSE-SLE-Live-Patching-12-SP3-2019-2123,SUSE-SLE-Live-Patching-12-SP4-2019-2123,SUSE-SLE-Module-Live-Patching-15-2019-2122,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2122 SKIP SUSE-RU-2019:2124-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2124 is not security or has no CVEs. patches: SUSE-2019-2124,SUSE-SLE-Module-Basesystem-15-SP1-2019-2124,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2124 SKIP SUSE-RU-2019:2125-1 as SUSE-SLE-SAP-12-SP4-2019-2125 is not security or has no CVEs. patches: SUSE-2019-2125,SUSE-SLE-SAP-12-SP2-2019-2125,SUSE-SLE-SAP-12-SP3-2019-2125,SUSE-SLE-SAP-12-SP4-2019-2125 SKIP SUSE-RU-2019:2126-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2126 is not security or has no CVEs. patches: SUSE-2019-2126,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2126 SKIP SUSE-RU-2019:2127-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-2127 is not security or has no CVEs. patches: SUSE-2019-2127,SUSE-SLE-Module-Basesystem-15-2019-2127,SUSE-SLE-Module-Desktop-Applications-15-2019-2127 SKIP SUSE-RU-2019:2128-1 as SUSE-SLE-SERVER-12-SP4-2019-2128 is not security or has no CVEs. patches: SUSE-2019-2128,SUSE-SLE-DESKTOP-12-SP4-2019-2128,SUSE-SLE-SERVER-12-SP4-2019-2128 SKIP SUSE-RU-2019:2129-1 as SUSE-Storage-5-2019-2129 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2129,SUSE-2019-2129,SUSE-OpenStack-Cloud-8-2019-2129,SUSE-OpenStack-Cloud-Crowbar-8-2019-2129,SUSE-SLE-SAP-12-SP3-2019-2129,SUSE-SLE-SERVER-12-SP3-2019-2129,SUSE-SLE-SERVER-12-SP3-BCL-2019-2129,SUSE-Storage-5-2019-2129 SKIP SUSE-RU-2019:2130-1 as SUSE-SLE-Module-Basesystem-15-2019-2130 is not security or has no CVEs. patches: SUSE-2019-2130,SUSE-SLE-Module-Basesystem-15-2019-2130 SKIP SUSE-RU-2019:2131-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2131 is not security or has no CVEs. patches: SUSE-2019-2131,SUSE-SLE-Module-Basesystem-15-SP1-2019-2131 SKIP SUSE-RU-2019:2132-1 as SUSE-SLE-SERVER-12-SP4-2019-2132 is not security or has no CVEs. patches: SUSE-2019-2132,SUSE-SLE-DESKTOP-12-SP4-2019-2132,SUSE-SLE-SERVER-12-SP4-2019-2132 SKIP SUSE-RU-2019:2133-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2133 is not security or has no CVEs. patches: SUSE-2019-2133,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2133 SKIP SUSE-RU-2019:2134-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2134 is not security or has no CVEs. patches: SUSE-2019-2134,SUSE-SLE-Module-Basesystem-15-2019-2134,SUSE-SLE-Module-Basesystem-15-SP1-2019-2134,SUSE-SLE-Module-Development-Tools-15-2019-2134,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2134,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2134 SKIP SUSE-RU-2019:2135-1 as SUSE-SLE-HA-12-SP4-2019-2135 is not security or has no CVEs. patches: SUSE-2019-2135,SUSE-SLE-HA-12-SP4-2019-2135 SKIP SUSE-RU-2019:2136-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2136 is not security or has no CVEs. patches: SUSE-2019-2136,SUSE-SLE-Module-Public-Cloud-12-2019-2136 SKIP SUSE-RU-2019:2137-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2137 is not security or has no CVEs. patches: SUSE-2019-2137,SUSE-SLE-Module-Public-Cloud-12-2019-2137 SKIP SUSE-RU-2019:2138-1 as SUSE-Storage-5-2019-2138 is not security or has no CVEs. patches: SUSE-2019-2138,SUSE-Storage-5-2019-2138 SKIP SUSE-RU-2019:2139-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2139 is not security or has no CVEs. patches: SUSE-2019-2139,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2139,SUSE-SLE-Module-Public-Cloud-15-2019-2139,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2139 SKIP SUSE-RU-2019:2140-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2140 is not security or has no CVEs. patches: SUSE-2019-2140,SUSE-SLE-Module-Public-Cloud-12-2019-2140 SKIP SUSE-RU-2019:2141-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2141 is not security or has no CVEs. patches: SUSE-2019-2141,SUSE-SLE-Module-Public-Cloud-15-2019-2141,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2141 SKIP SUSE-RU-2019:2142-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2142 is not security or has no CVEs. patches: SUSE-2019-2142,SUSE-SLE-Module-Basesystem-15-2019-2142,SUSE-SLE-Module-Basesystem-15-SP1-2019-2142,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2142,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2142 SKIP SUSE-RU-2019:2143-1 as SUSE-Storage-6-2019-2143 is not security or has no CVEs. patches: SUSE-2019-2143,SUSE-Storage-6-2019-2143 SKIP SUSE-RU-2019:2144-1 as SUSE-Storage-5-2019-2144 is not security or has no CVEs. patches: SUSE-2019-2144,SUSE-Storage-5-2019-2144 SKIP SUSE-RU-2019:2145-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2145 is not security or has no CVEs. patches: SUSE-2019-2145,SUSE-SLE-Module-Public-Cloud-15-2019-2145,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2145 SKIP SUSE-RU-2019:2146-1 as SUSE-SLE-Module-Basesystem-15-2019-2146 is not security or has no CVEs. patches: SUSE-2019-2146,SUSE-SLE-Module-Basesystem-15-2019-2146 SKIP SUSE-RU-2019:2147-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2147 is not security or has no CVEs. patches: SUSE-2019-2147,SUSE-SLE-Module-Basesystem-15-SP1-2019-2147 SKIP SUSE-RU-2019:2148-1 as SUSE-SLE-Module-Basesystem-15-2019-2148 is not security or has no CVEs. patches: SUSE-2019-2148,SUSE-SLE-Module-Basesystem-15-2019-2148 SKIP SUSE-RU-2019:2149-1 as SUSE-SLE-Module-Server-Applications-15-2019-2149 is not security or has no CVEs. patches: SUSE-2019-2149,SUSE-SLE-Module-Server-Applications-15-2019-2149 SKIP SUSE-RU-2019:2150-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2150 is not security or has no CVEs. patches: SUSE-2019-2150,SUSE-SLE-Module-Public-Cloud-12-2019-2150 SKIP SUSE-RU-2019:2151-1 as SUSE-SLE-Module-Server-Applications-15-2019-2151 is not security or has no CVEs. patches: SUSE-2019-2151,SUSE-SLE-Module-Server-Applications-15-2019-2151 SKIP SUSE-RU-2019:2151-2 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2151 is not security or has no CVEs. patches: SUSE-2019-2151,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2151 SKIP SUSE-RU-2019:2160-1 as SUSE-SLE-Product-SLES-15-SP1-2019-2160 is not security or has no CVEs. patches: SUSE-2019-2160,SUSE-SLE-INSTALLER-15-SP1-2019-2160,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2160,SUSE-SLE-Product-SLES-15-SP1-2019-2160 SKIP SUSE-RU-2019:2161-1 as SUSE-SLE-Module-Basesystem-15-2019-2161 is not security or has no CVEs. patches: SUSE-2019-2161,SUSE-SLE-Module-Basesystem-15-2019-2161,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2161 SKIP SUSE-RU-2019:2162-1 as SUSE-SLE-Module-Basesystem-15-2019-2162 is not security or has no CVEs. patches: SUSE-2019-2162,SUSE-SLE-Module-Basesystem-15-2019-2162,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2162 SKIP SUSE-RU-2019:2163-1 as SUSE-SLE-SERVER-12-SP4-2019-2163 is not security or has no CVEs. patches: SUSE-2019-2163,SUSE-SLE-DESKTOP-12-SP4-2019-2163,SUSE-SLE-SDK-12-SP4-2019-2163,SUSE-SLE-SERVER-12-SP4-2019-2163 SKIP SUSE-RU-2019:2164-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2164 is not security or has no CVEs. patches: SUSE-2019-2164,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2164,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2164,SUSE-SLE-Module-Server-Applications-15-2019-2164,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2164 SKIP SUSE-RU-2019:2166-1 as SUSE-Storage-5-2019-2166 is not security or has no CVEs. patches: SUSE-2019-2166,SUSE-OpenStack-Cloud-8-2019-2166,SUSE-SLE-SAP-12-SP3-2019-2166,SUSE-SLE-SERVER-12-SP3-2019-2166,SUSE-SLE-SERVER-12-SP3-BCL-2019-2166,SUSE-Storage-5-2019-2166 SKIP SUSE-RU-2019:2166-2 as SUSE-Storage-5-2019-2166 is not security or has no CVEs. patches: SUSE-2019-2166,SUSE-Storage-5-2019-2166 SKIP SUSE-RU-2019:2166-3 as SUSE-OpenStack-Cloud-Crowbar-8-2019-2166 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2166,SUSE-2019-2166,SUSE-OpenStack-Cloud-Crowbar-8-2019-2166 SKIP SUSE-RU-2019:2168-1 as SUSE-2019-2168 is not security or has no CVEs. patches: SUSE-2019-2168,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2168,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2168 SKIP SUSE-RU-2019:2169-1 as SUSE-SLE-Product-HA-15-SP1-2019-2169 is not security or has no CVEs. patches: SUSE-2019-2169,SUSE-SLE-Product-HA-15-SP1-2019-2169 SKIP SUSE-RU-2019:2171-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2171 is not security or has no CVEs. patches: SUSE-2019-2171,SUSE-SLE-Module-Basesystem-15-SP1-2019-2171 SKIP SUSE-RU-2019:2172-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2172 is not security or has no CVEs. patches: SUSE-2019-2172,SUSE-SLE-Module-Basesystem-15-SP1-2019-2172 SKIP SUSE-RU-2019:2173-1 as SUSE-SLE-Module-Basesystem-15-2019-2173 is not security or has no CVEs. patches: SUSE-2019-2173,SUSE-SLE-INSTALLER-15-2019-2173,SUSE-SLE-Module-Basesystem-15-2019-2173 SKIP SUSE-RU-2019:2174-1 as SUSE-SLE-Module-Basesystem-15-2019-2174 is not security or has no CVEs. patches: SUSE-2019-2174,SUSE-SLE-Module-Basesystem-15-2019-2174 SKIP SUSE-RU-2019:2175-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2175 is not security or has no CVEs. patches: SUSE-2019-2175,SUSE-SLE-Module-Basesystem-15-SP1-2019-2175 SKIP SUSE-RU-2019:2176-1 as SUSE-SLE-Module-Basesystem-15-2019-2176 is not security or has no CVEs. patches: SUSE-2019-2176,SUSE-SLE-Module-Basesystem-15-2019-2176 SKIP SUSE-RU-2019:2183-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2183 is not security or has no CVEs. patches: SUSE-2019-2183,SUSE-SLE-Module-Basesystem-15-2019-2183,SUSE-SLE-Module-Basesystem-15-SP1-2019-2183 SKIP SUSE-RU-2019:2184-1 as SUSE-SLE-Module-Development-Tools-15-2019-2184 is not security or has no CVEs. patches: SUSE-2019-2184,SUSE-SLE-Module-Development-Tools-15-2019-2184 SKIP SUSE-RU-2019:2186-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2186 is not security or has no CVEs. patches: SUSE-2019-2186,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2186 SKIP SUSE-RU-2019:2187-1 as SUSE-SLE-Product-WE-15-SP1-2019-2187 is not security or has no CVEs. patches: SUSE-2019-2187,SUSE-SLE-Product-WE-15-2019-2187,SUSE-SLE-Product-WE-15-SP1-2019-2187 SKIP SUSE-RU-2019:2188-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2188 is not security or has no CVEs. patches: SUSE-2019-2188,SUSE-SLE-Module-Basesystem-15-2019-2188,SUSE-SLE-Module-Basesystem-15-SP1-2019-2188,SUSE-SLE-Module-Development-Tools-15-2019-2188,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2188,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2188,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2188 SKIP SUSE-RU-2019:2189-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2189 is not security or has no CVEs. patches: SUSE-2019-2189,SUSE-SLE-Module-Basesystem-15-2019-2189,SUSE-SLE-Module-Basesystem-15-SP1-2019-2189,SUSE-SLE-Module-Server-Applications-15-2019-2189,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2189 SKIP SUSE-RU-2019:2194-1 as SUSE-Storage-5-2019-2194 is not security or has no CVEs. patches: SUSE-2019-2194,SUSE-Storage-5-2019-2194 SKIP SUSE-RU-2019:2196-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2196 is not security or has no CVEs. patches: SUSE-2019-2196,SUSE-SLE-Module-Public-Cloud-12-2019-2196 SKIP SUSE-RU-2019:2197-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2197 is not security or has no CVEs. patches: SUSE-2019-2197,SUSE-SLE-Module-Basesystem-15-SP1-2019-2197 SKIP SUSE-RU-2019:2198-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2198 is not security or has no CVEs. patches: SUSE-2019-2198,SUSE-SLE-Module-Public-Cloud-15-2019-2198,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2198 SKIP SUSE-RU-2019:2200-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2200 is not security or has no CVEs. patches: SUSE-2019-2200,SUSE-SLE-Module-Basesystem-15-2019-2200,SUSE-SLE-Module-Basesystem-15-SP1-2019-2200 SKIP SUSE-RU-2019:2201-1 as SUSE-SLE-Product-HA-15-SP1-2019-2201 is not security or has no CVEs. patches: SUSE-2019-2201,SUSE-SLE-Product-HA-15-SP1-2019-2201 SKIP SUSE-RU-2019:2202-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2202 is not security or has no CVEs. patches: SUSE-2019-2202,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2202,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2202 SKIP SUSE-RU-2019:2202-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2202 is not security or has no CVEs. patches: SUSE-2019-2202,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2202 SKIP SUSE-RU-2019:2203-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2203 is not security or has no CVEs. patches: SUSE-2019-2203,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2203,SUSE-SLE-Module-Server-Applications-15-2019-2203,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2203 SKIP SUSE-RU-2019:2204-1 as SUSE-SLE-SERVER-12-SP4-2019-2204 is not security or has no CVEs. patches: SUSE-2019-2204,SUSE-SLE-DESKTOP-12-SP4-2019-2204,SUSE-SLE-SERVER-12-SP4-2019-2204 SKIP SUSE-RU-2019:2208-1 as SUSE-Storage-6-2019-2208 is not security or has no CVEs. patches: SUSE-2019-2208,SUSE-Storage-6-2019-2208 SKIP SUSE-RU-2019:2210-1 as SUSE-2019-2210 is not security or has no CVEs. patches: SUSE-2019-2210,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2210,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2210 SKIP SUSE-RU-2019:2215-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2215 is not security or has no CVEs. patches: SUSE-2019-2215,SUSE-SLE-Module-Basesystem-15-SP1-2019-2215 SKIP SUSE-RU-2019:2216-1 as SUSE-SLE-SERVER-12-SP4-2019-2216 is not security or has no CVEs. patches: SUSE-2019-2216,SUSE-SLE-DESKTOP-12-SP4-2019-2216,SUSE-SLE-SERVER-12-SP4-2019-2216 SKIP SUSE-RU-2019:2217-1 as SUSE-SLE-SERVER-12-SP4-2019-2217 is not security or has no CVEs. patches: SUSE-2019-2217,SUSE-SLE-SDK-12-SP4-2019-2217,SUSE-SLE-SERVER-12-SP4-2019-2217 SKIP SUSE-RU-2019:2218-1 as SUSE-SLE-Product-WE-15-SP1-2019-2218 is not security or has no CVEs. patches: SUSE-2019-2218,SUSE-SLE-Module-Basesystem-15-2019-2218,SUSE-SLE-Module-Basesystem-15-SP1-2019-2218,SUSE-SLE-Module-Desktop-Applications-15-2019-2218,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2218,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2218,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2218,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2218,SUSE-SLE-Product-WE-15-2019-2218,SUSE-SLE-Product-WE-15-SP1-2019-2218 SKIP SUSE-RU-2019:2218-2 as SUSE-SLE-Product-WE-15-SP2-2020-1878 is not security or has no CVEs. patches: SUSE-2019-2218,SUSE-SLE-Module-Basesystem-15-SP2-2020-1878,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1878,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1878,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1878,SUSE-SLE-Product-WE-15-SP2-2020-1878 SKIP SUSE-RU-2019:2224-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-2224 is not security or has no CVEs. patches: SUSE-2019-2224,SUSE-OpenStack-Cloud-Crowbar-8-2019-2224 SKIP SUSE-RU-2019:2225-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2225 is not security or has no CVEs. patches: SUSE-2019-2225,SUSE-SLE-Module-Basesystem-15-SP1-2019-2225 SKIP SUSE-RU-2019:2226-1 as SUSE-SLE-Module-Basesystem-15-2019-2226 is not security or has no CVEs. patches: SUSE-2019-2226,SUSE-SLE-Module-Basesystem-15-2019-2226 SKIP SUSE-RU-2019:2239-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-2239 is not security or has no CVEs. patches: SUSE-2019-2239,SUSE-SLE-DESKTOP-12-SP4-2019-2239,SUSE-SLE-DESKTOP-INSTALLER-12-SP4-2019-2239,SUSE-SLE-SERVER-12-SP4-2019-2239,SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-2239 SKIP SUSE-RU-2019:2240-1 as SUSE-Storage-5-2019-2240 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2240,SUSE-2019-2240,SUSE-OpenStack-Cloud-7-2019-2240,SUSE-OpenStack-Cloud-8-2019-2240,SUSE-OpenStack-Cloud-Crowbar-8-2019-2240,SUSE-SLE-DESKTOP-12-SP4-2019-2240,SUSE-SLE-DESKTOP-12-SP5-2019-2240,SUSE-SLE-SAP-12-SP1-2019-2240,SUSE-SLE-SAP-12-SP2-2019-2240,SUSE-SLE-SAP-12-SP3-2019-2240,SUSE-SLE-SERVER-12-SP1-2019-2240,SUSE-SLE-SERVER-12-SP2-2019-2240,SUSE-SLE-SERVER-12-SP2-BCL-2019-2240,SUSE-SLE-SERVER-12-SP3-2019-2240,SUSE-SLE-SERVER-12-SP3-BCL-2019-2240,SUSE-SLE-SERVER-12-SP4-2019-2240,SUSE-SLE-SERVER-12-SP5-2019-2240,SUSE-Storage-4-2019-2240,SUSE-Storage-5-2019-2240 SKIP SUSE-RU-2019:2241-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2241 is not security or has no CVEs. patches: SUSE-2019-2241,SUSE-SLE-Module-Basesystem-15-2019-2241,SUSE-SLE-Module-Basesystem-15-SP1-2019-2241 SKIP SUSE-RU-2019:2248-1 as SUSE-SLE-Module-Development-Tools-15-2019-2248 is not security or has no CVEs. patches: SUSE-2019-2248,SUSE-SLE-Module-Development-Tools-15-2019-2248,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2248 SKIP SUSE-RU-2019:2249-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2249 is not security or has no CVEs. patches: SUSE-2019-2249,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2249,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2249 SKIP SUSE-RU-2019:2250-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2250 is not security or has no CVEs. patches: SUSE-2019-2250,SUSE-SLE-Module-Basesystem-15-SP1-2019-2250 SKIP SUSE-RU-2019:2255-1 as SUSE-SLE-Module-HPC-15-SP1-2019-2255 is not security or has no CVEs. patches: SUSE-2019-2255,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2255,SUSE-SLE-Module-HPC-15-SP1-2019-2255 SKIP SUSE-RU-2019:2256-1 as SUSE-Storage-6-2019-2256 is not security or has no CVEs. patches: SUSE-2019-2256,SUSE-Storage-6-2019-2256 SKIP SUSE-RU-2019:2271-1 as SUSE-Storage-4-2019-2271 is not security or has no CVEs. patches: SUSE-2019-2271,SUSE-OpenStack-Cloud-7-2019-2271,SUSE-Storage-4-2019-2271 SKIP SUSE-RU-2019:2277-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2277 is not security or has no CVEs. patches: SUSE-2019-2277,SUSE-SLE-Module-Basesystem-15-SP1-2019-2277 SKIP SUSE-RU-2019:2279-1 as SUSE-SLE-Module-Basesystem-15-2019-2279 is not security or has no CVEs. patches: SUSE-2019-2279,SUSE-SLE-Module-Basesystem-15-2019-2279 SKIP SUSE-RU-2019:2280-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-2280 is not security or has no CVEs. patches: SUSE-2019-2280,SUSE-OpenStack-Cloud-Crowbar-8-2019-2280 SKIP SUSE-RU-2019:2281-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-2281 is not security or has no CVEs. patches: SUSE-2019-2281,SUSE-OpenStack-Cloud-Crowbar-8-2019-2281 SKIP SUSE-RU-2019:2282-1 as SUSE-OpenStack-Cloud-Crowbar-8-2019-2282 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2282,SUSE-2019-2282,SUSE-OpenStack-Cloud-8-2019-2282,SUSE-OpenStack-Cloud-Crowbar-8-2019-2282 SKIP SUSE-RU-2019:2283-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2283 is not security or has no CVEs. patches: SUSE-2019-2283,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2283,SUSE-SLE-Module-Public-Cloud-15-2019-2283,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2283 SKIP SUSE-RU-2019:2284-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2284 is not security or has no CVEs. patches: SUSE-2019-2284,SUSE-SLE-Module-Public-Cloud-12-2019-2284 SKIP SUSE-RU-2019:2286-1 as SUSE-SLE-Module-Development-Tools-15-2019-2286 is not security or has no CVEs. patches: SUSE-2019-2286,SUSE-SLE-Module-Development-Tools-15-2019-2286 SKIP SUSE-RU-2019:2287-1 as SUSE-SLE-SERVER-12-SP4-2019-2287 is not security or has no CVEs. patches: SUSE-2019-2287,SUSE-SLE-SERVER-12-SP4-2019-2287 SKIP SUSE-RU-2019:2288-1 as SUSE-SLE-SERVER-12-SP4-2019-2288 is not security or has no CVEs. patches: SUSE-2019-2288,SUSE-SLE-DESKTOP-12-SP4-2019-2288,SUSE-SLE-SDK-12-SP4-2019-2288,SUSE-SLE-SERVER-12-SP4-2019-2288 SKIP SUSE-RU-2019:2289-1 as SUSE-SLE-Module-Legacy-15-SP1-2019-2289 is not security or has no CVEs. patches: SUSE-2019-2289,SUSE-SLE-Module-Basesystem-15-2019-2289,SUSE-SLE-Module-Basesystem-15-SP1-2019-2289,SUSE-SLE-Module-Legacy-15-SP1-2019-2289 SKIP SUSE-RU-2019:2290-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2290 is not security or has no CVEs. patches: SUSE-2019-2290,SUSE-SLE-Module-Public-Cloud-12-2019-2290 SKIP SUSE-RU-2019:2292-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2292 is not security or has no CVEs. patches: SUSE-2019-2292,SUSE-SLE-Module-Basesystem-15-SP1-2019-2292 SKIP SUSE-RU-2019:2293-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2293 is not security or has no CVEs. patches: SUSE-2019-2293,SUSE-SLE-Module-Basesystem-15-SP1-2019-2293 SKIP SUSE-RU-2019:2294-1 as SUSE-SLE-SERVER-12-SP4-2019-2294 is not security or has no CVEs. patches: SUSE-2019-2294,SUSE-SLE-DESKTOP-12-SP4-2019-2294,SUSE-SLE-SERVER-12-SP4-2019-2294 SKIP SUSE-RU-2019:2295-1 as SUSE-Storage-5-2019-2295 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2295,SUSE-2019-2295,SUSE-OpenStack-Cloud-8-2019-2295,SUSE-OpenStack-Cloud-Crowbar-8-2019-2295,SUSE-SLE-DESKTOP-12-SP4-2019-2295,SUSE-SLE-DESKTOP-12-SP5-2019-2295,SUSE-SLE-SAP-12-SP3-2019-2295,SUSE-SLE-SERVER-12-SP3-2019-2295,SUSE-SLE-SERVER-12-SP3-BCL-2019-2295,SUSE-SLE-SERVER-12-SP4-2019-2295,SUSE-SLE-SERVER-12-SP5-2019-2295,SUSE-Storage-5-2019-2295 SKIP SUSE-RU-2019:2296-1 as SUSE-SLE-SERVER-12-SP4-2019-2296 is not security or has no CVEs. patches: SUSE-2019-2296,SUSE-SLE-SERVER-12-SP4-2019-2296 SKIP SUSE-RU-2019:2297-1 as SUSE-SLE-Module-Server-Applications-15-2019-2297 is not security or has no CVEs. patches: SUSE-2019-2297,SUSE-SLE-Module-Server-Applications-15-2019-2297 SKIP SUSE-RU-2019:2298-1 as SUSE-SLE-SERVER-12-SP4-2019-2298 is not security or has no CVEs. patches: SUSE-2019-2298,SUSE-SLE-SERVER-12-SP4-2019-2298 SKIP SUSE-RU-2019:2301-1 as SUSE-SLE-HA-12-SP3-2019-2301 is not security or has no CVEs. patches: SUSE-2019-2301,SUSE-SLE-HA-12-SP3-2019-2301 SKIP SUSE-RU-2019:2302-1 as SUSE-SLE-Product-WE-15-SP1-2019-2302 is not security or has no CVEs. patches: SUSE-2019-2302,SUSE-SLE-Module-Desktop-Applications-15-2019-2302,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2302,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2302,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2302,SUSE-SLE-Product-WE-15-2019-2302,SUSE-SLE-Product-WE-15-SP1-2019-2302 SKIP SUSE-RU-2019:2303-1 as SUSE-Storage-5-2019-2303 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2303,SUSE-2019-2303,SUSE-OpenStack-Cloud-7-2019-2303,SUSE-OpenStack-Cloud-8-2019-2303,SUSE-OpenStack-Cloud-Crowbar-8-2019-2303,SUSE-SLE-DESKTOP-12-SP4-2019-2303,SUSE-SLE-DESKTOP-12-SP5-2019-2303,SUSE-SLE-SAP-12-SP1-2019-2303,SUSE-SLE-SAP-12-SP2-2019-2303,SUSE-SLE-SAP-12-SP3-2019-2303,SUSE-SLE-SERVER-12-SP1-2019-2303,SUSE-SLE-SERVER-12-SP2-2019-2303,SUSE-SLE-SERVER-12-SP2-BCL-2019-2303,SUSE-SLE-SERVER-12-SP3-2019-2303,SUSE-SLE-SERVER-12-SP3-BCL-2019-2303,SUSE-SLE-SERVER-12-SP4-2019-2303,SUSE-SLE-SERVER-12-SP5-2019-2303,SUSE-Storage-4-2019-2303,SUSE-Storage-5-2019-2303 SKIP SUSE-RU-2019:2304-1 as SUSE-SLE-SERVER-12-SP1-2019-2304 is not security or has no CVEs. patches: SUSE-2019-2304,SUSE-SLE-SAP-12-SP1-2019-2304,SUSE-SLE-SERVER-12-SP1-2019-2304 SKIP SUSE-RU-2019:2305-1 as SUSE-Storage-4-2019-2305 is not security or has no CVEs. patches: SUSE-2019-2305,SUSE-OpenStack-Cloud-7-2019-2305,SUSE-SLE-SAP-12-SP2-2019-2305,SUSE-SLE-SERVER-12-SP2-2019-2305,SUSE-SLE-SERVER-12-SP2-BCL-2019-2305,SUSE-Storage-4-2019-2305 SKIP SUSE-RU-2019:2306-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2306 is not security or has no CVEs. patches: SUSE-2019-2306,SUSE-SLE-Module-Basesystem-15-2019-2306,SUSE-SLE-Module-Basesystem-15-SP1-2019-2306 SKIP SUSE-RU-2019:2313-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-2313 is not security or has no CVEs. patches: SUSE-2019-2313,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2019-2313,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-2313 SKIP SUSE-RU-2019:2316-1 as SUSE-SUSE-Manager-Server-3.2-2019-2316 is not security or has no CVEs. patches: SUSE-2019-2316,SUSE-SLE-Manager-Tools-12-2019-2316,SUSE-SLE-Module-Adv-Systems-Management-12-2019-2316,SUSE-SLE-POS-12-SP2-2019-2316,SUSE-SUSE-Manager-Proxy-3.2-2019-2316,SUSE-SUSE-Manager-Server-3.2-2019-2316 SKIP SUSE-RU-2019:2318-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2318 is not security or has no CVEs. patches: SUSE-2019-2318,SUSE-SLE-Module-Basesystem-15-SP1-2019-2318,SUSE-SLE-Module-Python2-15-SP1-2019-2318,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2318 SKIP SUSE-RU-2019:2322-1 as SUSE-SLE-Module-Server-Applications-15-2019-2322 is not security or has no CVEs. patches: SUSE-2019-2322,SUSE-SLE-Module-Basesystem-15-2019-2322,SUSE-SLE-Module-Server-Applications-15-2019-2322 SKIP SUSE-RU-2019:2323-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2323 is not security or has no CVEs. patches: SUSE-2019-2323,SUSE-SLE-Module-Development-Tools-15-2019-2323,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2323 SKIP SUSE-RU-2019:2324-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2324 is not security or has no CVEs. patches: SUSE-2019-2324,SUSE-SLE-INSTALLER-15-SP1-2019-2324,SUSE-SLE-Module-Basesystem-15-SP1-2019-2324 SKIP SUSE-RU-2019:2325-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-2325 is not security or has no CVEs. patches: SUSE-2019-2325,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2325,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-2325,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-2325,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-2325 SKIP SUSE-RU-2019:2326-1 as SUSE-SLE-Product-HA-15-SP1-2019-2326 is not security or has no CVEs. patches: SUSE-2019-2326,SUSE-SLE-Product-HA-15-2019-2326,SUSE-SLE-Product-HA-15-SP1-2019-2326 SKIP SUSE-RU-2019:2328-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2328 is not security or has no CVEs. patches: SUSE-2019-2328,SUSE-SLE-Module-Public-Cloud-12-2019-2328 SKIP SUSE-RU-2019:2333-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-2333 is not security or has no CVEs. patches: SUSE-2019-2333,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2333,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-2333 SKIP SUSE-RU-2019:2342-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2342 is not security or has no CVEs. patches: SUSE-2019-2342,SUSE-OpenStack-Cloud-Crowbar-9-2019-2342 SKIP SUSE-RU-2019:2343-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2343 is not security or has no CVEs. patches: SUSE-2019-2343,SUSE-SLE-Module-Public-Cloud-12-2019-2343 SKIP SUSE-RU-2019:2344-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2344 is not security or has no CVEs. patches: SUSE-2019-2344,SUSE-SLE-Module-Public-Cloud-15-2019-2344,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2344 SKIP SUSE-RU-2019:2351-1 as SUSE-SLE-SERVER-12-SP4-2019-2351 is not security or has no CVEs. patches: SUSE-2019-2351,SUSE-SLE-SDK-12-SP4-2019-2351,SUSE-SLE-SERVER-12-SP4-2019-2351 SKIP SUSE-RU-2019:2352-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2352 is not security or has no CVEs. patches: SUSE-2019-2352,SUSE-SLE-Module-Basesystem-15-2019-2352,SUSE-SLE-Module-Basesystem-15-SP1-2019-2352,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2352,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2352,SUSE-SLE-Module-Server-Applications-15-2019-2352,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2352 SKIP SUSE-RU-2019:2354-1 as SUSE-SLE-Module-Public-Cloud-15-2019-2354 is not security or has no CVEs. patches: SUSE-2019-2354,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2354,SUSE-SLE-Module-Public-Cloud-15-2019-2354 SKIP SUSE-RU-2019:2355-1 as SUSE-SLE-SERVER-12-SP4-2019-2355 is not security or has no CVEs. patches: SUSE-2019-2355,SUSE-SLE-DESKTOP-12-SP4-2019-2355,SUSE-SLE-HA-12-SP4-2019-2355,SUSE-SLE-SDK-12-SP4-2019-2355,SUSE-SLE-SERVER-12-SP4-2019-2355 SKIP SUSE-RU-2019:2356-1 as SUSE-SLE-SERVER-12-SP4-2019-2356 is not security or has no CVEs. patches: SUSE-2019-2356,SUSE-SLE-DESKTOP-12-SP4-2019-2356,SUSE-SLE-SERVER-12-SP4-2019-2356 SKIP SUSE-RU-2019:2357-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2357 is not security or has no CVEs. patches: SUSE-2019-2357,SUSE-SLE-Module-Basesystem-15-SP1-2019-2357,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2357,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2357 SKIP SUSE-RU-2019:2360-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2360 is not security or has no CVEs. patches: SUSE-2019-2360,SUSE-SLE-Module-Basesystem-15-2019-2360,SUSE-SLE-Module-Basesystem-15-SP1-2019-2360 SKIP SUSE-RU-2019:2361-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2361 is not security or has no CVEs. patches: SUSE-2019-2361,SUSE-SLE-Module-Basesystem-15-SP1-2019-2361,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2361,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2361 SKIP SUSE-RU-2019:2362-1 as SUSE-SLE-Module-Python2-15-SP1-2019-2362 is not security or has no CVEs. patches: SUSE-2019-2362,SUSE-SLE-Module-Basesystem-15-2019-2362,SUSE-SLE-Module-Basesystem-15-SP1-2019-2362,SUSE-SLE-Module-Desktop-Applications-15-2019-2362,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2362,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2362,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2362,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2362,SUSE-SLE-Module-Python2-15-SP1-2019-2362 SKIP SUSE-RU-2019:2362-2 as SUSE-SLE-Module-Python2-15-SP2-2020-1876 is not security or has no CVEs. patches: SUSE-2019-2362,SUSE-SLE-Module-Basesystem-15-SP2-2020-1876,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1876,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1876,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1876,SUSE-SLE-Module-Python2-15-SP2-2020-1876 SKIP SUSE-RU-2019:2363-1 as SUSE-SLE-Module-Server-Applications-15-2019-2363 is not security or has no CVEs. patches: SUSE-2019-2363,SUSE-SLE-Module-Basesystem-15-2019-2363,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2363,SUSE-SLE-Module-Server-Applications-15-2019-2363 SKIP SUSE-RU-2019:2366-1 as SUSE-SLE-WE-12-SP4-2019-2366 is not security or has no CVEs. patches: SUSE-2019-2366,SUSE-SLE-DESKTOP-12-SP4-2019-2366,SUSE-SLE-SDK-12-SP4-2019-2366,SUSE-SLE-WE-12-SP4-2019-2366 SKIP SUSE-RU-2019:2367-1 as SUSE-SLE-Product-HA-15-SP1-2019-2367 is not security or has no CVEs. patches: SUSE-2019-2367,SUSE-SLE-Module-Basesystem-15-SP1-2019-2367,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2367,SUSE-SLE-Product-HA-15-SP1-2019-2367 SKIP SUSE-RU-2019:2372-1 as SUSE-SLE-SERVER-12-SP4-2019-2372 is not security or has no CVEs. patches: SUSE-2019-2372,SUSE-SLE-DESKTOP-12-SP4-2019-2372,SUSE-SLE-SDK-12-SP4-2019-2372,SUSE-SLE-SERVER-12-SP4-2019-2372 SKIP SUSE-RU-2019:2375-1 as SUSE-SLE-Module-Development-Tools-15-2019-2375 is not security or has no CVEs. patches: SUSE-2019-2375,SUSE-SLE-Module-Basesystem-15-2019-2375,SUSE-SLE-Module-Development-Tools-15-2019-2375 SKIP SUSE-RU-2019:2376-1 as SUSE-Storage-5-2019-2376 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2376,SUSE-2019-2376,SUSE-OpenStack-Cloud-7-2019-2376,SUSE-OpenStack-Cloud-8-2019-2376,SUSE-OpenStack-Cloud-Crowbar-8-2019-2376,SUSE-SLE-DESKTOP-12-SP4-2019-2376,SUSE-SLE-DESKTOP-12-SP5-2019-2376,SUSE-SLE-SAP-12-SP2-2019-2376,SUSE-SLE-SAP-12-SP3-2019-2376,SUSE-SLE-SDK-12-SP4-2019-2376,SUSE-SLE-SERVER-12-SP2-2019-2376,SUSE-SLE-SERVER-12-SP2-BCL-2019-2376,SUSE-SLE-SERVER-12-SP3-2019-2376,SUSE-SLE-SERVER-12-SP3-BCL-2019-2376,SUSE-SLE-SERVER-12-SP4-2019-2376,SUSE-SLE-SERVER-12-SP5-2019-2376,SUSE-Storage-4-2019-2376,SUSE-Storage-5-2019-2376 SKIP SUSE-RU-2019:2377-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2377 is not security or has no CVEs. patches: SUSE-2019-2377,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2377 SKIP SUSE-RU-2019:2378-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2378 is not security or has no CVEs. patches: SUSE-2019-2378,SUSE-SLE-Module-Server-Applications-15-2019-2378,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2378 SKIP SUSE-RU-2019:2382-1 as SUSE-SLE-SDK-12-SP4-2019-2382 is not security or has no CVEs. patches: SUSE-2019-2382,SUSE-SLE-SDK-12-SP4-2019-2382 SKIP SUSE-RU-2019:2383-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2383 is not security or has no CVEs. patches: SUSE-2019-2383,SUSE-SLE-Module-Public-Cloud-12-2019-2383 SKIP SUSE-RU-2019:2394-1 as SUSE-Storage-6-2019-2394 is not security or has no CVEs. patches: SUSE-2019-2394,SUSE-SLE-Module-Basesystem-15-SP1-2019-2394,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2394,SUSE-Storage-6-2019-2394 SKIP SUSE-RU-2019:2404-1 as SUSE-SLE-HA-12-SP4-2019-2404 is not security or has no CVEs. patches: SUSE-2019-2404,SUSE-SLE-HA-12-SP4-2019-2404 SKIP SUSE-RU-2019:2405-1 as SUSE-SLE-Product-HA-15-2019-2405 is not security or has no CVEs. patches: SUSE-2019-2405,SUSE-SLE-Product-HA-15-2019-2405 SKIP SUSE-RU-2019:2406-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2406 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2406,SUSE-2019-2406,SUSE-OpenStack-Cloud-8-2019-2406,SUSE-OpenStack-Cloud-Crowbar-8-2019-2406,SUSE-SLE-Module-Public-Cloud-12-2019-2406 SKIP SUSE-RU-2019:2407-1 as SUSE-2019-2407 is not security or has no CVEs. patches: SUSE-2019-2407,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2407 SKIP SUSE-RU-2019:2415-1 as SUSE-SLE-SAP-12-SP4-2019-2415 is not security or has no CVEs. patches: SUSE-2019-2415,SUSE-SLE-SAP-12-SP3-2019-2415,SUSE-SLE-SAP-12-SP4-2019-2415 SKIP SUSE-RU-2019:2416-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2416 is not security or has no CVEs. patches: SUSE-2019-2416,SUSE-SLE-Module-Basesystem-15-SP1-2019-2416,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2416 SKIP SUSE-RU-2019:2417-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2417 is not security or has no CVEs. patches: SUSE-2019-2417,SUSE-SLE-Module-Basesystem-15-SP1-2019-2417 SKIP SUSE-RU-2019:2418-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2418 is not security or has no CVEs. patches: SUSE-2019-2418,SUSE-SLE-Module-Basesystem-15-2019-2418,SUSE-SLE-Module-Basesystem-15-SP1-2019-2418,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2418,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2418 SKIP SUSE-RU-2019:2419-1 as SUSE-SLE-Product-WE-15-SP1-2019-2419 is not security or has no CVEs. patches: SUSE-2019-2419,SUSE-SLE-Module-Basesystem-15-SP1-2019-2419,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2419,SUSE-SLE-Product-WE-15-SP1-2019-2419 SKIP SUSE-RU-2019:2420-1 as SUSE-Storage-5-2019-2420 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2420,SUSE-2019-2420,SUSE-OpenStack-Cloud-7-2019-2420,SUSE-OpenStack-Cloud-8-2019-2420,SUSE-OpenStack-Cloud-Crowbar-8-2019-2420,SUSE-SLE-SAP-12-SP2-2019-2420,SUSE-SLE-SAP-12-SP3-2019-2420,SUSE-SLE-SERVER-12-SP2-2019-2420,SUSE-SLE-SERVER-12-SP2-BCL-2019-2420,SUSE-SLE-SERVER-12-SP3-2019-2420,SUSE-SLE-SERVER-12-SP3-BCL-2019-2420,SUSE-Storage-4-2019-2420,SUSE-Storage-5-2019-2420 SKIP SUSE-RU-2019:2421-1 as SUSE-SLE-Module-Basesystem-15-2019-2421 is not security or has no CVEs. patches: SUSE-2019-2421,SUSE-SLE-Module-Basesystem-15-2019-2421 SKIP SUSE-RU-2019:2422-2 as SUSE-2019-2422 is not security or has no CVEs. patches: SUSE-2019-2422,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2422 SKIP SUSE-RU-2019:2423-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2423 is not security or has no CVEs. patches: SUSE-2019-2423,SUSE-SLE-Module-Basesystem-15-2019-2423,SUSE-SLE-Module-Basesystem-15-SP1-2019-2423,SUSE-SLE-Module-Development-Tools-15-2019-2423,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2423,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2423,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2423 SKIP SUSE-RU-2019:2433-1 as SUSE-SLE-Product-HA-15-2019-2433 is not security or has no CVEs. patches: SUSE-2019-2433,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2433,SUSE-SLE-Product-HA-15-2019-2433 SKIP SUSE-RU-2019:2434-1 as SUSE-SLE-Product-HA-15-2019-2434 is not security or has no CVEs. patches: SUSE-2019-2434,SUSE-SLE-Product-HA-15-2019-2434 SKIP SUSE-RU-2019:2438-1 as SUSE-Storage-6-2019-2438 is not security or has no CVEs. patches: SUSE-2019-2438,SUSE-Storage-6-2019-2438 SKIP SUSE-RU-2019:2441-1 as SUSE-SLE-SERVER-12-SP4-2019-2441 is not security or has no CVEs. patches: SUSE-2019-2441,SUSE-SLE-SERVER-12-SP4-2019-2441 SKIP SUSE-RU-2019:2442-1 as SUSE-2019-2442 is not security or has no CVEs. patches: SUSE-2019-2442,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2442 SKIP SUSE-RU-2019:2443-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2443 is not security or has no CVEs. patches: SUSE-2019-2443,SUSE-SLE-Module-Desktop-Applications-15-2019-2443,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2443,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2443,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2443 SKIP SUSE-RU-2019:2448-1 as SUSE-Storage-6-2019-2448 is not security or has no CVEs. patches: SUSE-2019-2448,SUSE-Storage-6-2019-2448 SKIP SUSE-RU-2019:2456-1 as SUSE-SLE-SERVER-12-SP4-2019-2456 is not security or has no CVEs. patches: SUSE-2019-2456,SUSE-SLE-DESKTOP-12-SP4-2019-2456,SUSE-SLE-HA-12-SP4-2019-2456,SUSE-SLE-SDK-12-SP4-2019-2456,SUSE-SLE-SERVER-12-SP4-2019-2456 SKIP SUSE-RU-2019:2457-1 as SUSE-SLE-HA-12-SP4-2019-2457 is not security or has no CVEs. patches: SUSE-2019-2457,SUSE-SLE-HA-12-SP4-2019-2457 SKIP SUSE-RU-2019:2458-1 as SUSE-Storage-6-2019-2458 is not security or has no CVEs. patches: SUSE-2019-2458,SUSE-Storage-6-2019-2458 SKIP SUSE-RU-2019:2459-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2459 is not security or has no CVEs. patches: SUSE-2019-2459,SUSE-SLE-Module-Basesystem-15-SP1-2019-2459 SKIP SUSE-RU-2019:2464-1 as SUSE-SLE-SERVER-12-SP4-2019-2464 is not security or has no CVEs. patches: SUSE-2019-2464,SUSE-SLE-SDK-12-SP4-2019-2464,SUSE-SLE-SERVER-12-SP4-2019-2464 SKIP SUSE-RU-2019:2465-1 as SUSE-SLE-Module-Server-Applications-15-2019-2465 is not security or has no CVEs. patches: SUSE-2019-2465,SUSE-SLE-Module-Server-Applications-15-2019-2465 SKIP SUSE-RU-2019:2466-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2466 is not security or has no CVEs. patches: SUSE-2019-2466,SUSE-SLE-Module-SAP-Applications-15-2019-2466,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2466 SKIP SUSE-RU-2019:2467-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2467 is not security or has no CVEs. patches: SUSE-2019-2467,SUSE-OpenStack-Cloud-Crowbar-9-2019-2467 SKIP SUSE-RU-2019:2468-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2468 is not security or has no CVEs. patches: SUSE-2019-2468,SUSE-OpenStack-Cloud-9-2019-2468,SUSE-OpenStack-Cloud-Crowbar-9-2019-2468 SKIP SUSE-RU-2019:2469-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2469 is not security or has no CVEs. patches: SUSE-2019-2469,SUSE-OpenStack-Cloud-9-2019-2469,SUSE-OpenStack-Cloud-Crowbar-9-2019-2469 SKIP SUSE-RU-2019:2470-1 as SUSE-SLE-SERVER-12-SP4-2019-2470 is not security or has no CVEs. patches: SUSE-2019-2470,SUSE-SLE-SERVER-12-SP4-2019-2470 SKIP SUSE-RU-2019:2471-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2471 is not security or has no CVEs. patches: SUSE-2019-2471,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2471 SKIP SUSE-RU-2019:2472-1 as SUSE-Storage-6-2019-2472 is not security or has no CVEs. patches: SUSE-2019-2472,SUSE-Storage-6-2019-2472 SKIP SUSE-RU-2019:2476-1 as SUSE-SLE-Product-HA-15-2019-2476 is not security or has no CVEs. patches: SUSE-2019-2476,SUSE-SLE-Product-HA-15-2019-2476 SKIP SUSE-RU-2019:2477-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2477 is not security or has no CVEs. patches: SUSE-2019-2477,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2477,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2477,SUSE-SLE-Module-Server-Applications-15-2019-2477,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2477 SKIP SUSE-RU-2019:2481-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2481 is not security or has no CVEs. patches: SUSE-2019-2481,SUSE-SLE-Module-Public-Cloud-12-2019-2481 SKIP SUSE-RU-2019:2482-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2482 is not security or has no CVEs. patches: SUSE-2019-2482,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2482,SUSE-SLE-Module-Public-Cloud-15-2019-2482,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2482 SKIP SUSE-RU-2019:2484-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2484 is not security or has no CVEs. patches: SUSE-2019-2484,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2484,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2484 SKIP SUSE-RU-2019:2486-1 as SUSE-SLE-Module-Basesystem-15-2019-2486 is not security or has no CVEs. patches: SUSE-2019-2486,SUSE-SLE-Module-Basesystem-15-2019-2486 SKIP SUSE-RU-2019:2487-1 as SUSE-SLE-Module-Containers-12-2019-2487 is not security or has no CVEs. patches: SUSE-2019-2487,SUSE-SLE-Module-Containers-12-2019-2487 SKIP SUSE-RU-2019:2490-1 as SUSE-SLE-Module-Server-Applications-15-2019-2490 is not security or has no CVEs. patches: SUSE-2019-2490,SUSE-SLE-Module-Server-Applications-15-2019-2490 SKIP SUSE-RU-2019:2491-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2491 is not security or has no CVEs. patches: SUSE-2019-2491,SUSE-SLE-Module-RT-15-SP1-2019-2491,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2491 SKIP SUSE-RU-2019:2493-1 as SUSE-SLE-Module-Public-Cloud-15-2019-2493 is not security or has no CVEs. patches: SUSE-2019-2493,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2493,SUSE-SLE-Module-Public-Cloud-15-2019-2493 SKIP SUSE-RU-2019:2494-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2494 is not security or has no CVEs. patches: SUSE-2019-2494,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2494,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2494 SKIP SUSE-RU-2019:2495-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2495 is not security or has no CVEs. patches: SUSE-2019-2495,SUSE-SLE-Module-Basesystem-15-2019-2495,SUSE-SLE-Module-Basesystem-15-SP1-2019-2495 SKIP SUSE-RU-2019:2498-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2498 is not security or has no CVEs. patches: SUSE-2019-2498,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2498 SKIP SUSE-RU-2019:2500-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2500 is not security or has no CVEs. patches: SUSE-2019-2500,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2500 SKIP SUSE-RU-2019:2506-1 as SUSE-SLE-Module-Public-Cloud-15-2019-2506 is not security or has no CVEs. patches: SUSE-2019-2506,SUSE-SLE-Module-Basesystem-15-2019-2506,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2506,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2506,SUSE-SLE-Module-Public-Cloud-15-2019-2506 SKIP SUSE-RU-2019:2508-1 as SUSE-2019-2508 is not security or has no CVEs. patches: SUSE-2019-2508,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2508 SKIP SUSE-RU-2019:2509-1 as SUSE-SLE-SERVER-12-SP4-2019-2509 is not security or has no CVEs. patches: SUSE-2019-2509,SUSE-SLE-SERVER-12-SP4-2019-2509 SKIP SUSE-RU-2019:2511-1 as SUSE-2019-2511 is not security or has no CVEs. patches: SUSE-2019-2511,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2511,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2511 SKIP SUSE-RU-2019:2518-1 as SUSE-SLE-Module-Basesystem-15-2019-2518 is not security or has no CVEs. patches: SUSE-2019-2518,SUSE-SLE-Module-Basesystem-15-2019-2518 SKIP SUSE-RU-2019:2519-1 as SUSE-SLE-SERVER-12-SP4-2019-2519 is not security or has no CVEs. patches: SUSE-2019-2519,SUSE-SLE-DESKTOP-12-SP4-2019-2519,SUSE-SLE-SERVER-12-SP4-2019-2519 SKIP SUSE-RU-2019:2520-1 as SUSE-SLE-Product-HA-15-SP1-2019-2520 is not security or has no CVEs. patches: SUSE-2019-2520,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2520,SUSE-SLE-Product-HA-15-SP1-2019-2520 SKIP SUSE-RU-2019:2521-1 as SUSE-SUSE-Manager-Proxy-3.2-2019-2521 is not security or has no CVEs. patches: SUSE-2019-2521,SUSE-SUSE-Manager-Proxy-3.2-2019-2521 SKIP SUSE-RU-2019:2522-1 as SUSE-SUSE-Manager-Server-3.2-2019-2522 is not security or has no CVEs. patches: SUSE-2019-2522,SUSE-SUSE-Manager-Proxy-3.2-2019-2522,SUSE-SUSE-Manager-Server-3.2-2019-2522 SKIP SUSE-RU-2019:2523-1 as SUSE-SLE-SDK-12-SP4-2019-2523 is not security or has no CVEs. patches: SUSE-2019-2523,SUSE-SLE-Module-Web-Scripting-12-2019-2523,SUSE-SLE-SDK-12-SP4-2019-2523 SKIP SUSE-RU-2019:2524-1 as SUSE-Storage-4-2019-2524 is not security or has no CVEs. patches: SUSE-2019-2524,SUSE-OpenStack-Cloud-7-2019-2524,SUSE-SLE-SAP-12-SP2-2019-2524,SUSE-SLE-SERVER-12-SP2-2019-2524,SUSE-SLE-SERVER-12-SP2-BCL-2019-2524,SUSE-Storage-4-2019-2524 SKIP SUSE-RU-2019:2525-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2525 is not security or has no CVEs. patches: SUSE-2019-2525,SUSE-SLE-Module-Basesystem-15-SP1-2019-2525 SKIP SUSE-RU-2019:2526-1 as SUSE-SLE-Module-Basesystem-15-2019-2526 is not security or has no CVEs. patches: SUSE-2019-2526,SUSE-SLE-Module-Basesystem-15-2019-2526 SKIP SUSE-RU-2019:2527-1 as SUSE-Storage-5-2019-2527 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2527,SUSE-2019-2527,SUSE-OpenStack-Cloud-7-2019-2527,SUSE-OpenStack-Cloud-8-2019-2527,SUSE-OpenStack-Cloud-Crowbar-8-2019-2527,SUSE-SLE-DESKTOP-12-SP4-2019-2527,SUSE-SLE-DESKTOP-12-SP5-2019-2527,SUSE-SLE-SAP-12-SP1-2019-2527,SUSE-SLE-SAP-12-SP2-2019-2527,SUSE-SLE-SAP-12-SP3-2019-2527,SUSE-SLE-SERVER-12-SP1-2019-2527,SUSE-SLE-SERVER-12-SP2-2019-2527,SUSE-SLE-SERVER-12-SP2-BCL-2019-2527,SUSE-SLE-SERVER-12-SP3-2019-2527,SUSE-SLE-SERVER-12-SP3-BCL-2019-2527,SUSE-SLE-SERVER-12-SP4-2019-2527,SUSE-SLE-SERVER-12-SP5-2019-2527,SUSE-Storage-4-2019-2527,SUSE-Storage-5-2019-2527 SKIP SUSE-RU-2019:2529-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2529 is not security or has no CVEs. patches: SUSE-2019-2529,SUSE-SLE-Module-Basesystem-15-SP1-2019-2529 SKIP SUSE-RU-2019:2532-1 as SUSE-SLE-HA-12-SP3-2019-2532 is not security or has no CVEs. patches: SUSE-2019-2532,SUSE-SLE-HA-12-SP3-2019-2532 SKIP SUSE-RU-2019:2534-1 as SUSE-SLE-HA-12-SP2-2019-2534 is not security or has no CVEs. patches: SUSE-2019-2534,SUSE-SLE-HA-12-SP2-2019-2534 SKIP SUSE-RU-2019:2535-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2535 is not security or has no CVEs. patches: SUSE-2019-2535,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2535 SKIP SUSE-RU-2019:2537-1 as SUSE-SLE-HA-12-SP2-2019-2537 is not security or has no CVEs. patches: SUSE-2019-2537,SUSE-SLE-HA-12-SP2-2019-2537 SKIP SUSE-RU-2019:2540-1 as SUSE-SLE-Module-Server-Applications-15-2019-2540 is not security or has no CVEs. patches: SUSE-2019-2540,SUSE-SLE-Module-Basesystem-15-2019-2540,SUSE-SLE-Module-Server-Applications-15-2019-2540 SKIP SUSE-RU-2019:2541-1 as SUSE-SUSE-Manager-Server-3.2-2019-2541 is not security or has no CVEs. patches: SUSE-2019-2541,SUSE-SLE-Manager-Tools-12-2019-2541,SUSE-SLE-Module-Adv-Systems-Management-12-2019-2541,SUSE-SLE-POS-12-SP2-2019-2541,SUSE-SUSE-Manager-Proxy-3.2-2019-2541,SUSE-SUSE-Manager-Server-3.2-2019-2541 SKIP SUSE-RU-2019:2542-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2542 is not security or has no CVEs. patches: SUSE-2019-2542,SUSE-SLE-Module-Basesystem-15-SP1-2019-2542,SUSE-SLE-Module-Python2-15-SP1-2019-2542,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2542 SKIP SUSE-RU-2019:2544-1 as SUSE-SLE-SERVER-12-SP4-2019-2544 is not security or has no CVEs. patches: SUSE-2019-2544,SUSE-SLE-DESKTOP-12-SP4-2019-2544,SUSE-SLE-SERVER-12-SP4-2019-2544 SKIP SUSE-RU-2019:2548-1 as SUSE-SLE-HA-12-SP3-2019-2548 is not security or has no CVEs. patches: SUSE-2019-2548,SUSE-SLE-HA-12-SP3-2019-2548 SKIP SUSE-RU-2019:2551-1 as SUSE-SLE-SERVER-12-SP4-2019-2551 is not security or has no CVEs. patches: SUSE-2019-2551,SUSE-SLE-DESKTOP-12-SP4-2019-2551,SUSE-SLE-HA-12-SP4-2019-2551,SUSE-SLE-SDK-12-SP4-2019-2551,SUSE-SLE-SERVER-12-SP4-2019-2551 SKIP SUSE-RU-2019:2552-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2552 is not security or has no CVEs. patches: SUSE-2019-2552,SUSE-OpenStack-Cloud-9-2019-2552,SUSE-OpenStack-Cloud-Crowbar-9-2019-2552 SKIP SUSE-RU-2019:2553-1 as SUSE-OpenStack-Cloud-Crowbar-9-2019-2553 is not security or has no CVEs. patches: SUSE-2019-2553,SUSE-OpenStack-Cloud-9-2019-2553,SUSE-OpenStack-Cloud-Crowbar-9-2019-2553 SKIP SUSE-RU-2019:2555-1 as SUSE-SLE-Product-HA-15-SP1-2019-2555 is not security or has no CVEs. patches: SUSE-2019-2555,SUSE-SLE-Product-HA-15-SP1-2019-2555 SKIP SUSE-RU-2019:2556-1 as SUSE-Storage-5-2019-2556 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2556,SUSE-2019-2556,SUSE-OpenStack-Cloud-7-2019-2556,SUSE-OpenStack-Cloud-8-2019-2556,SUSE-OpenStack-Cloud-Crowbar-8-2019-2556,SUSE-SLE-DESKTOP-12-SP4-2019-2556,SUSE-SLE-SAP-12-SP1-2019-2556,SUSE-SLE-SAP-12-SP2-2019-2556,SUSE-SLE-SAP-12-SP3-2019-2556,SUSE-SLE-SERVER-12-SP1-2019-2556,SUSE-SLE-SERVER-12-SP2-2019-2556,SUSE-SLE-SERVER-12-SP2-BCL-2019-2556,SUSE-SLE-SERVER-12-SP3-2019-2556,SUSE-SLE-SERVER-12-SP3-BCL-2019-2556,SUSE-SLE-SERVER-12-SP4-2019-2556,SUSE-Storage-4-2019-2556,SUSE-Storage-5-2019-2556 SKIP SUSE-RU-2019:2557-1 as SUSE-SLE-Product-HA-15-SP1-2019-2557 is not security or has no CVEs. patches: SUSE-2019-2557,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2557,SUSE-SLE-Product-HA-15-SP1-2019-2557 SKIP SUSE-RU-2019:2560-1 as SUSE-SLE-SERVER-12-SP4-2019-2560 is not security or has no CVEs. patches: SUSE-2019-2560,SUSE-SLE-SDK-12-SP4-2019-2560,SUSE-SLE-SERVER-12-SP4-2019-2560 SKIP SUSE-RU-2019:2563-1 as SUSE-Storage-5-2019-2563 is not security or has no CVEs. patches: SUSE-2019-2563,SUSE-Storage-5-2019-2563 SKIP SUSE-RU-2019:2564-1 as SUSE-Storage-6-2019-2564 is not security or has no CVEs. patches: SUSE-2019-2564,SUSE-Storage-6-2019-2564 SKIP SUSE-RU-2019:2566-1 as SUSE-Storage-4-2019-2566 is not security or has no CVEs. patches: SUSE-2019-2566,SUSE-OpenStack-Cloud-7-2019-2566,SUSE-SLE-SAP-12-SP1-2019-2566,SUSE-SLE-SAP-12-SP2-2019-2566,SUSE-SLE-SERVER-12-SP1-2019-2566,SUSE-SLE-SERVER-12-SP2-2019-2566,SUSE-SLE-SERVER-12-SP2-BCL-2019-2566,SUSE-Storage-4-2019-2566 SKIP SUSE-RU-2019:2567-1 as SUSE-Storage-5-2019-2567 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2567,SUSE-2019-2567,SUSE-OpenStack-Cloud-8-2019-2567,SUSE-OpenStack-Cloud-Crowbar-8-2019-2567,SUSE-SLE-DESKTOP-12-SP4-2019-2567,SUSE-SLE-DESKTOP-12-SP5-2019-2567,SUSE-SLE-SAP-12-SP3-2019-2567,SUSE-SLE-SERVER-12-SP3-2019-2567,SUSE-SLE-SERVER-12-SP3-BCL-2019-2567,SUSE-SLE-SERVER-12-SP4-2019-2567,SUSE-SLE-SERVER-12-SP5-2019-2567,SUSE-Storage-5-2019-2567 SKIP SUSE-RU-2019:2568-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2568 is not security or has no CVEs. patches: SUSE-2019-2568,SUSE-SLE-Module-Basesystem-15-2019-2568,SUSE-SLE-Module-Basesystem-15-SP1-2019-2568 SKIP SUSE-RU-2019:2569-1 as SUSE-SLE-HA-12-SP3-2019-2569 is not security or has no CVEs. patches: SUSE-2019-2569,SUSE-SLE-HA-12-SP3-2019-2569 SKIP SUSE-RU-2019:2618-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2618 is not security or has no CVEs. patches: SUSE-2019-2618,SUSE-SLE-Module-Public-Cloud-12-2019-2618 SKIP SUSE-RU-2019:2619-1 as SUSE-Storage-4-2019-2619 is not security or has no CVEs. patches: SUSE-2019-2619,SUSE-Storage-4-2019-2619 ERROR: notice SUSE-RU-2019:2624-1 has no valid patches out of: SUSE-2019-2624,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2624,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2624 SKIP SUSE-RU-2019:2625-1 as SUSE-SLE-Module-Legacy-12-2019-2625 is not security or has no CVEs. patches: SUSE-2019-2625,SUSE-SLE-Module-Legacy-12-2019-2625 SKIP SUSE-RU-2019:2626-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2626 is not security or has no CVEs. patches: SUSE-2019-2626,SUSE-SLE-Module-Basesystem-15-SP1-2019-2626 SKIP SUSE-RU-2019:2628-1 as SUSE-SLE-SERVER-12-SP4-2019-2628 is not security or has no CVEs. patches: SUSE-2019-2628,SUSE-SLE-DESKTOP-12-SP4-2019-2628,SUSE-SLE-SDK-12-SP4-2019-2628,SUSE-SLE-SERVER-12-SP4-2019-2628 SKIP SUSE-RU-2019:2629-1 as SUSE-SLE-Module-Basesystem-15-2019-2629 is not security or has no CVEs. patches: SUSE-2019-2629,SUSE-SLE-Module-Basesystem-15-2019-2629,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2629 SKIP SUSE-RU-2019:2630-1 as SUSE-SLE-SERVER-12-SP1-2019-2630 is not security or has no CVEs. patches: SUSE-2019-2630,SUSE-SLE-SAP-12-SP1-2019-2630,SUSE-SLE-SERVER-12-SP1-2019-2630 SKIP SUSE-RU-2019:2631-1 as SUSE-SLE-Product-HA-15-2019-2631 is not security or has no CVEs. patches: SUSE-2019-2631,SUSE-SLE-Product-HA-15-2019-2631 SKIP SUSE-RU-2019:2632-1 as SUSE-SLE-Module-Development-Tools-15-2019-2632 is not security or has no CVEs. patches: SUSE-2019-2632,SUSE-SLE-INSTALLER-15-2019-2632,SUSE-SLE-Module-Basesystem-15-2019-2632,SUSE-SLE-Module-Development-Tools-15-2019-2632,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2632 SKIP SUSE-RU-2019:2633-1 as SUSE-SLE-SERVER-12-SP1-2019-2633 is not security or has no CVEs. patches: SUSE-2019-2633,SUSE-SLE-SAP-12-SP1-2019-2633,SUSE-SLE-SERVER-12-SP1-2019-2633 SKIP SUSE-RU-2019:2634-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2634 is not security or has no CVEs. patches: SUSE-2019-2634,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2634 SKIP SUSE-RU-2019:2635-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2635 is not security or has no CVEs. patches: SUSE-2019-2635,SUSE-SLE-Module-Basesystem-15-SP1-2019-2635,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2635,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2635 SKIP SUSE-RU-2019:2637-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2637 is not security or has no CVEs. patches: SUSE-2019-2637,SUSE-SLE-Module-Basesystem-15-SP1-2019-2637 SKIP SUSE-RU-2019:2638-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2638 is not security or has no CVEs. patches: SUSE-2019-2638,SUSE-SLE-INSTALLER-15-SP1-2019-2638,SUSE-SLE-Module-Basesystem-15-SP1-2019-2638 SKIP SUSE-RU-2019:2639-1 as SUSE-SLE-Product-WE-15-SP1-2019-2639 is not security or has no CVEs. patches: SUSE-2019-2639,SUSE-SLE-Module-Basesystem-15-2019-2639,SUSE-SLE-Module-Basesystem-15-SP1-2019-2639,SUSE-SLE-Module-Desktop-Applications-15-2019-2639,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2639,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2639,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2639,SUSE-SLE-Product-WE-15-2019-2639,SUSE-SLE-Product-WE-15-SP1-2019-2639 SKIP SUSE-RU-2019:2640-1 as SUSE-SLE-SERVER-12-SP1-2019-2640 is not security or has no CVEs. patches: SUSE-2019-2640,SUSE-SLE-SAP-12-SP1-2019-2640,SUSE-SLE-SERVER-12-SP1-2019-2640 SKIP SUSE-RU-2019:2641-1 as SUSE-Storage-5-2019-2641 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2641,SUSE-2019-2641,SUSE-OpenStack-Cloud-8-2019-2641,SUSE-OpenStack-Cloud-Crowbar-8-2019-2641,SUSE-SLE-DESKTOP-12-SP4-2019-2641,SUSE-SLE-SAP-12-SP3-2019-2641,SUSE-SLE-SERVER-12-SP3-2019-2641,SUSE-SLE-SERVER-12-SP3-BCL-2019-2641,SUSE-SLE-SERVER-12-SP4-2019-2641,SUSE-Storage-5-2019-2641 SKIP SUSE-RU-2019:2642-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2642 is not security or has no CVEs. patches: SUSE-2019-2642,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2642,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2642 SKIP SUSE-RU-2019:2643-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2643 is not security or has no CVEs. patches: SUSE-2019-2643,SUSE-SLE-Module-Public-Cloud-12-2019-2643 SKIP SUSE-RU-2019:2644-1 as SUSE-SLE-Product-HA-15-2019-2644 is not security or has no CVEs. patches: SUSE-2019-2644,SUSE-SLE-Product-HA-15-2019-2644 SKIP SUSE-RU-2019:2645-1 as SUSE-SLE-Module-Python2-15-SP1-2019-2645 is not security or has no CVEs. patches: SUSE-2019-2645,SUSE-SLE-Module-Basesystem-15-2019-2645,SUSE-SLE-Module-Basesystem-15-SP1-2019-2645,SUSE-SLE-Module-Python2-15-SP1-2019-2645 SKIP SUSE-RU-2019:2646-1 as SUSE-SLE-Product-HA-15-SP1-2019-2646 is not security or has no CVEs. patches: SUSE-2019-2646,SUSE-SLE-Product-HA-15-SP1-2019-2646 SKIP SUSE-RU-2019:2647-1 as SUSE-SLE-Module-Python2-15-SP1-2019-2647 is not security or has no CVEs. patches: SUSE-2019-2647,SUSE-SLE-Module-Basesystem-15-2019-2647,SUSE-SLE-Module-Basesystem-15-SP1-2019-2647,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2647,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2647,SUSE-SLE-Module-Python2-15-SP1-2019-2647 SKIP SUSE-RU-2019:2652-1 as SUSE-SLE-Product-HA-15-2019-2652 is not security or has no CVEs. patches: SUSE-2019-2652,SUSE-SLE-Product-HA-15-2019-2652 SKIP SUSE-RU-2019:2653-1 as SUSE-SLE-SERVER-12-SP4-2019-2653 is not security or has no CVEs. patches: SUSE-2019-2653,SUSE-SLE-SERVER-12-SP4-2019-2653 SKIP SUSE-RU-2019:2654-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2654 is not security or has no CVEs. patches: SUSE-2019-2654,SUSE-SLE-Module-Server-Applications-15-2019-2654,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2654 SKIP SUSE-RU-2019:2659-1 as SUSE-SLE-Module-Public-Cloud-12-2019-2659 is not security or has no CVEs. patches: SUSE-2019-2659,SUSE-SLE-Module-Public-Cloud-12-2019-2659 SKIP SUSE-RU-2019:2660-1 as SUSE-SLE-HA-12-SP4-2019-2660 is not security or has no CVEs. patches: SUSE-2019-2660,SUSE-SLE-HA-12-SP4-2019-2660 SKIP SUSE-RU-2019:2661-1 as SUSE-Storage-5-2019-2661 is not security or has no CVEs. patches: SUSE-2019-2661,SUSE-Storage-5-2019-2661 SKIP SUSE-RU-2019:2670-1 as SUSE-Storage-5-2019-2670 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2670,SUSE-2019-2670,SUSE-OpenStack-Cloud-7-2019-2670,SUSE-OpenStack-Cloud-8-2019-2670,SUSE-OpenStack-Cloud-Crowbar-8-2019-2670,SUSE-SLE-DESKTOP-12-SP4-2019-2670,SUSE-SLE-DESKTOP-12-SP5-2019-2670,SUSE-SLE-SAP-12-SP1-2019-2670,SUSE-SLE-SAP-12-SP2-2019-2670,SUSE-SLE-SAP-12-SP3-2019-2670,SUSE-SLE-SDK-12-SP4-2019-2670,SUSE-SLE-SDK-12-SP5-2019-2670,SUSE-SLE-SERVER-12-SP1-2019-2670,SUSE-SLE-SERVER-12-SP2-2019-2670,SUSE-SLE-SERVER-12-SP2-BCL-2019-2670,SUSE-SLE-SERVER-12-SP3-2019-2670,SUSE-SLE-SERVER-12-SP3-BCL-2019-2670,SUSE-SLE-SERVER-12-SP4-2019-2670,SUSE-SLE-SERVER-12-SP5-2019-2670,SUSE-Storage-4-2019-2670,SUSE-Storage-5-2019-2670 SKIP SUSE-RU-2019:2672-1 as SUSE-Storage-4-2019-2672 is not security or has no CVEs. patches: SUSE-2019-2672,SUSE-Storage-4-2019-2672 SKIP SUSE-RU-2019:2675-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2675 is not security or has no CVEs. patches: SUSE-2019-2675,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2675 SKIP SUSE-RU-2019:2678-1 as SUSE-SLE-Module-HPC-12-2019-2678 is not security or has no CVEs. patches: SUSE-2019-2678,SUSE-SLE-Module-HPC-12-2019-2678 SKIP SUSE-RU-2019:2679-1 as SUSE-SLE-Module-HPC-15-2019-2679 is not security or has no CVEs. patches: SUSE-2019-2679,SUSE-SLE-Module-HPC-15-2019-2679 SKIP SUSE-RU-2019:2680-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-2680 is not security or has no CVEs. patches: SUSE-2019-2680,SUSE-SLE-DESKTOP-12-SP4-2019-2680,SUSE-SLE-DESKTOP-INSTALLER-12-SP4-2019-2680,SUSE-SLE-SERVER-12-SP4-2019-2680,SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-2680 SKIP SUSE-RU-2019:2681-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2681 is not security or has no CVEs. patches: SUSE-2019-2681,SUSE-SLE-Module-Basesystem-15-2019-2681,SUSE-SLE-Module-Basesystem-15-SP1-2019-2681,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2681,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2681 SKIP SUSE-RU-2019:2682-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2682 is not security or has no CVEs. patches: SUSE-2019-2682,SUSE-SLE-Module-Basesystem-15-2019-2682,SUSE-SLE-Module-Basesystem-15-SP1-2019-2682 SKIP SUSE-RU-2019:2683-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2683 is not security or has no CVEs. patches: SUSE-2019-2683,SUSE-SLE-Module-Basesystem-15-SP1-2019-2683,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2683 SKIP SUSE-RU-2019:2685-1 as SUSE-SLE-Module-Basesystem-15-2019-2685 is not security or has no CVEs. patches: SUSE-2019-2685,SUSE-SLE-Module-Basesystem-15-2019-2685 SKIP SUSE-RU-2019:2688-1 as SUSE-SLE-HA-12-SP4-2019-2688 is not security or has no CVEs. patches: SUSE-2019-2688,SUSE-SLE-HA-12-SP4-2019-2688 SKIP SUSE-RU-2019:2689-1 as SUSE-SLE-HA-12-SP4-2019-2689 is not security or has no CVEs. patches: SUSE-2019-2689,SUSE-SLE-HA-12-SP3-2019-2689,SUSE-SLE-HA-12-SP4-2019-2689 SKIP SUSE-RU-2019:2691-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2691 is not security or has no CVEs. patches: SUSE-2019-2691,SUSE-SLE-Module-Basesystem-15-SP1-2019-2691 SKIP SUSE-RU-2019:2692-1 as SUSE-Storage-4-2019-2692 is not security or has no CVEs. patches: SUSE-2019-2692,SUSE-OpenStack-Cloud-7-2019-2692,SUSE-SLE-SAP-12-SP2-2019-2692,SUSE-SLE-SERVER-12-SP2-2019-2692,SUSE-SLE-SERVER-12-SP2-BCL-2019-2692,SUSE-Storage-4-2019-2692 SKIP SUSE-RU-2019:2693-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2693 is not security or has no CVEs. patches: SUSE-2019-2693,SUSE-SLE-Module-Basesystem-15-2019-2693,SUSE-SLE-Module-Basesystem-15-SP1-2019-2693 SKIP SUSE-RU-2019:2694-1 as SUSE-SLE-SERVER-12-SP4-2019-2694 is not security or has no CVEs. patches: SUSE-2019-2694,SUSE-SLE-DESKTOP-12-SP4-2019-2694,SUSE-SLE-SERVER-12-SP4-2019-2694 SKIP SUSE-RU-2019:2694-2 as SUSE-Storage-5-2019-2694 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2694,SUSE-2019-2694,SUSE-OpenStack-Cloud-7-2019-2694,SUSE-OpenStack-Cloud-8-2019-2694,SUSE-OpenStack-Cloud-Crowbar-8-2019-2694,SUSE-SLE-SAP-12-SP2-2019-2694,SUSE-SLE-SAP-12-SP3-2019-2694,SUSE-SLE-SERVER-12-SP2-2019-2694,SUSE-SLE-SERVER-12-SP2-BCL-2019-2694,SUSE-SLE-SERVER-12-SP3-2019-2694,SUSE-SLE-SERVER-12-SP3-BCL-2019-2694,SUSE-SLE-SERVER-12-SP5-2019-2694,SUSE-Storage-5-2019-2694 SKIP SUSE-RU-2019:2695-1 as SUSE-SLE-Module-Development-Tools-15-2019-2695 is not security or has no CVEs. patches: SUSE-2019-2695,SUSE-SLE-Module-Development-Tools-15-2019-2695 SKIP SUSE-RU-2019:2696-1 as SUSE-SLE-SERVER-12-SP4-2019-2696 is not security or has no CVEs. patches: SUSE-2019-2696,SUSE-SLE-SERVER-12-SP4-2019-2696 SKIP SUSE-RU-2019:2697-1 as SUSE-SLE-SERVER-12-SP4-2019-2697 is not security or has no CVEs. patches: SUSE-2019-2697,SUSE-SLE-DESKTOP-12-SP4-2019-2697,SUSE-SLE-SERVER-12-SP4-2019-2697 SKIP SUSE-RU-2019:2698-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2698 is not security or has no CVEs. patches: SUSE-2019-2698,SUSE-SLE-Module-Basesystem-15-SP1-2019-2698 SKIP SUSE-RU-2019:2699-1 as SUSE-SLE-Module-Basesystem-15-2019-2699 is not security or has no CVEs. patches: SUSE-2019-2699,SUSE-SLE-Module-Basesystem-15-2019-2699 SKIP SUSE-RU-2019:2700-1 as SUSE-SLE-Module-Basesystem-15-2019-2700 is not security or has no CVEs. patches: SUSE-2019-2700,SUSE-SLE-INSTALLER-15-2019-2700,SUSE-SLE-Module-Basesystem-15-2019-2700 SKIP SUSE-RU-2019:2703-1 as SUSE-Storage-5-2019-2703 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2703,SUSE-2019-2703,SUSE-OpenStack-Cloud-7-2019-2703,SUSE-OpenStack-Cloud-8-2019-2703,SUSE-OpenStack-Cloud-Crowbar-8-2019-2703,SUSE-SLE-DESKTOP-12-SP4-2019-2703,SUSE-SLE-DESKTOP-12-SP5-2019-2703,SUSE-SLE-SAP-12-SP1-2019-2703,SUSE-SLE-SAP-12-SP2-2019-2703,SUSE-SLE-SAP-12-SP3-2019-2703,SUSE-SLE-SDK-12-SP4-2019-2703,SUSE-SLE-SDK-12-SP5-2019-2703,SUSE-SLE-SERVER-12-SP1-2019-2703,SUSE-SLE-SERVER-12-SP2-2019-2703,SUSE-SLE-SERVER-12-SP2-BCL-2019-2703,SUSE-SLE-SERVER-12-SP3-2019-2703,SUSE-SLE-SERVER-12-SP3-BCL-2019-2703,SUSE-SLE-SERVER-12-SP4-2019-2703,SUSE-SLE-SERVER-12-SP5-2019-2703,SUSE-Storage-4-2019-2703,SUSE-Storage-5-2019-2703 SKIP SUSE-RU-2019:2704-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2704 is not security or has no CVEs. patches: SUSE-2019-2704,SUSE-SLE-Module-Basesystem-15-SP1-2019-2704,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2704 SKIP SUSE-RU-2019:2705-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2705 is not security or has no CVEs. patches: SUSE-2019-2705,SUSE-SLE-Module-SAP-Applications-15-2019-2705,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2705 SKIP SUSE-RU-2019:2708-1 as SUSE-Storage-5-2019-2708 is not security or has no CVEs. patches: SUSE-2019-2708,SUSE-SLE-Module-Public-Cloud-12-2019-2708,SUSE-SUSE-Manager-Server-3.2-2019-2708,SUSE-Storage-4-2019-2708,SUSE-Storage-5-2019-2708 SKIP SUSE-RU-2019:2709-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2709 is not security or has no CVEs. patches: SUSE-2019-2709,SUSE-SLE-Module-Basesystem-15-SP1-2019-2709,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2709 SKIP SUSE-RU-2019:2712-1 as SUSE-SLE-RT-12-SP4-2019-2712 is not security or has no CVEs. patches: SUSE-2019-2712,SUSE-SLE-RT-12-SP4-2019-2712 SKIP SUSE-RU-2019:2713-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2713 is not security or has no CVEs. patches: SUSE-2019-2713,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2713 SKIP SUSE-RU-2019:2714-1 as SUSE-SLE-Product-HA-15-SP1-2019-2714 is not security or has no CVEs. patches: SUSE-2019-2714,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-2714,SUSE-SLE-Product-HA-15-SP1-2019-2714 SKIP SUSE-RU-2019:2717-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2717 is not security or has no CVEs. patches: SUSE-2019-2717,SUSE-SLE-Module-Basesystem-15-2019-2717,SUSE-SLE-Module-Basesystem-15-SP1-2019-2717,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2717,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2717 SKIP SUSE-RU-2019:2721-1 as SUSE-SLE-SERVER-12-SP4-2019-2721 is not security or has no CVEs. patches: SUSE-2019-2721,SUSE-SLE-DESKTOP-12-SP4-2019-2721,SUSE-SLE-SERVER-12-SP4-2019-2721 SKIP SUSE-RU-2019:2722-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2722 is not security or has no CVEs. patches: SUSE-2019-2722,SUSE-SLE-Module-Basesystem-15-2019-2722,SUSE-SLE-Module-Basesystem-15-SP1-2019-2722 SKIP SUSE-RU-2019:2723-1 as SUSE-SLE-Module-HPC-15-SP1-2019-2723 is not security or has no CVEs. patches: SUSE-2019-2723,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2723,SUSE-SLE-Module-HPC-15-SP1-2019-2723 SKIP SUSE-RU-2019:2725-1 as SUSE-SLE-SERVER-12-SP4-2019-2725 is not security or has no CVEs. patches: SUSE-2019-2725,SUSE-SLE-DESKTOP-12-SP4-2019-2725,SUSE-SLE-SDK-12-SP4-2019-2725,SUSE-SLE-SERVER-12-SP4-2019-2725 SKIP SUSE-RU-2019:2728-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2728 is not security or has no CVEs. patches: SUSE-2019-2728,SUSE-SLE-Module-Basesystem-15-SP1-2019-2728 SKIP SUSE-RU-2019:2729-1 as SUSE-SLE-Module-Basesystem-15-2019-2729 is not security or has no CVEs. patches: SUSE-2019-2729,SUSE-SLE-INSTALLER-15-2019-2729,SUSE-SLE-Module-Basesystem-15-2019-2729 SKIP SUSE-RU-2019:2731-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2731 is not security or has no CVEs. patches: SUSE-2019-2731,SUSE-SLE-Module-Basesystem-15-SP1-2019-2731 SKIP SUSE-RU-2019:2732-1 as SUSE-SLE-Module-Basesystem-15-2019-2732 is not security or has no CVEs. patches: SUSE-2019-2732,SUSE-SLE-Module-Basesystem-15-2019-2732,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2732 SKIP SUSE-RU-2019:2734-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2734 is not security or has no CVEs. patches: SUSE-2019-2734,SUSE-SLE-Module-Basesystem-15-2019-2734,SUSE-SLE-Module-Basesystem-15-SP1-2019-2734 SKIP SUSE-RU-2019:2735-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2735 is not security or has no CVEs. patches: SUSE-2019-2735,SUSE-SLE-Module-Basesystem-15-2019-2735,SUSE-SLE-Module-Basesystem-15-SP1-2019-2735,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2735,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2735,SUSE-SLE-Module-Server-Applications-15-2019-2735,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2735 SKIP SUSE-RU-2019:2739-1 as SUSE-SLE-Module-Python2-15-SP1-2019-2739 is not security or has no CVEs. patches: SUSE-2019-2739,SUSE-SLE-Module-Basesystem-15-SP1-2019-2739,SUSE-SLE-Module-Python2-15-SP1-2019-2739 SKIP SUSE-RU-2019:2740-1 as SUSE-Storage-5-2019-2740 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2740,SUSE-2019-2740,SUSE-OpenStack-Cloud-7-2019-2740,SUSE-OpenStack-Cloud-8-2019-2740,SUSE-OpenStack-Cloud-Crowbar-8-2019-2740,SUSE-SLE-DESKTOP-12-SP4-2019-2740,SUSE-SLE-DESKTOP-12-SP5-2019-2740,SUSE-SLE-SAP-12-SP1-2019-2740,SUSE-SLE-SAP-12-SP2-2019-2740,SUSE-SLE-SAP-12-SP3-2019-2740,SUSE-SLE-SERVER-12-SP1-2019-2740,SUSE-SLE-SERVER-12-SP2-2019-2740,SUSE-SLE-SERVER-12-SP2-BCL-2019-2740,SUSE-SLE-SERVER-12-SP3-2019-2740,SUSE-SLE-SERVER-12-SP3-BCL-2019-2740,SUSE-SLE-SERVER-12-SP4-2019-2740,SUSE-SLE-SERVER-12-SP5-2019-2740,SUSE-Storage-4-2019-2740,SUSE-Storage-5-2019-2740 SKIP SUSE-RU-2019:2746-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2746 is not security or has no CVEs. patches: SUSE-2019-2746,SUSE-SLE-Module-SAP-Applications-15-2019-2746,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2746 SKIP SUSE-RU-2019:2747-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2747 is not security or has no CVEs. patches: SUSE-2019-2747,SUSE-SLE-Module-SAP-Applications-15-2019-2747,SUSE-SLE-Module-SAP-Applications-15-SP1-2019-2747 SKIP SUSE-RU-2019:2751-1 as SUSE-SLE-SERVER-12-SP4-2019-2751 is not security or has no CVEs. patches: SUSE-2019-2751,SUSE-SLE-SERVER-12-SP4-2019-2751 SKIP SUSE-RU-2019:2758-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2758 is not security or has no CVEs. patches: SUSE-2019-2758,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2758,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2758 SKIP SUSE-RU-2019:2759-1 as SUSE-SLE-SERVER-12-SP4-2019-2759 is not security or has no CVEs. patches: SUSE-2019-2759,SUSE-SLE-SDK-12-SP4-2019-2759,SUSE-SLE-SERVER-12-SP4-2019-2759 SKIP SUSE-RU-2019:2760-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2760 is not security or has no CVEs. patches: SUSE-2019-2760,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2760,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2760,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-2760,SUSE-SLE-Module-Web-Scripting-15-2019-2760,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2760 SKIP SUSE-RU-2019:2761-1 as SUSE-SLE-SERVER-12-SP4-2019-2761 is not security or has no CVEs. patches: SUSE-2019-2761,SUSE-SLE-DESKTOP-12-SP4-2019-2761,SUSE-SLE-SERVER-12-SP4-2019-2761 SKIP SUSE-RU-2019:2761-2 as SUSE-SLE-SERVER-12-SP5-2019-2761 is not security or has no CVEs. patches: SUSE-2019-2761,SUSE-SLE-SERVER-12-SP5-2019-2761 SKIP SUSE-RU-2019:2762-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2762 is not security or has no CVEs. patches: SUSE-2019-2762,SUSE-SLE-Module-Basesystem-15-2019-2762,SUSE-SLE-Module-Basesystem-15-SP1-2019-2762 SKIP SUSE-RU-2019:2763-1 as SUSE-SLE-Product-WE-15-SP1-2019-2763 is not security or has no CVEs. patches: SUSE-2019-2763,SUSE-SLE-Product-WE-15-2019-2763,SUSE-SLE-Product-WE-15-SP1-2019-2763 SKIP SUSE-RU-2019:2764-1 as SUSE-SLE-Module-Basesystem-15-2019-2764 is not security or has no CVEs. patches: SUSE-2019-2764,SUSE-SLE-Module-Basesystem-15-2019-2764 SKIP SUSE-RU-2019:2765-1 as SUSE-SLE-Module-Transactional-Server-15-SP1-2019-2765 is not security or has no CVEs. patches: SUSE-2019-2765,SUSE-SLE-Module-Transactional-Server-15-SP1-2019-2765 SKIP SUSE-RU-2019:2766-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2766 is not security or has no CVEs. patches: SUSE-2019-2766,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2766,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2766 SKIP SUSE-RU-2019:2768-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2768 is not security or has no CVEs. patches: SUSE-2019-2768,SUSE-SLE-Module-Basesystem-15-SP1-2019-2768,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2768,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2768,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2768 SKIP SUSE-RU-2019:2772-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2019-2772 is not security or has no CVEs. patches: SUSE-2019-2772,SUSE-SLE-Module-Live-Patching-15-2019-2772,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2772 SKIP SUSE-RU-2019:2773-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2773 is not security or has no CVEs. patches: SUSE-2019-2773,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2773 SKIP SUSE-RU-2019:2774-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2774 is not security or has no CVEs. patches: SUSE-2019-2774,SUSE-SLE-Module-Basesystem-15-2019-2774,SUSE-SLE-Module-Basesystem-15-SP1-2019-2774 SKIP SUSE-RU-2019:2777-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2777 is not security or has no CVEs. patches: SUSE-2019-2777,SUSE-SLE-Module-Basesystem-15-2019-2777,SUSE-SLE-Module-Basesystem-15-SP1-2019-2777,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2777 SKIP SUSE-RU-2019:2790-1 as SUSE-SLE-Module-Legacy-15-SP1-2019-2790 is not security or has no CVEs. patches: SUSE-2019-2790,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2790,SUSE-SLE-Module-Legacy-15-2019-2790,SUSE-SLE-Module-Legacy-15-SP1-2019-2790 SKIP SUSE-RU-2019:2791-1 as SUSE-SLE-WE-12-SP5-2019-2791 is not security or has no CVEs. patches: SUSE-2019-2791,SUSE-SLE-DESKTOP-12-SP4-2019-2791,SUSE-SLE-WE-12-SP4-2019-2791,SUSE-SLE-WE-12-SP5-2019-2791 SKIP SUSE-RU-2019:2792-1 as SUSE-SLE-SERVER-12-SP5-2019-2792 is not security or has no CVEs. patches: SUSE-2019-2792,SUSE-SLE-DESKTOP-12-SP4-2019-2792,SUSE-SLE-SDK-12-SP4-2019-2792,SUSE-SLE-SDK-12-SP5-2019-2792,SUSE-SLE-SERVER-12-SP4-2019-2792,SUSE-SLE-SERVER-12-SP5-2019-2792 SKIP SUSE-RU-2019:2793-1 as SUSE-SLE-Product-HA-15-2019-2793 is not security or has no CVEs. patches: SUSE-2019-2793,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2793,SUSE-SLE-Product-HA-15-2019-2793 SKIP SUSE-RU-2019:2794-1 as SUSE-SLE-Product-HA-15-SP1-2019-2794 is not security or has no CVEs. patches: SUSE-2019-2794,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2794,SUSE-SLE-Product-HA-15-SP1-2019-2794 SKIP SUSE-RU-2019:2795-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2795 is not security or has no CVEs. patches: SUSE-2019-2795,SUSE-SLE-Module-Desktop-Applications-15-2019-2795,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2795 SKIP SUSE-RU-2019:2796-1 as SUSE-Storage-4-2019-2796 is not security or has no CVEs. patches: SUSE-2019-2796,SUSE-OpenStack-Cloud-7-2019-2796,SUSE-SLE-POS-12-SP2-2019-2796,SUSE-SLE-SAP-12-SP2-2019-2796,SUSE-SLE-SERVER-12-SP2-2019-2796,SUSE-SLE-SERVER-12-SP2-BCL-2019-2796,SUSE-Storage-4-2019-2796 SKIP SUSE-RU-2019:2797-1 as SUSE-SLE-RT-12-SP4-2019-2797 is not security or has no CVEs. patches: SUSE-2019-2797,SUSE-SLE-HA-12-SP4-2019-2797,SUSE-SLE-RT-12-SP4-2019-2797 SKIP SUSE-RU-2019:2799-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2799 is not security or has no CVEs. patches: SUSE-2019-2799,SUSE-SLE-Module-Basesystem-15-2019-2799,SUSE-SLE-Module-Basesystem-15-SP1-2019-2799 SKIP SUSE-RU-2019:2800-1 as SUSE-SLE-SERVER-12-SP5-2019-2800 is not security or has no CVEs. patches: SUSE-2019-2800,SUSE-SLE-DESKTOP-12-SP4-2019-2800,SUSE-SLE-SERVER-12-SP4-2019-2800,SUSE-SLE-SERVER-12-SP5-2019-2800 SKIP SUSE-RU-2019:2805-1 as SUSE-Storage-5-2019-2805 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2805,SUSE-2019-2805,SUSE-OpenStack-Cloud-7-2019-2805,SUSE-OpenStack-Cloud-8-2019-2805,SUSE-OpenStack-Cloud-Crowbar-8-2019-2805,SUSE-SLE-DESKTOP-12-SP4-2019-2805,SUSE-SLE-SAP-12-SP1-2019-2805,SUSE-SLE-SAP-12-SP2-2019-2805,SUSE-SLE-SAP-12-SP3-2019-2805,SUSE-SLE-SDK-12-SP4-2019-2805,SUSE-SLE-SDK-12-SP5-2019-2805,SUSE-SLE-SERVER-12-SP1-2019-2805,SUSE-SLE-SERVER-12-SP2-2019-2805,SUSE-SLE-SERVER-12-SP2-BCL-2019-2805,SUSE-SLE-SERVER-12-SP3-2019-2805,SUSE-SLE-SERVER-12-SP3-BCL-2019-2805,SUSE-SLE-SERVER-12-SP4-2019-2805,SUSE-SLE-SERVER-12-SP5-2019-2805,SUSE-Storage-4-2019-2805,SUSE-Storage-5-2019-2805 SKIP SUSE-RU-2019:2806-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2806 is not security or has no CVEs. patches: SUSE-2019-2806,SUSE-SLE-Module-Desktop-Applications-15-2019-2806,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2806 SKIP SUSE-RU-2019:2811-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2811 is not security or has no CVEs. patches: SUSE-2019-2811,SUSE-SLE-Module-Basesystem-15-SP1-2019-2811,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2811,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2811,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2811 SKIP SUSE-RU-2019:2812-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2812 is not security or has no CVEs. patches: SUSE-2019-2812,SUSE-SLE-Module-Basesystem-15-2019-2812,SUSE-SLE-Module-Basesystem-15-SP1-2019-2812,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2812,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2812 SKIP SUSE-RU-2019:2813-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2813 is not security or has no CVEs. patches: SUSE-2019-2813,SUSE-SLE-Module-Basesystem-15-2019-2813,SUSE-SLE-Module-Basesystem-15-SP1-2019-2813 SKIP SUSE-RU-2019:2814-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2814 is not security or has no CVEs. patches: SUSE-2019-2814,SUSE-SLE-Module-Basesystem-15-2019-2814,SUSE-SLE-Module-Basesystem-15-SP1-2019-2814,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2814,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2814 SKIP SUSE-RU-2019:2815-1 as SUSE-Storage-5-2019-2815 is not security or has no CVEs. patches: SUSE-2019-2815,SUSE-Storage-5-2019-2815 SKIP SUSE-RU-2019:2817-1 as SUSE-SLE-Module-Server-Applications-15-2019-2817 is not security or has no CVEs. patches: SUSE-2019-2817,SUSE-SLE-Module-Server-Applications-15-2019-2817 SKIP SUSE-RU-2019:2818-1 as SUSE-Storage-5-2019-2818 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2818,SUSE-2019-2818,SUSE-OpenStack-Cloud-8-2019-2818,SUSE-OpenStack-Cloud-Crowbar-8-2019-2818,SUSE-SLE-DESKTOP-12-SP4-2019-2818,SUSE-SLE-SAP-12-SP3-2019-2818,SUSE-SLE-SDK-12-SP5-2019-2818,SUSE-SLE-SERVER-12-SP3-2019-2818,SUSE-SLE-SERVER-12-SP3-BCL-2019-2818,SUSE-SLE-SERVER-12-SP4-2019-2818,SUSE-SLE-SERVER-12-SP5-2019-2818,SUSE-Storage-5-2019-2818 SKIP SUSE-RU-2019:2869-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2869 is not security or has no CVEs. patches: SUSE-2019-2869,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2869,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2869,SUSE-SLE-Module-Server-Applications-15-2019-2869,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2869 SKIP SUSE-RU-2019:2870-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-2870 is not security or has no CVEs. patches: SUSE-2019-2870,SUSE-SLE-Module-Basesystem-15-2019-2870,SUSE-SLE-Module-Basesystem-15-SP1-2019-2870,SUSE-SLE-Module-Development-Tools-15-2019-2870,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2870,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2870,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2870 SKIP SUSE-RU-2019:2873-1 as SUSE-SLE-WE-12-SP4-2019-2873 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2873,SUSE-2019-2873,SUSE-OpenStack-Cloud-7-2019-2873,SUSE-OpenStack-Cloud-8-2019-2873,SUSE-OpenStack-Cloud-Crowbar-8-2019-2873,SUSE-SLE-DESKTOP-12-SP4-2019-2873,SUSE-SLE-HA-12-SP3-2019-2873,SUSE-SLE-HA-12-SP4-2019-2873,SUSE-SLE-Module-Public-Cloud-12-2019-2873,SUSE-SLE-WE-12-SP4-2019-2873 SKIP SUSE-RU-2019:2873-2 as SUSE-SLE-WE-12-SP5-2019-2873 is not security or has no CVEs. patches: SUSE-2019-2873,SUSE-SLE-HA-12-SP5-2019-2873,SUSE-SLE-WE-12-SP5-2019-2873 SKIP SUSE-RU-2019:2874-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2874 is not security or has no CVEs. patches: SUSE-2019-2874,SUSE-SLE-Module-Basesystem-15-2019-2874,SUSE-SLE-Module-Basesystem-15-SP1-2019-2874,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2874,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2874 SKIP SUSE-RU-2019:2876-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-2876 is not security or has no CVEs. patches: SUSE-2019-2876,SUSE-SLE-Module-Basesystem-15-2019-2876,SUSE-SLE-Module-Desktop-Applications-15-2019-2876 SKIP SUSE-RU-2019:2877-1 as SUSE-Storage-5-2019-2877 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2877,SUSE-2019-2877,SUSE-OpenStack-Cloud-7-2019-2877,SUSE-OpenStack-Cloud-8-2019-2877,SUSE-OpenStack-Cloud-Crowbar-8-2019-2877,SUSE-SLE-SAP-12-SP1-2019-2877,SUSE-SLE-SAP-12-SP2-2019-2877,SUSE-SLE-SAP-12-SP3-2019-2877,SUSE-SLE-SDK-12-SP4-2019-2877,SUSE-SLE-SDK-12-SP5-2019-2877,SUSE-SLE-SERVER-12-SP1-2019-2877,SUSE-SLE-SERVER-12-SP2-2019-2877,SUSE-SLE-SERVER-12-SP2-BCL-2019-2877,SUSE-SLE-SERVER-12-SP3-2019-2877,SUSE-SLE-SERVER-12-SP3-BCL-2019-2877,SUSE-SLE-SERVER-12-SP4-2019-2877,SUSE-SLE-SERVER-12-SP5-2019-2877,SUSE-Storage-5-2019-2877 SKIP SUSE-RU-2019:2878-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2878 is not security or has no CVEs. patches: SUSE-2019-2878,SUSE-SLE-Module-Basesystem-15-SP1-2019-2878,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2878 SKIP SUSE-RU-2019:2880-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2880 is not security or has no CVEs. patches: SUSE-2019-2880,SUSE-SLE-Module-Basesystem-15-SP1-2019-2880 SKIP SUSE-RU-2019:2882-1 as SUSE-SLE-Product-HA-15-2019-2882 is not security or has no CVEs. patches: SUSE-2019-2882,SUSE-SLE-Product-HA-15-2019-2882 SKIP SUSE-RU-2019:2883-1 as SUSE-SLE-SERVER-12-SP5-2019-2883 is not security or has no CVEs. patches: SUSE-2019-2883,SUSE-SLE-DESKTOP-12-SP4-2019-2883,SUSE-SLE-SERVER-12-SP4-2019-2883,SUSE-SLE-SERVER-12-SP5-2019-2883 SKIP SUSE-RU-2019:2884-1 as SUSE-SLE-Live-Patching-12-SP5-2019-2884 is not security or has no CVEs. patches: SUSE-2019-2884,SUSE-SLE-Live-Patching-12-2019-2884,SUSE-SLE-Live-Patching-12-SP3-2019-2884,SUSE-SLE-Live-Patching-12-SP4-2019-2884,SUSE-SLE-Live-Patching-12-SP5-2019-2884 SKIP SUSE-RU-2019:2885-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2885 is not security or has no CVEs. patches: SUSE-2019-2885,SUSE-SLE-Module-Desktop-Applications-15-2019-2885,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-2885,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2885,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2885 SKIP SUSE-RU-2019:2886-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2886 is not security or has no CVEs. patches: SUSE-2019-2886,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2886,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2886 SKIP SUSE-RU-2019:2887-1 as SUSE-SLE-SERVER-12-SP5-2019-2887 is not security or has no CVEs. patches: SUSE-2019-2887,SUSE-SLE-DESKTOP-12-SP4-2019-2887,SUSE-SLE-SDK-12-SP4-2019-2887,SUSE-SLE-SDK-12-SP5-2019-2887,SUSE-SLE-SERVER-12-SP4-2019-2887,SUSE-SLE-SERVER-12-SP5-2019-2887 SKIP SUSE-RU-2019:2888-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2888 is not security or has no CVEs. patches: SUSE-2019-2888,SUSE-SLE-Module-Basesystem-15-2019-2888,SUSE-SLE-Module-Basesystem-15-SP1-2019-2888,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2888 SKIP SUSE-RU-2019:2889-1 as SUSE-SLE-HA-12-SP5-2019-2889 is not security or has no CVEs. patches: SUSE-2019-2889,SUSE-SLE-HA-12-SP3-2019-2889,SUSE-SLE-HA-12-SP4-2019-2889,SUSE-SLE-HA-12-SP5-2019-2889 SKIP SUSE-RU-2019:2892-1 as SUSE-SLE-WE-12-SP4-2019-2892 is not security or has no CVEs. patches: SUSE-2019-2892,SUSE-SLE-DESKTOP-12-SP4-2019-2892,SUSE-SLE-WE-12-SP4-2019-2892 SKIP SUSE-RU-2019:2894-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2894 is not security or has no CVEs. patches: SUSE-2019-2894,SUSE-SLE-Module-Basesystem-15-SP1-2019-2894,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2894,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2894 SKIP SUSE-RU-2019:2898-1 as SUSE-Storage-5-2019-2898 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2898,SUSE-2019-2898,SUSE-OpenStack-Cloud-7-2019-2898,SUSE-OpenStack-Cloud-8-2019-2898,SUSE-OpenStack-Cloud-Crowbar-8-2019-2898,SUSE-SLE-DESKTOP-12-SP4-2019-2898,SUSE-SLE-SAP-12-SP2-2019-2898,SUSE-SLE-SAP-12-SP3-2019-2898,SUSE-SLE-SDK-12-SP4-2019-2898,SUSE-SLE-SERVER-12-SP2-2019-2898,SUSE-SLE-SERVER-12-SP2-BCL-2019-2898,SUSE-SLE-SERVER-12-SP3-2019-2898,SUSE-SLE-SERVER-12-SP3-BCL-2019-2898,SUSE-SLE-SERVER-12-SP4-2019-2898,SUSE-Storage-5-2019-2898 SKIP SUSE-RU-2019:2904-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2904 is not security or has no CVEs. patches: SUSE-2019-2904,SUSE-SLE-Module-Basesystem-15-SP1-2019-2904 SKIP SUSE-RU-2019:2905-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2905 is not security or has no CVEs. patches: SUSE-2019-2905,SUSE-SLE-Module-Basesystem-15-SP1-2019-2905 SKIP SUSE-RU-2019:2907-1 as SUSE-SLE-SERVER-12-SP1-2019-2907 is not security or has no CVEs. patches: SUSE-2019-2907,SUSE-SLE-SAP-12-SP1-2019-2907,SUSE-SLE-SERVER-12-SP1-2019-2907 SKIP SUSE-RU-2019:2908-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2908 is not security or has no CVEs. patches: SUSE-2019-2908,SUSE-SLE-Module-Basesystem-15-2019-2908,SUSE-SLE-Module-Basesystem-15-SP1-2019-2908 SKIP SUSE-RU-2019:2917-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-2917 is not security or has no CVEs. patches: SUSE-2019-2917,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2917,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-2917,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-2917,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-2917 SKIP SUSE-RU-2019:2919-1 as SUSE-SLE-Manager-Tools-12-2019-2919 is not security or has no CVEs. patches: SUSE-2019-2919,SUSE-SLE-Manager-Tools-12-2019-2919 SKIP SUSE-RU-2019:2920-1 as SUSE-SLE-Manager-Tools-15-2019-2920 is not security or has no CVEs. patches: SUSE-2019-2920,SUSE-SLE-Manager-Tools-15-2019-2920,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2920,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2920 SKIP SUSE-RU-2019:2922-1 as SUSE-SLE-Module-Server-Applications-15-2019-2922 is not security or has no CVEs. patches: SUSE-2019-2922,SUSE-SLE-Module-Basesystem-15-2019-2922,SUSE-SLE-Module-Server-Applications-15-2019-2922 SKIP SUSE-RU-2019:2923-1 as SUSE-SUSE-Manager-Server-3.2-2019-2923 is not security or has no CVEs. patches: SUSE-2019-2923,SUSE-SLE-Manager-Tools-12-2019-2923,SUSE-SLE-Module-Adv-Systems-Management-12-2019-2923,SUSE-SLE-POS-12-SP2-2019-2923,SUSE-SUSE-Manager-Proxy-3.2-2019-2923,SUSE-SUSE-Manager-Server-3.2-2019-2923 SKIP SUSE-RU-2019:2924-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2924 is not security or has no CVEs. patches: SUSE-2019-2924,SUSE-SLE-Module-Basesystem-15-SP1-2019-2924,SUSE-SLE-Module-Python2-15-SP1-2019-2924,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2924 SKIP SUSE-RU-2019:2929-1 as SUSE-Storage-6-2019-2929 is not security or has no CVEs. patches: SUSE-2019-2929,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2929,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-2929,SUSE-Storage-6-2019-2929 SKIP SUSE-RU-2019:2930-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2019-2930 is not security or has no CVEs. patches: SUSE-2019-2930,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2019-2930 SKIP SUSE-RU-2019:2933-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2933 is not security or has no CVEs. patches: SUSE-2019-2933,SUSE-SLE-Module-Basesystem-15-SP1-2019-2933,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2933,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2933,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-2933 SKIP SUSE-RU-2019:2942-1 as SUSE-SLE-Product-WE-15-SP1-2019-2942 is not security or has no CVEs. patches: SUSE-2019-2942,SUSE-SLE-Module-Basesystem-15-SP1-2019-2942,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2942,SUSE-SLE-Product-WE-15-SP1-2019-2942 SKIP SUSE-RU-2019:2943-1 as SUSE-SLE-Module-Basesystem-15-2019-2943 is not security or has no CVEs. patches: SUSE-2019-2943,SUSE-SLE-Module-Basesystem-15-2019-2943 SKIP SUSE-RU-2019:2945-1 as SUSE-SLE-Module-Development-Tools-15-2019-2945 is not security or has no CVEs. patches: SUSE-2019-2945,SUSE-SLE-INSTALLER-15-2019-2945,SUSE-SLE-Module-Basesystem-15-2019-2945,SUSE-SLE-Module-Development-Tools-15-2019-2945,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2945,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2945 SKIP SUSE-RU-2019:2965-1 as SUSE-SLE-Product-HA-15-SP1-2019-2965 is not security or has no CVEs. patches: SUSE-2019-2965,SUSE-SLE-Product-HA-15-SP1-2019-2965 SKIP SUSE-RU-2019:2966-1 as SUSE-SLE-SERVER-12-SP4-2019-2966 is not security or has no CVEs. patches: SUSE-2019-2966,SUSE-SLE-DESKTOP-12-SP4-2019-2966,SUSE-SLE-SERVER-12-SP4-2019-2966 SKIP SUSE-RU-2019:2967-1 as SUSE-SLE-SERVER-12-SP5-2019-2967 is not security or has no CVEs. patches: SUSE-2019-2967,SUSE-SLE-DESKTOP-12-SP4-2019-2967,SUSE-SLE-HA-12-SP4-2019-2967,SUSE-SLE-HA-12-SP5-2019-2967,SUSE-SLE-SDK-12-SP4-2019-2967,SUSE-SLE-SDK-12-SP5-2019-2967,SUSE-SLE-SERVER-12-SP4-2019-2967,SUSE-SLE-SERVER-12-SP5-2019-2967 SKIP SUSE-RU-2019:2970-1 as SUSE-Storage-5-2019-2970 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2970,SUSE-2019-2970,SUSE-OpenStack-Cloud-7-2019-2970,SUSE-OpenStack-Cloud-8-2019-2970,SUSE-OpenStack-Cloud-Crowbar-8-2019-2970,SUSE-SLE-SAP-12-SP2-2019-2970,SUSE-SLE-SAP-12-SP3-2019-2970,SUSE-SLE-SERVER-12-SP2-2019-2970,SUSE-SLE-SERVER-12-SP2-BCL-2019-2970,SUSE-SLE-SERVER-12-SP3-2019-2970,SUSE-SLE-SERVER-12-SP3-BCL-2019-2970,SUSE-Storage-5-2019-2970 SKIP SUSE-RU-2019:2973-1 as SUSE-SLE-HA-12-SP5-2019-2973 is not security or has no CVEs. patches: SUSE-2019-2973,SUSE-SLE-HA-12-SP4-2019-2973,SUSE-SLE-HA-12-SP5-2019-2973 SKIP SUSE-RU-2019:2974-1 as SUSE-SLE-SERVER-12-SP5-2019-2974 is not security or has no CVEs. patches: SUSE-2019-2974,SUSE-SLE-DESKTOP-12-SP4-2019-2974,SUSE-SLE-SERVER-12-SP4-2019-2974,SUSE-SLE-SERVER-12-SP5-2019-2974 SKIP SUSE-RU-2019:2974-2 as SUSE-Storage-5-2019-2974 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-2974,SUSE-2019-2974,SUSE-OpenStack-Cloud-7-2019-2974,SUSE-OpenStack-Cloud-8-2019-2974,SUSE-OpenStack-Cloud-Crowbar-8-2019-2974,SUSE-SLE-SAP-12-SP2-2019-2974,SUSE-SLE-SAP-12-SP3-2019-2974,SUSE-SLE-SERVER-12-SP2-2019-2974,SUSE-SLE-SERVER-12-SP2-BCL-2019-2974,SUSE-SLE-SERVER-12-SP3-2019-2974,SUSE-SLE-SERVER-12-SP3-BCL-2019-2974,SUSE-Storage-5-2019-2974 SKIP SUSE-RU-2019:2978-1 as SUSE-SLE-Module-Containers-15-SP1-2019-2978 is not security or has no CVEs. patches: SUSE-2019-2978,SUSE-SLE-Module-Containers-15-2019-2978,SUSE-SLE-Module-Containers-15-SP1-2019-2978,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2978 SKIP SUSE-RU-2019:2990-1 as SUSE-Storage-6-2019-2990 is not security or has no CVEs. patches: SUSE-2019-2990,SUSE-SLE-Module-Basesystem-15-SP1-2019-2990,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2990,SUSE-Storage-6-2019-2990 SKIP SUSE-RU-2019:2992-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2992 is not security or has no CVEs. patches: SUSE-2019-2992,SUSE-SLE-Module-Basesystem-15-2019-2992,SUSE-SLE-Module-Basesystem-15-SP1-2019-2992 SKIP SUSE-RU-2019:2993-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-2993 is not security or has no CVEs. patches: SUSE-2019-2993,SUSE-SLE-Module-Basesystem-15-2019-2993,SUSE-SLE-Module-Basesystem-15-SP1-2019-2993 SKIP SUSE-RU-2019:2995-1 as SUSE-SLE-SERVER-12-SP5-2019-2995 is not security or has no CVEs. patches: SUSE-2019-2995,SUSE-SLE-SERVER-12-SP5-2019-2995 SKIP SUSE-RU-2019:2996-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-2996 is not security or has no CVEs. patches: SUSE-2019-2996,SUSE-SLE-Module-Basesystem-15-SP1-2019-2996,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2996,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2996 SKIP SUSE-RU-2019:3003-1 as SUSE-SLE-SERVER-12-SP5-2019-3003 is not security or has no CVEs. patches: SUSE-2019-3003,SUSE-SLE-DESKTOP-12-SP4-2019-3003,SUSE-SLE-SDK-12-SP4-2019-3003,SUSE-SLE-SDK-12-SP5-2019-3003,SUSE-SLE-SERVER-12-SP4-2019-3003,SUSE-SLE-SERVER-12-SP5-2019-3003 SKIP SUSE-RU-2019:3004-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3004 is not security or has no CVEs. patches: SUSE-2019-3004,SUSE-SLE-Module-Basesystem-15-SP1-2019-3004 SKIP SUSE-RU-2019:3005-1 as SUSE-Storage-5-2019-3005 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-3005,SUSE-2019-3005,SUSE-OpenStack-Cloud-7-2019-3005,SUSE-OpenStack-Cloud-8-2019-3005,SUSE-OpenStack-Cloud-Crowbar-8-2019-3005,SUSE-SLE-DESKTOP-12-SP4-2019-3005,SUSE-SLE-SAP-12-SP1-2019-3005,SUSE-SLE-SAP-12-SP2-2019-3005,SUSE-SLE-SAP-12-SP3-2019-3005,SUSE-SLE-SERVER-12-SP1-2019-3005,SUSE-SLE-SERVER-12-SP2-2019-3005,SUSE-SLE-SERVER-12-SP2-BCL-2019-3005,SUSE-SLE-SERVER-12-SP3-2019-3005,SUSE-SLE-SERVER-12-SP3-BCL-2019-3005,SUSE-SLE-SERVER-12-SP4-2019-3005,SUSE-SLE-SERVER-12-SP5-2019-3005,SUSE-Storage-5-2019-3005 SKIP SUSE-RU-2019:3006-1 as SUSE-Storage-5-2019-3006 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-3006,SUSE-2019-3006,SUSE-OpenStack-Cloud-7-2019-3006,SUSE-OpenStack-Cloud-8-2019-3006,SUSE-OpenStack-Cloud-Crowbar-8-2019-3006,SUSE-SLE-DESKTOP-12-SP4-2019-3006,SUSE-SLE-SAP-12-SP2-2019-3006,SUSE-SLE-SAP-12-SP3-2019-3006,SUSE-SLE-SERVER-12-SP2-2019-3006,SUSE-SLE-SERVER-12-SP2-BCL-2019-3006,SUSE-SLE-SERVER-12-SP3-2019-3006,SUSE-SLE-SERVER-12-SP3-BCL-2019-3006,SUSE-SLE-SERVER-12-SP4-2019-3006,SUSE-SLE-SERVER-12-SP5-2019-3006,SUSE-Storage-5-2019-3006 SKIP SUSE-RU-2019:3007-1 as SUSE-SLE-SERVER-12-SP5-2019-3007 is not security or has no CVEs. patches: SUSE-2019-3007,SUSE-SLE-DESKTOP-12-SP4-2019-3007,SUSE-SLE-SERVER-12-SP4-2019-3007,SUSE-SLE-SERVER-12-SP5-2019-3007 SKIP SUSE-RU-2019:3008-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3008 is not security or has no CVEs. patches: SUSE-2019-3008,SUSE-SLE-Module-Basesystem-15-SP1-2019-3008 SKIP SUSE-RU-2019:3009-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3009 is not security or has no CVEs. patches: SUSE-2019-3009,SUSE-SLE-Module-Public-Cloud-15-2019-3009,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3009 SKIP SUSE-RU-2019:3010-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-3010 is not security or has no CVEs. patches: SUSE-2019-3010,SUSE-SLE-Module-Basesystem-15-SP1-2019-3010,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3010,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3010,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2019-3010 SKIP SUSE-RU-2019:3011-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-3011 is not security or has no CVEs. patches: SUSE-2019-3011,SUSE-SLE-DESKTOP-12-SP4-2019-3011,SUSE-SLE-SERVER-12-SP4-2019-3011,SUSE-SLE-SERVER-INSTALLER-12-SP4-2019-3011 SKIP SUSE-RU-2019:3012-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-3012 is not security or has no CVEs. patches: SUSE-2019-3012,SUSE-SLE-Module-Development-Tools-15-2019-3012,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3012 SKIP SUSE-RU-2019:3013-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3013 is not security or has no CVEs. patches: SUSE-2019-3013,SUSE-SLE-Module-Basesystem-15-2019-3013,SUSE-SLE-Module-Basesystem-15-SP1-2019-3013,SUSE-SLE-Module-Desktop-Applications-15-2019-3013,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3013,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3013,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3013 SKIP SUSE-RU-2019:3015-1 as SUSE-SLE-Product-HA-15-2019-3015 is not security or has no CVEs. patches: SUSE-2019-3015,SUSE-SLE-Product-HA-15-2019-3015 SKIP SUSE-RU-2019:3016-1 as SUSE-SLE-Module-Server-Applications-15-2019-3016 is not security or has no CVEs. patches: SUSE-2019-3016,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3016,SUSE-SLE-Module-Server-Applications-15-2019-3016 SKIP SUSE-RU-2019:3017-1 as SUSE-SLE-Module-Legacy-15-SP1-2019-3017 is not security or has no CVEs. patches: SUSE-2019-3017,SUSE-SLE-Module-Basesystem-15-2019-3017,SUSE-SLE-Module-Basesystem-15-SP1-2019-3017,SUSE-SLE-Module-Legacy-15-SP1-2019-3017 SKIP SUSE-RU-2019:3018-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3018 is not security or has no CVEs. patches: SUSE-2019-3018,SUSE-SLE-Module-Basesystem-15-2019-3018,SUSE-SLE-Module-Basesystem-15-SP1-2019-3018 SKIP SUSE-RU-2019:3021-1 as SUSE-SLE-HA-12-SP3-2019-3021 is not security or has no CVEs. patches: SUSE-2019-3021,SUSE-SLE-HA-12-SP3-2019-3021 SKIP SUSE-RU-2019:3022-1 as SUSE-SLE-SERVER-12-SP5-2019-3022 is not security or has no CVEs. patches: SUSE-2019-3022,SUSE-SLE-SDK-12-SP4-2019-3022,SUSE-SLE-SDK-12-SP5-2019-3022,SUSE-SLE-SERVER-12-SP4-2019-3022,SUSE-SLE-SERVER-12-SP5-2019-3022 SKIP SUSE-RU-2019:3025-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-3025 is not security or has no CVEs. patches: SUSE-2019-3025,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2019-3025,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-3025 SKIP SUSE-RU-2019:3026-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-3026 is not security or has no CVEs. patches: SUSE-2019-3026,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3026,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-3026 SKIP SUSE-RU-2019:3028-1 as SUSE-SUSE-Manager-Server-3.2-2019-3028 is not security or has no CVEs. patches: SUSE-2019-3028,SUSE-SUSE-Manager-Proxy-3.2-2019-3028,SUSE-SUSE-Manager-Server-3.2-2019-3028 SKIP SUSE-RU-2019:3029-1 as SUSE-SUSE-Manager-Server-3.2-2019-3029 is not security or has no CVEs. patches: SUSE-2019-3029,SUSE-SUSE-Manager-Proxy-3.2-2019-3029,SUSE-SUSE-Manager-Server-3.2-2019-3029 SKIP SUSE-RU-2019:3036-1 as SUSE-Storage-5-2019-3036 is not security or has no CVEs. patches: SUSE-2019-3036,SUSE-OpenStack-Cloud-7-2019-3036,SUSE-SLE-Module-Public-Cloud-12-2019-3036,SUSE-SUSE-Manager-Server-3.2-2019-3036,SUSE-Storage-5-2019-3036 SKIP SUSE-RU-2019:3037-1 as SUSE-SLE-HA-12-SP5-2019-3037 is not security or has no CVEs. patches: SUSE-2019-3037,SUSE-SLE-HA-12-SP4-2019-3037,SUSE-SLE-HA-12-SP5-2019-3037 SKIP SUSE-RU-2019:3038-1 as SUSE-SLE-Product-HA-15-SP1-2019-3038 is not security or has no CVEs. patches: SUSE-2019-3038,SUSE-SLE-Product-HA-15-SP1-2019-3038 SKIP SUSE-RU-2019:3039-1 as SUSE-SLE-HA-12-SP4-2019-3039 is not security or has no CVEs. patches: SUSE-2019-3039,SUSE-SLE-HA-12-SP4-2019-3039 SKIP SUSE-RU-2019:3040-1 as SUSE-SLE-Product-HA-15-SP1-2019-3040 is not security or has no CVEs. patches: SUSE-2019-3040,SUSE-SLE-Module-Basesystem-15-SP1-2019-3040,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3040,SUSE-SLE-Product-HA-15-SP1-2019-3040 SKIP SUSE-RU-2019:3041-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3041 is not security or has no CVEs. patches: SUSE-2019-3041,SUSE-SLE-Module-Basesystem-15-SP1-2019-3041 SKIP SUSE-RU-2019:3041-2 as SUSE-SLE-INSTALLER-15-SP1-2019-3041 is not security or has no CVEs. patches: SUSE-2019-3041,SUSE-SLE-INSTALLER-15-SP1-2019-3041 SKIP SUSE-RU-2019:3042-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3042 is not security or has no CVEs. patches: SUSE-2019-3042,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3042,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3042,SUSE-SLE-Module-Server-Applications-15-2019-3042,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3042 SKIP SUSE-RU-2019:3043-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3043 is not security or has no CVEs. patches: SUSE-2019-3043,SUSE-SLE-Module-Basesystem-15-SP1-2019-3043 SKIP SUSE-RU-2019:3047-1 as SUSE-SLE-Module-Server-Applications-15-2019-3047 is not security or has no CVEs. patches: SUSE-2019-3047,SUSE-SLE-Module-Basesystem-15-2019-3047,SUSE-SLE-Module-Basesystem-15-SP1-2019-3047,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3047,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3047,SUSE-SLE-Module-Python2-15-SP1-2019-3047,SUSE-SLE-Module-Server-Applications-15-2019-3047 SKIP SUSE-RU-2019:3049-1 as SUSE-SLE-SERVER-12-SP5-2019-3049 is not security or has no CVEs. patches: SUSE-2019-3049,SUSE-SLE-DESKTOP-12-SP4-2019-3049,SUSE-SLE-SERVER-12-SP4-2019-3049,SUSE-SLE-SERVER-12-SP5-2019-3049 SKIP SUSE-RU-2019:3062-1 as SUSE-2019-3062 is not security or has no CVEs. patches: SUSE-2019-3062,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3062 SKIP SUSE-RU-2019:3063-1 as SUSE-2019-3063 is not security or has no CVEs. patches: SUSE-2019-3063,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3063 SKIP SUSE-RU-2019:3069-1 as SUSE-SLE-SERVER-12-SP5-2019-3069 is not security or has no CVEs. patches: SUSE-2019-3069,SUSE-SLE-DESKTOP-12-SP4-2019-3069,SUSE-SLE-SERVER-12-SP4-2019-3069,SUSE-SLE-SERVER-12-SP5-2019-3069 SKIP SUSE-RU-2019:3070-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3070 is not security or has no CVEs. patches: SUSE-2019-3070,SUSE-SLE-Module-Basesystem-15-2019-3070,SUSE-SLE-Module-Basesystem-15-SP1-2019-3070 SKIP SUSE-RU-2019:3072-1 as SUSE-SLE-Module-Basesystem-15-2019-3072 is not security or has no CVEs. patches: SUSE-2019-3072,SUSE-SLE-Module-Basesystem-15-2019-3072 ERROR: notice SUSE-RU-2019:3073-1 has no valid patches out of: SUSE-2019-3073,SUSE-SLE-SERVER-12-SP4-2019-3073 SKIP SUSE-RU-2019:3073-2 as SUSE-Storage-5-2020-400 is not security or has no CVEs. patches: SUSE-2019-3073,SUSE-SLE-SERVER-12-SP3-2020-400,SUSE-SLE-SERVER-12-SP3-BCL-2020-400,SUSE-SLE-SERVER-12-SP5-2020-400,SUSE-Storage-5-2020-400 SKIP SUSE-RU-2019:3074-1 as SUSE-Storage-6-2019-3074 is not security or has no CVEs. patches: SUSE-2019-3074,SUSE-Storage-6-2019-3074 SKIP SUSE-RU-2019:3075-1 as SUSE-SLE-Product-WE-15-SP1-2019-3075 is not security or has no CVEs. patches: SUSE-2019-3075,SUSE-SLE-Module-Desktop-Applications-15-2019-3075,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3075,SUSE-SLE-Product-WE-15-2019-3075,SUSE-SLE-Product-WE-15-SP1-2019-3075 SKIP SUSE-RU-2019:3081-1 as SUSE-SLE-SERVER-12-SP2-BCL-2019-3081 is not security or has no CVEs. patches: SUSE-2019-3081,SUSE-OpenStack-Cloud-7-2019-3081,SUSE-SLE-SAP-12-SP2-2019-3081,SUSE-SLE-SERVER-12-SP2-2019-3081,SUSE-SLE-SERVER-12-SP2-BCL-2019-3081 SKIP SUSE-RU-2019:3088-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3088 is not security or has no CVEs. patches: SUSE-2019-3088,SUSE-SLE-Module-Basesystem-15-2019-3088,SUSE-SLE-Module-Basesystem-15-SP1-2019-3088 SKIP SUSE-RU-2019:3098-1 as SUSE-SLE-Product-HA-15-SP1-2019-3098 is not security or has no CVEs. patches: SUSE-2019-3098,SUSE-SLE-Product-HA-15-SP1-2019-3098 SKIP SUSE-RU-2019:3099-1 as SUSE-SLE-Product-HA-15-SP1-2019-3099 is not security or has no CVEs. patches: SUSE-2019-3099,SUSE-SLE-Product-HA-15-SP1-2019-3099 SKIP SUSE-RU-2019:3100-1 as SUSE-SLE-SERVER-12-SP4-2019-3100 is not security or has no CVEs. patches: SUSE-2019-3100,SUSE-SLE-SERVER-12-SP4-2019-3100 SKIP SUSE-RU-2019:3101-1 as SUSE-SLE-Product-HA-15-2019-3101 is not security or has no CVEs. patches: SUSE-2019-3101,SUSE-SLE-Product-HA-15-2019-3101 SKIP SUSE-RU-2019:3102-1 as SUSE-SLE-Product-HA-15-SP1-2019-3102 is not security or has no CVEs. patches: SUSE-2019-3102,SUSE-SLE-Product-HA-15-2019-3102,SUSE-SLE-Product-HA-15-SP1-2019-3102 SKIP SUSE-RU-2019:3103-1 as SUSE-SLE-SERVER-12-SP5-2019-3103 is not security or has no CVEs. patches: SUSE-2019-3103,SUSE-SLE-DESKTOP-12-SP4-2019-3103,SUSE-SLE-SERVER-12-SP4-2019-3103,SUSE-SLE-SERVER-12-SP5-2019-3103 SKIP SUSE-RU-2019:3104-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3104 is not security or has no CVEs. patches: SUSE-2019-3104,SUSE-SLE-Module-Basesystem-15-2019-3104,SUSE-SLE-Module-Basesystem-15-SP1-2019-3104,SUSE-SLE-Module-Server-Applications-15-2019-3104,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3104 SKIP SUSE-RU-2019:3106-1 as SUSE-SLE-SERVER-12-SP1-2019-3106 is not security or has no CVEs. patches: SUSE-2019-3106,SUSE-SLE-SAP-12-SP1-2019-3106,SUSE-SLE-SERVER-12-SP1-2019-3106 SKIP SUSE-RU-2019:3107-1 as SUSE-SLE-Module-Legacy-12-2019-3107 is not security or has no CVEs. patches: SUSE-2019-3107,SUSE-SLE-Module-Legacy-12-2019-3107 SKIP SUSE-RU-2019:3108-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3108 is not security or has no CVEs. patches: SUSE-2019-3108,SUSE-SLE-Module-Basesystem-15-2019-3108,SUSE-SLE-Module-Basesystem-15-SP1-2019-3108 SKIP SUSE-RU-2019:3109-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3109 is not security or has no CVEs. patches: SUSE-2019-3109,SUSE-SLE-Module-Basesystem-15-SP1-2019-3109,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3109 SKIP SUSE-RU-2019:3110-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3110 is not security or has no CVEs. patches: SUSE-2019-3110,SUSE-SLE-Module-Basesystem-15-2019-3110,SUSE-SLE-Module-Basesystem-15-SP1-2019-3110,SUSE-SLE-Module-Server-Applications-15-2019-3110,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3110 SKIP SUSE-RU-2019:3111-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3111 is not security or has no CVEs. patches: SUSE-2019-3111,SUSE-SLE-Module-Basesystem-15-SP1-2019-3111 SKIP SUSE-RU-2019:3112-1 as SUSE-SLE-SERVER-12-SP4-2019-3112 is not security or has no CVEs. patches: SUSE-2019-3112,SUSE-SLE-DESKTOP-12-SP4-2019-3112,SUSE-SLE-SERVER-12-SP4-2019-3112 SKIP SUSE-RU-2019:3113-1 as SUSE-SLE-SERVER-12-SP2-2019-3113 is not security or has no CVEs. patches: SUSE-2019-3113,SUSE-OpenStack-Cloud-7-2019-3113,SUSE-SLE-SAP-12-SP2-2019-3113,SUSE-SLE-SERVER-12-SP2-2019-3113 SKIP SUSE-RU-2019:3114-1 as SUSE-SLE-Module-Basesystem-15-2019-3114 is not security or has no CVEs. patches: SUSE-2019-3114,SUSE-SLE-Module-Basesystem-15-2019-3114 SKIP SUSE-RU-2019:3115-1 as SUSE-2019-3115 is not security or has no CVEs. patches: SUSE-2019-3115,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3115,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3115 SKIP SUSE-RU-2019:3116-1 as SUSE-SLE-SAP-12-SP1-2019-3116 is not security or has no CVEs. patches: SUSE-2019-3116,SUSE-SLE-Module-Legacy-12-2019-3116,SUSE-SLE-SAP-12-SP1-2019-3116 SKIP SUSE-RU-2019:3117-1 as SUSE-Storage-6-2019-3117 is not security or has no CVEs. patches: SUSE-2019-3117,SUSE-Storage-6-2019-3117 SKIP SUSE-RU-2019:3118-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3118 is not security or has no CVEs. patches: SUSE-2019-3118,SUSE-SLE-Module-Basesystem-15-2019-3118,SUSE-SLE-Module-Basesystem-15-SP1-2019-3118,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3118 SKIP SUSE-RU-2019:3119-1 as SUSE-Storage-6-2019-3119 is not security or has no CVEs. patches: SUSE-2019-3119,SUSE-Storage-6-2019-3119 SKIP SUSE-RU-2019:3120-1 as SUSE-SLE-Module-Python2-15-SP1-2019-3120 is not security or has no CVEs. patches: SUSE-2019-3120,SUSE-SLE-Module-Basesystem-15-2019-3120,SUSE-SLE-Module-Basesystem-15-SP1-2019-3120,SUSE-SLE-Module-Desktop-Applications-15-2019-3120,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3120,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3120,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3120,SUSE-SLE-Module-Python2-15-SP1-2019-3120 SKIP SUSE-RU-2019:3122-1 as SUSE-2019-3122 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-3122,SUSE-2019-3122,SUSE-OpenStack-Cloud-7-2019-3122,SUSE-OpenStack-Cloud-8-2019-3122,SUSE-OpenStack-Cloud-Crowbar-8-2019-3122,SUSE-SLE-SAP-12-SP2-2019-3122,SUSE-SLE-SAP-12-SP3-2019-3122,SUSE-SLE-SERVER-12-SP2-2019-3122,SUSE-SLE-SERVER-12-SP2-BCL-2019-3122,SUSE-SLE-SERVER-12-SP3-2019-3122,SUSE-SLE-SERVER-12-SP3-BCL-2019-3122,SUSE-Storage-5-2019-3122 SKIP SUSE-RU-2019:3123-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3123 is not security or has no CVEs. patches: SUSE-2019-3123,SUSE-SLE-Module-Basesystem-15-SP1-2019-3123 SKIP SUSE-RU-2019:3124-1 as SUSE-SLE-SERVER-12-SP1-2019-3124 is not security or has no CVEs. patches: SUSE-2019-3124,SUSE-SLE-SAP-12-SP1-2019-3124,SUSE-SLE-SERVER-12-SP1-2019-3124 SKIP SUSE-RU-2019:3130-1 as SUSE-Storage-5-2019-3130 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-3130,SUSE-2019-3130,SUSE-OpenStack-Cloud-7-2019-3130,SUSE-OpenStack-Cloud-8-2019-3130,SUSE-OpenStack-Cloud-Crowbar-8-2019-3130,SUSE-SLE-DESKTOP-12-SP4-2019-3130,SUSE-SLE-SAP-12-SP1-2019-3130,SUSE-SLE-SAP-12-SP2-2019-3130,SUSE-SLE-SAP-12-SP3-2019-3130,SUSE-SLE-SERVER-12-SP1-2019-3130,SUSE-SLE-SERVER-12-SP2-2019-3130,SUSE-SLE-SERVER-12-SP2-BCL-2019-3130,SUSE-SLE-SERVER-12-SP3-2019-3130,SUSE-SLE-SERVER-12-SP3-BCL-2019-3130,SUSE-SLE-SERVER-12-SP4-2019-3130,SUSE-SLE-SERVER-12-SP5-2019-3130,SUSE-Storage-5-2019-3130 SKIP SUSE-RU-2019:3131-1 as SUSE-Storage-5-2019-3131 is not security or has no CVEs. patches: SUSE-2019-3131,SUSE-Storage-5-2019-3131 SKIP SUSE-RU-2019:3132-1 as SUSE-SLE-SERVER-12-SP5-2019-3132 is not security or has no CVEs. patches: SUSE-2019-3132,SUSE-SLE-DESKTOP-12-SP4-2019-3132,SUSE-SLE-SERVER-12-SP4-2019-3132,SUSE-SLE-SERVER-12-SP5-2019-3132 SKIP SUSE-RU-2019:3133-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3133 is not security or has no CVEs. patches: SUSE-2019-3133,SUSE-SLE-Module-Desktop-Applications-15-2019-3133,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3133 SKIP SUSE-RU-2019:3134-1 as SUSE-SLE-SERVER-12-SP5-2019-3134 is not security or has no CVEs. patches: SUSE-2019-3134,SUSE-SLE-DESKTOP-12-SP4-2019-3134,SUSE-SLE-SERVER-12-SP4-2019-3134,SUSE-SLE-SERVER-12-SP5-2019-3134 SKIP SUSE-RU-2019:3135-1 as SUSE-SLE-Module-Public-Cloud-12-2019-3135 is not security or has no CVEs. patches: SUSE-2019-3135,SUSE-SLE-Module-Public-Cloud-12-2019-3135 SKIP SUSE-RU-2019:3136-1 as SUSE-SLE-Product-WE-15-SP1-2019-3136 is not security or has no CVEs. patches: SUSE-2019-3136,SUSE-SLE-Product-WE-15-SP1-2019-3136 SKIP SUSE-RU-2019:3137-1 as SUSE-SLE-WE-12-SP5-2019-3137 is not security or has no CVEs. patches: SUSE-2019-3137,SUSE-SLE-WE-12-SP5-2019-3137 SKIP SUSE-RU-2019:3138-1 as SUSE-SLE-WE-12-SP5-2019-3138 is not security or has no CVEs. patches: SUSE-2019-3138,SUSE-SLE-WE-12-SP5-2019-3138 SKIP SUSE-RU-2019:3139-1 as SUSE-SLE-WE-12-SP5-2019-3139 is not security or has no CVEs. patches: SUSE-2019-3139,SUSE-SLE-WE-12-SP5-2019-3139 SKIP SUSE-RU-2019:3140-1 as SUSE-SLE-SERVER-12-SP5-2019-3140 is not security or has no CVEs. patches: SUSE-2019-3140,SUSE-SLE-SERVER-12-SP5-2019-3140 SKIP SUSE-RU-2019:3141-1 as SUSE-SLE-SERVER-12-SP5-2019-3141 is not security or has no CVEs. patches: SUSE-2019-3141,SUSE-SLE-SERVER-12-SP5-2019-3141 SKIP SUSE-RU-2019:3142-1 as SUSE-SLE-SERVER-12-SP5-2019-3142 is not security or has no CVEs. patches: SUSE-2019-3142,SUSE-SLE-SERVER-12-SP5-2019-3142 SKIP SUSE-RU-2019:3143-1 as SUSE-SLE-SERVER-12-SP5-2019-3143 is not security or has no CVEs. patches: SUSE-2019-3143,SUSE-SLE-SERVER-12-SP5-2019-3143 SKIP SUSE-RU-2019:3144-1 as SUSE-SLE-WE-12-SP5-2019-3144 is not security or has no CVEs. patches: SUSE-2019-3144,SUSE-SLE-WE-12-SP5-2019-3144 SKIP SUSE-RU-2019:3145-1 as SUSE-SLE-WE-12-SP5-2019-3145 is not security or has no CVEs. patches: SUSE-2019-3145,SUSE-SLE-WE-12-SP5-2019-3145 SKIP SUSE-RU-2019:3146-1 as SUSE-SLE-WE-12-SP5-2019-3146 is not security or has no CVEs. patches: SUSE-2019-3146,SUSE-SLE-WE-12-SP5-2019-3146 SKIP SUSE-RU-2019:3147-1 as SUSE-SLE-WE-12-SP5-2019-3147 is not security or has no CVEs. patches: SUSE-2019-3147,SUSE-SLE-WE-12-SP5-2019-3147 SKIP SUSE-RU-2019:3148-1 as SUSE-SLE-WE-12-SP5-2019-3148 is not security or has no CVEs. patches: SUSE-2019-3148,SUSE-SLE-WE-12-SP5-2019-3148 SKIP SUSE-RU-2019:3149-1 as SUSE-SLE-WE-12-SP5-2019-3149 is not security or has no CVEs. patches: SUSE-2019-3149,SUSE-SLE-WE-12-SP5-2019-3149 SKIP SUSE-RU-2019:3150-1 as SUSE-SLE-WE-12-SP5-2019-3150 is not security or has no CVEs. patches: SUSE-2019-3150,SUSE-SLE-WE-12-SP5-2019-3150 SKIP SUSE-RU-2019:3151-1 as SUSE-SLE-WE-12-SP5-2019-3151 is not security or has no CVEs. patches: SUSE-2019-3151,SUSE-SLE-WE-12-SP5-2019-3151 SKIP SUSE-RU-2019:3152-1 as SUSE-SLE-WE-12-SP5-2019-3152 is not security or has no CVEs. patches: SUSE-2019-3152,SUSE-SLE-WE-12-SP5-2019-3152 SKIP SUSE-RU-2019:3153-1 as SUSE-SLE-WE-12-SP5-2019-3153 is not security or has no CVEs. patches: SUSE-2019-3153,SUSE-SLE-WE-12-SP5-2019-3153 SKIP SUSE-RU-2019:3154-1 as SUSE-SLE-WE-12-SP5-2019-3154 is not security or has no CVEs. patches: SUSE-2019-3154,SUSE-SLE-WE-12-SP5-2019-3154 SKIP SUSE-RU-2019:3155-1 as SUSE-SLE-SERVER-12-SP5-2019-3155 is not security or has no CVEs. patches: SUSE-2019-3155,SUSE-SLE-SERVER-12-SP5-2019-3155 SKIP SUSE-RU-2019:3156-1 as SUSE-SLE-SERVER-12-SP5-2019-3156 is not security or has no CVEs. patches: SUSE-2019-3156,SUSE-SLE-SERVER-12-SP5-2019-3156 SKIP SUSE-RU-2019:3157-1 as SUSE-SLE-SERVER-12-SP5-2019-3157 is not security or has no CVEs. patches: SUSE-2019-3157,SUSE-SLE-SERVER-12-SP5-2019-3157 SKIP SUSE-RU-2019:3158-1 as SUSE-SLE-SERVER-12-SP5-2019-3158 is not security or has no CVEs. patches: SUSE-2019-3158,SUSE-SLE-SERVER-12-SP5-2019-3158 SKIP SUSE-RU-2019:3159-1 as SUSE-SLE-SERVER-12-SP5-2019-3159 is not security or has no CVEs. patches: SUSE-2019-3159,SUSE-SLE-SERVER-12-SP5-2019-3159 SKIP SUSE-RU-2019:3160-1 as SUSE-SLE-SERVER-12-SP5-2019-3160 is not security or has no CVEs. patches: SUSE-2019-3160,SUSE-SLE-SERVER-12-SP5-2019-3160 SKIP SUSE-RU-2019:3161-1 as SUSE-SLE-SERVER-12-SP5-2019-3161 is not security or has no CVEs. patches: SUSE-2019-3161,SUSE-SLE-SERVER-12-SP5-2019-3161 SKIP SUSE-RU-2019:3162-1 as SUSE-SLE-SERVER-12-SP5-2019-3162 is not security or has no CVEs. patches: SUSE-2019-3162,SUSE-SLE-SERVER-12-SP5-2019-3162 SKIP SUSE-RU-2019:3163-1 as SUSE-SLE-SERVER-12-SP5-2019-3163 is not security or has no CVEs. patches: SUSE-2019-3163,SUSE-SLE-SERVER-12-SP5-2019-3163 SKIP SUSE-RU-2019:3164-1 as SUSE-SLE-SERVER-12-SP5-2019-3164 is not security or has no CVEs. patches: SUSE-2019-3164,SUSE-SLE-SDK-12-SP5-2019-3164,SUSE-SLE-SERVER-12-SP5-2019-3164 SKIP SUSE-RU-2019:3165-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3165 is not security or has no CVEs. patches: SUSE-2019-3165,SUSE-SLE-Module-Basesystem-15-2019-3165,SUSE-SLE-Module-Basesystem-15-SP1-2019-3165,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3165,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3165 SKIP SUSE-RU-2019:3166-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-3166 is not security or has no CVEs. patches: SUSE-2019-3166,SUSE-SLE-Module-Basesystem-15-2019-3166,SUSE-SLE-Module-Basesystem-15-SP1-2019-3166,SUSE-SLE-Module-Development-Tools-15-2019-3166,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3166,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3166,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3166 SKIP SUSE-RU-2019:3167-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3167 is not security or has no CVEs. patches: SUSE-2019-3167,SUSE-SLE-Module-Basesystem-15-SP1-2019-3167,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3167 SKIP SUSE-RU-2019:3168-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3168 is not security or has no CVEs. patches: SUSE-2019-3168,SUSE-SLE-Module-Basesystem-15-SP1-2019-3168 SKIP SUSE-RU-2019:3169-1 as SUSE-SLE-SERVER-12-SP5-2019-3169 is not security or has no CVEs. patches: SUSE-2019-3169,SUSE-SLE-SDK-12-SP4-2019-3169,SUSE-SLE-SERVER-12-SP4-2019-3169,SUSE-SLE-SERVER-12-SP5-2019-3169 SKIP SUSE-RU-2019:3170-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3170 is not security or has no CVEs. patches: SUSE-2019-3170,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3170 SKIP SUSE-RU-2019:3171-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-3171 is not security or has no CVEs. patches: SUSE-2019-3171,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3171,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3171 SKIP SUSE-RU-2019:3172-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3172 is not security or has no CVEs. patches: SUSE-2019-3172,SUSE-SLE-Module-Basesystem-15-2019-3172,SUSE-SLE-Module-Basesystem-15-SP1-2019-3172,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3172,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3172,SUSE-SLE-Module-Server-Applications-15-2019-3172,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3172 SKIP SUSE-RU-2019:3173-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3173 is not security or has no CVEs. patches: SUSE-2019-3173,SUSE-SLE-Module-Public-Cloud-15-2019-3173,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3173 SKIP SUSE-RU-2019:3174-1 as SUSE-SLE-SAP-12-SP2-2019-3174 is not security or has no CVEs. patches: SUSE-2019-3174,SUSE-SLE-SAP-12-SP1-2019-3174,SUSE-SLE-SAP-12-SP2-2019-3174 SKIP SUSE-RU-2019:3175-1 as SUSE-SLE-WE-12-SP5-2019-3175 is not security or has no CVEs. patches: SUSE-2019-3175,SUSE-SLE-WE-12-SP5-2019-3175 SKIP SUSE-RU-2019:3193-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3193 is not security or has no CVEs. patches: SUSE-2019-3193,SUSE-SLE-Module-Basesystem-15-2019-3193,SUSE-SLE-Module-Basesystem-15-SP1-2019-3193 SKIP SUSE-RU-2019:3194-1 as SUSE-SLE-SERVER-12-SP5-2019-3194 is not security or has no CVEs. patches: SUSE-2019-3194,SUSE-SLE-SERVER-12-SP4-2019-3194,SUSE-SLE-SERVER-12-SP5-2019-3194 SKIP SUSE-RU-2019:3195-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3195 is not security or has no CVEs. patches: SUSE-2019-3195,SUSE-SLE-Module-Basesystem-15-2019-3195,SUSE-SLE-Module-Basesystem-15-SP1-2019-3195 SKIP SUSE-RU-2019:3198-1 as SUSE-SLE-Module-Basesystem-15-2019-3198 is not security or has no CVEs. patches: SUSE-2019-3198,SUSE-SLE-Module-Basesystem-15-2019-3198 SKIP SUSE-RU-2019:3199-1 as SUSE-SLE-SERVER-12-SP5-2019-3199 is not security or has no CVEs. patches: SUSE-2019-3199,SUSE-SLE-SDK-12-SP5-2019-3199,SUSE-SLE-SERVER-12-SP5-2019-3199 ERROR: notice SUSE-RU-2019:3201-1 has no valid patches out of: SUSE-2019-3201,SUSE-SLE-Module-Basesystem-15-2019-3201,SUSE-SLE-Module-Basesystem-15-SP1-2019-3201,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3201,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3201 SKIP SUSE-RU-2019:3202-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-3202 is not security or has no CVEs. patches: SUSE-2019-3202,SUSE-SLE-Module-Development-Tools-15-2019-3202,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3202,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3202,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3202 SKIP SUSE-RU-2019:3203-1 as SUSE-SLE-HA-12-SP3-2019-3203 is not security or has no CVEs. patches: SUSE-2019-3203,SUSE-SLE-HA-12-SP3-2019-3203 SKIP SUSE-RU-2019:3204-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3204 is not security or has no CVEs. patches: SUSE-2019-3204,SUSE-SLE-Module-Basesystem-15-SP1-2019-3204,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3204 SKIP SUSE-RU-2019:3205-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3205 is not security or has no CVEs. patches: SUSE-2019-3205,SUSE-SLE-Module-Basesystem-15-2019-3205,SUSE-SLE-Module-Basesystem-15-SP1-2019-3205 SKIP SUSE-RU-2019:3206-1 as SUSE-SLE-Product-HA-15-2019-3206 is not security or has no CVEs. patches: SUSE-2019-3206,SUSE-SLE-Product-HA-15-2019-3206 SKIP SUSE-RU-2019:3207-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3207 is not security or has no CVEs. patches: SUSE-2019-3207,SUSE-SLE-Module-Basesystem-15-SP1-2019-3207,SUSE-SLE-Module-Desktop-Applications-15-SP1-2019-3207,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3207,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3207 SKIP SUSE-RU-2019:3208-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2019-3208 is not security or has no CVEs. patches: SUSE-2019-3208,SUSE-SLE-SERVER-12-SP5-2019-3208,SUSE-SLE-SERVER-INSTALLER-12-SP5-2019-3208 SKIP SUSE-RU-2019:3210-1 as SUSE-SLE-Product-HA-15-SP1-2019-3210 is not security or has no CVEs. patches: SUSE-2019-3210,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3210,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3210,SUSE-SLE-Product-HA-15-2019-3210,SUSE-SLE-Product-HA-15-SP1-2019-3210 SKIP SUSE-RU-2019:3211-1 as SUSE-SLE-SERVER-12-SP5-2019-3211 is not security or has no CVEs. patches: SUSE-2019-3211,SUSE-SLE-DESKTOP-12-SP4-2019-3211,SUSE-SLE-SDK-12-SP4-2019-3211,SUSE-SLE-SDK-12-SP5-2019-3211,SUSE-SLE-SERVER-12-SP4-2019-3211,SUSE-SLE-SERVER-12-SP5-2019-3211 SKIP SUSE-RU-2019:3231-1 as SUSE-SLE-SERVER-12-SP3-2019-3231 is not security or has no CVEs. patches: SUSE-2019-3231,SUSE-SLE-SAP-12-SP3-2019-3231,SUSE-SLE-SERVER-12-SP3-2019-3231 SKIP SUSE-RU-2019:3239-1 as SUSE-2019-3239 is not security or has no CVEs. patches: SUSE-2019-3239,SUSE-SLE-Manager-Tools-12-2019-3239 SKIP SUSE-RU-2019:3240-1 as SUSE-SLE-Module-Desktop-Applications-15-2019-3240 is not security or has no CVEs. patches: SUSE-2019-3240,SUSE-SLE-Module-Basesystem-15-2019-3240,SUSE-SLE-Module-Basesystem-15-SP1-2019-3240,SUSE-SLE-Module-Desktop-Applications-15-2019-3240,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3240 SKIP SUSE-RU-2019:3241-1 as SUSE-SLE-SDK-12-SP4-2019-3241 is not security or has no CVEs. patches: SUSE-2019-3241,SUSE-SLE-SDK-12-SP4-2019-3241 SKIP SUSE-RU-2019:3243-1 as SUSE-SLE-HA-12-SP2-2019-3243 is not security or has no CVEs. patches: SUSE-2019-3243,SUSE-SLE-HA-12-SP2-2019-3243 SKIP SUSE-RU-2019:3244-1 as SUSE-2019-3244 is not security or has no CVEs. patches: SUSE-2019-3244,SUSE-SLE-Module-Public-Cloud-12-2019-3244 SKIP SUSE-RU-2019:3245-1 as SUSE-2019-3245 is not security or has no CVEs. patches: SUSE-2019-3245,SUSE-SLE-Module-Public-Cloud-15-2019-3245,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3245 SKIP SUSE-RU-2019:3264-1 as SUSE-SLE-SERVER-12-SP2-2019-3264 is not security or has no CVEs. patches: SUSE-2019-3264,SUSE-SLE-SAP-12-SP2-2019-3264,SUSE-SLE-SERVER-12-SP2-2019-3264 SKIP SUSE-RU-2019:3268-1 as SUSE-SLE-SAP-12-SP5-2019-3268 is not security or has no CVEs. patches: SUSE-2019-3268,SUSE-SLE-SAP-12-SP3-2019-3268,SUSE-SLE-SAP-12-SP4-2019-3268,SUSE-SLE-SAP-12-SP5-2019-3268 SKIP SUSE-RU-2019:3269-1 as SUSE-SLE-Module-Legacy-15-SP1-2019-3269 is not security or has no CVEs. patches: SUSE-2019-3269,SUSE-SLE-Module-Legacy-15-2019-3269,SUSE-SLE-Module-Legacy-15-SP1-2019-3269 SKIP SUSE-RU-2019:3278-1 as SUSE-2019-3278 is not security or has no CVEs. patches: SUSE-2019-3278,SUSE-SLE-Manager-Tools-12-2019-3278 SKIP SUSE-RU-2019:3279-1 as SUSE-2019-3279 is not security or has no CVEs. patches: SUSE-2019-3279,SUSE-SLE-Manager-Tools-15-2019-3279 SKIP SUSE-RU-2019:3280-1 as SUSE-2019-3280 is not security or has no CVEs. patches: SUSE-2019-3280,SUSE-SLE-Manager-Tools-15-2019-3280 SKIP SUSE-RU-2019:3285-1 as SUSE-Storage-6-2019-3285 is not security or has no CVEs. patches: SUSE-2019-3285,SUSE-Storage-6-2019-3285 SKIP SUSE-RU-2019:3290-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2019-3290 is not security or has no CVEs. patches: SUSE-2019-3290,SUSE-SLE-Module-Development-Tools-15-2019-3290,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3290 SKIP SUSE-RU-2019:3291-1 as SUSE-SLE-SERVER-12-SP5-2019-3291 is not security or has no CVEs. patches: SUSE-2019-3291,SUSE-SLE-SERVER-12-SP4-2019-3291,SUSE-SLE-SERVER-12-SP5-2019-3291 SKIP SUSE-RU-2019:3298-1 as SUSE-SLE-Module-HPC-15-SP1-2019-3298 is not security or has no CVEs. patches: SUSE-2019-3298,SUSE-SLE-Module-HPC-15-SP1-2019-3298 SKIP SUSE-RU-2019:3299-1 as SUSE-SLE-SERVER-12-SP4-2019-3299 is not security or has no CVEs. patches: SUSE-2019-3299,SUSE-SLE-SERVER-12-SP4-2019-3299 SKIP SUSE-RU-2019:3300-1 as SUSE-SLE-SDK-12-SP5-2019-3300 is not security or has no CVEs. patches: SUSE-2019-3300,SUSE-SLE-SDK-12-SP4-2019-3300,SUSE-SLE-SDK-12-SP5-2019-3300 SKIP SUSE-RU-2019:3301-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3301 is not security or has no CVEs. patches: SUSE-2019-3301,SUSE-SLE-Module-Basesystem-15-2019-3301,SUSE-SLE-Module-Basesystem-15-SP1-2019-3301,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3301,SUSE-SLE-Module-Server-Applications-15-2019-3301,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3301 SKIP SUSE-RU-2019:3302-1 as SUSE-SLE-SERVER-12-SP5-2019-3302 is not security or has no CVEs. patches: SUSE-2019-3302,SUSE-SLE-DESKTOP-12-SP4-2019-3302,SUSE-SLE-SERVER-12-SP4-2019-3302,SUSE-SLE-SERVER-12-SP5-2019-3302 SKIP SUSE-RU-2019:3303-1 as SUSE-Storage-5-2019-3303 is not security or has no CVEs. patches: SUSE-2019-3303,SUSE-Storage-5-2019-3303 SKIP SUSE-RU-2019:3304-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3304 is not security or has no CVEs. patches: SUSE-2019-3304,SUSE-SLE-Module-Basesystem-15-2019-3304,SUSE-SLE-Module-Basesystem-15-SP1-2019-3304,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3304,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3304 SKIP SUSE-RU-2019:3305-1 as SUSE-SLE-SERVER-12-SP5-2019-3305 is not security or has no CVEs. patches: SUSE-2019-3305,SUSE-SLE-SDK-12-SP5-2019-3305,SUSE-SLE-SERVER-12-SP5-2019-3305 SKIP SUSE-RU-2019:3312-1 as SUSE-SLE-SERVER-12-SP5-2019-3312 is not security or has no CVEs. patches: SUSE-2019-3312,SUSE-SLE-SERVER-12-SP5-2019-3312 SKIP SUSE-RU-2019:3314-1 as SUSE-SLE-Module-Development-Tools-15-2019-3314 is not security or has no CVEs. patches: SUSE-2019-3314,SUSE-SLE-Module-Development-Tools-15-2019-3314,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3314 SKIP SUSE-RU-2019:3315-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3315 is not security or has no CVEs. patches: SUSE-2019-3315,SUSE-SLE-Module-Basesystem-15-SP1-2019-3315,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3315 SKIP SUSE-RU-2019:3322-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3322 is not security or has no CVEs. patches: SUSE-2019-3322,SUSE-SLE-INSTALLER-15-SP1-2019-3322,SUSE-SLE-Module-Basesystem-15-SP1-2019-3322 SKIP SUSE-RU-2019:3323-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3323 is not security or has no CVEs. patches: SUSE-2019-3323,SUSE-SLE-Module-Basesystem-15-SP1-2019-3323 SKIP SUSE-RU-2019:3324-1 as SUSE-SLE-Module-Server-Applications-15-2019-3324 is not security or has no CVEs. patches: SUSE-2019-3324,SUSE-SLE-Module-Basesystem-15-2019-3324,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3324,SUSE-SLE-Module-Server-Applications-15-2019-3324 SKIP SUSE-RU-2019:3325-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3325 is not security or has no CVEs. patches: SUSE-2019-3325,SUSE-SLE-Module-Basesystem-15-SP1-2019-3325 SKIP SUSE-RU-2019:3326-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3326 is not security or has no CVEs. patches: SUSE-2019-3326,SUSE-SLE-Module-Development-Tools-15-2019-3326,SUSE-SLE-Module-Development-Tools-15-SP1-2019-3326,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3326,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3326,SUSE-SLE-Module-Server-Applications-15-2019-3326,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3326 SKIP SUSE-RU-2019:3327-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2019-3327 is not security or has no CVEs. patches: SUSE-2019-3327,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-3327 SKIP SUSE-RU-2019:3328-1 as SUSE-SLE-Module-Web-Scripting-15-2019-3328 is not security or has no CVEs. patches: SUSE-2019-3328,SUSE-SLE-Module-Web-Scripting-15-2019-3328 SKIP SUSE-RU-2019:3329-1 as SUSE-SLE-Module-Python2-15-SP1-2019-3329 is not security or has no CVEs. patches: SUSE-2019-3329,SUSE-SLE-Module-Basesystem-15-2019-3329,SUSE-SLE-Module-Basesystem-15-SP1-2019-3329,SUSE-SLE-Module-Python2-15-SP1-2019-3329 SKIP SUSE-RU-2019:3332-1 as SUSE-SLE-SERVER-12-SP5-2019-3332 is not security or has no CVEs. patches: SUSE-2019-3332,SUSE-SLE-DESKTOP-12-SP4-2019-3332,SUSE-SLE-SERVER-12-SP4-2019-3332,SUSE-SLE-SERVER-12-SP5-2019-3332 SKIP SUSE-RU-2019:3333-1 as SUSE-SLE-SERVER-12-SP5-2019-3333 is not security or has no CVEs. patches: SUSE-2019-3333,SUSE-SLE-SERVER-12-SP5-2019-3333 SKIP SUSE-RU-2019:3334-1 as SUSE-SLE-SERVER-12-SP5-2019-3334 is not security or has no CVEs. patches: SUSE-2019-3334,SUSE-SLE-SERVER-12-SP5-2019-3334 SKIP SUSE-RU-2019:3342-1 as SUSE-SLE-SERVER-12-SP5-2019-3342 is not security or has no CVEs. patches: SUSE-2019-3342,SUSE-SLE-DESKTOP-12-SP4-2019-3342,SUSE-SLE-SDK-12-SP4-2019-3342,SUSE-SLE-SDK-12-SP5-2019-3342,SUSE-SLE-SERVER-12-SP4-2019-3342,SUSE-SLE-SERVER-12-SP5-2019-3342 SKIP SUSE-RU-2019:3343-1 as SUSE-SLE-Product-HA-15-SP1-2019-3343 is not security or has no CVEs. patches: SUSE-2019-3343,SUSE-SLE-Module-Basesystem-15-SP1-2019-3343,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3343,SUSE-SLE-Product-HA-15-SP1-2019-3343 SKIP SUSE-RU-2019:3344-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3344 is not security or has no CVEs. patches: SUSE-2019-3344,SUSE-SLE-Module-Basesystem-15-SP1-2019-3344,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3344,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3344 SKIP SUSE-RU-2019:3350-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-3350 is not security or has no CVEs. patches: SUSE-2019-3350,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3350,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2019-3350,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2019-3350,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2019-3350 SKIP SUSE-RU-2019:3352-1 as SUSE-SLE-Manager-Tools-12-2019-3352 is not security or has no CVEs. patches: SUSE-2019-3352,SUSE-SLE-Manager-Tools-12-2019-3352 ERROR: notice SUSE-RU-2019:3353-1 has no valid patches out of: SUSE-2019-3353,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2019-3353,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2019-3353 SKIP SUSE-RU-2019:3353-2 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-151 is not security or has no CVEs. patches: SUSE-2019-3353,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-151 SKIP SUSE-RU-2019:3360-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2019-3360 is not security or has no CVEs. patches: SUSE-2019-3360,SUSE-SLE-Module-Basesystem-15-SP1-2019-3360,SUSE-SLE-Module-Python2-15-SP1-2019-3360,SUSE-SLE-Module-Server-Applications-15-SP1-2019-3360 SKIP SUSE-RU-2019:3361-1 as SUSE-SLE-Manager-Tools-15-2019-3361 is not security or has no CVEs. patches: SUSE-2019-3361,SUSE-SLE-Manager-Tools-15-2019-3361,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3361,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3361 SKIP SUSE-RU-2019:3363-1 as SUSE-SLE-HA-12-SP3-2019-3363 is not security or has no CVEs. patches: SUSE-2019-3363,SUSE-SLE-HA-12-SP3-2019-3363 SKIP SUSE-RU-2019:3364-1 as SUSE-SLE-SERVER-12-SP5-2019-3364 is not security or has no CVEs. patches: SUSE-2019-3364,SUSE-SLE-DESKTOP-12-SP4-2019-3364,SUSE-SLE-SDK-12-SP4-2019-3364,SUSE-SLE-SDK-12-SP5-2019-3364,SUSE-SLE-SERVER-12-SP4-2019-3364,SUSE-SLE-SERVER-12-SP5-2019-3364 SKIP SUSE-RU-2019:3365-1 as SUSE-SLE-SERVER-12-SP5-2019-3365 is not security or has no CVEs. patches: SUSE-2019-3365,SUSE-SLE-SERVER-12-SP5-2019-3365 SKIP SUSE-RU-2019:3366-1 as SUSE-SLE-Product-WE-15-SP1-2019-3366 is not security or has no CVEs. patches: SUSE-2019-3366,SUSE-SLE-Module-Development-Tools-OBS-15-2019-3366,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3366,SUSE-SLE-Product-WE-15-2019-3366,SUSE-SLE-Product-WE-15-SP1-2019-3366 SKIP SUSE-RU-2019:3367-1 as SUSE-SLE-Module-Public-Cloud-12-2019-3367 is not security or has no CVEs. patches: SUSE-2019-3367,SUSE-SLE-Module-Public-Cloud-12-2019-3367 SKIP SUSE-RU-2019:3368-1 as SUSE-SLE-Module-Basesystem-15-2019-3368 is not security or has no CVEs. patches: SUSE-2019-3368,SUSE-SLE-Module-Basesystem-15-2019-3368 SKIP SUSE-RU-2019:3374-1 as SUSE-SLE-Module-Python2-15-SP1-2019-3374 is not security or has no CVEs. patches: SUSE-2019-3374,SUSE-SLE-Module-Basesystem-15-2019-3374,SUSE-SLE-Module-Basesystem-15-SP1-2019-3374,SUSE-SLE-Module-Python2-15-SP1-2019-3374 SKIP SUSE-RU-2019:3375-1 as SUSE-SLE-Module-Server-Applications-15-2019-3375 is not security or has no CVEs. patches: SUSE-2019-3375,SUSE-SLE-Module-Basesystem-15-2019-3375,SUSE-SLE-Module-Server-Applications-15-2019-3375 SKIP SUSE-RU-2019:3376-1 as SUSE-SUSE-Manager-Server-3.2-2019-3376 is not security or has no CVEs. patches: SUSE-2019-3376,SUSE-SLE-Manager-Tools-12-2019-3376,SUSE-SLE-Module-Adv-Systems-Management-12-2019-3376,SUSE-SLE-POS-12-SP2-2019-3376,SUSE-SUSE-Manager-Proxy-3.2-2019-3376,SUSE-SUSE-Manager-Server-3.2-2019-3376 SKIP SUSE-RU-2019:3382-1 as SUSE-Storage-5-2019-3382 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2019-3382,SUSE-2019-3382,SUSE-OpenStack-Cloud-7-2019-3382,SUSE-OpenStack-Cloud-8-2019-3382,SUSE-OpenStack-Cloud-Crowbar-8-2019-3382,SUSE-SLE-DESKTOP-12-SP4-2019-3382,SUSE-SLE-SAP-12-SP1-2019-3382,SUSE-SLE-SAP-12-SP2-2019-3382,SUSE-SLE-SAP-12-SP3-2019-3382,SUSE-SLE-SERVER-12-SP1-2019-3382,SUSE-SLE-SERVER-12-SP2-2019-3382,SUSE-SLE-SERVER-12-SP2-BCL-2019-3382,SUSE-SLE-SERVER-12-SP3-2019-3382,SUSE-SLE-SERVER-12-SP3-BCL-2019-3382,SUSE-SLE-SERVER-12-SP4-2019-3382,SUSE-Storage-5-2019-3382 SKIP SUSE-RU-2019:3383-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3383 is not security or has no CVEs. patches: SUSE-2019-3383,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3383,SUSE-SLE-Module-Public-Cloud-15-2019-3383,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-3383 SKIP SUSE-RU-2019:3384-1 as SUSE-SLE-Product-WE-15-SP1-2019-3384 is not security or has no CVEs. patches: SUSE-2019-3384,SUSE-SLE-Product-WE-15-SP1-2019-3384 SKIP SUSE-RU-2019:3387-1 as SUSE-SLE-Module-Public-Cloud-12-2019-3387 is not security or has no CVEs. patches: SUSE-2019-3387,SUSE-SLE-Module-Public-Cloud-12-2019-3387 SKIP SUSE-RU-2019:3388-1 as SUSE-SLE-SDK-12-SP5-2019-3388 is not security or has no CVEs. patches: SUSE-2019-3388,SUSE-SLE-SDK-12-SP4-2019-3388,SUSE-SLE-SDK-12-SP5-2019-3388 SKIP SUSE-RU-2019:3397-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3397 is not security or has no CVEs. patches: SUSE-2019-3397,SUSE-SLE-Module-Basesystem-15-SP1-2019-3397 SKIP SUSE-RU-2019:3400-1 as SUSE-SLE-Module-Basesystem-15-SP1-2019-3400 is not security or has no CVEs. patches: SUSE-2019-3400,SUSE-SLE-Module-Basesystem-15-2019-3400,SUSE-SLE-Module-Basesystem-15-SP1-2019-3400 SKIP SUSE-RU-2020:0003-1 as SUSE-SLE-HA-12-SP5-2020-3 is not security or has no CVEs. patches: SUSE-2020-3,SUSE-SLE-HA-12-SP4-2020-3,SUSE-SLE-HA-12-SP5-2020-3 SKIP SUSE-RU-2020:0004-1 as SUSE-SLE-SERVER-12-SP4-2020-4 is not security or has no CVEs. patches: SUSE-2020-4,SUSE-SLE-DESKTOP-12-SP4-2020-4,SUSE-SLE-SERVER-12-SP4-2020-4 SKIP SUSE-RU-2020:0005-1 as SUSE-SLE-Module-Basesystem-15-2020-5 is not security or has no CVEs. patches: SUSE-2020-5,SUSE-SLE-Module-Basesystem-15-2020-5,SUSE-SLE-Module-Development-Tools-OBS-15-2020-5 SKIP SUSE-RU-2020:0006-1 as SUSE-SLE-HA-12-SP2-2020-6 is not security or has no CVEs. patches: SUSE-2020-6,SUSE-SLE-HA-12-SP2-2020-6 SKIP SUSE-RU-2020:0007-1 as SUSE-SLE-SERVER-12-SP5-2020-7 is not security or has no CVEs. patches: SUSE-2020-7,SUSE-SLE-SERVER-12-SP5-2020-7 SKIP SUSE-RU-2020:0008-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-8 is not security or has no CVEs. patches: SUSE-2020-8,SUSE-SLE-Module-Basesystem-15-SP1-2020-8 SKIP SUSE-RU-2020:0009-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-9 is not security or has no CVEs. patches: SUSE-2020-9,SUSE-SLE-Module-Basesystem-15-2020-9,SUSE-SLE-Module-Basesystem-15-SP1-2020-9 SKIP SUSE-RU-2020:0010-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-10 is not security or has no CVEs. patches: SUSE-2020-10,SUSE-SLE-Module-Basesystem-15-2020-10,SUSE-SLE-Module-Basesystem-15-SP1-2020-10,SUSE-SLE-Module-Development-Tools-15-2020-10,SUSE-SLE-Module-Development-Tools-15-SP1-2020-10,SUSE-SLE-Module-Development-Tools-OBS-15-2020-10,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-10 SKIP SUSE-RU-2020:0011-1 as SUSE-SLE-SDK-12-SP5-2020-11 is not security or has no CVEs. patches: SUSE-2020-11,SUSE-SLE-HA-12-SP5-2020-11,SUSE-SLE-SDK-12-SP5-2020-11 SKIP SUSE-RU-2020:0012-1 as SUSE-SLE-SERVER-12-SP4-2020-12 is not security or has no CVEs. patches: SUSE-2020-12,SUSE-SLE-DESKTOP-12-SP4-2020-12,SUSE-SLE-SERVER-12-SP4-2020-12 SKIP SUSE-RU-2020:0013-1 as SUSE-Storage-5-2020-13 is not security or has no CVEs. patches: SUSE-2020-13,SUSE-Storage-5-2020-13 SKIP SUSE-RU-2020:0014-1 as SUSE-Storage-6-2020-14 is not security or has no CVEs. patches: SUSE-2020-14,SUSE-Storage-6-2020-14 SKIP SUSE-RU-2020:0015-1 as SUSE-Storage-6-2020-15 is not security or has no CVEs. patches: SUSE-2020-15,SUSE-Storage-6-2020-15 SKIP SUSE-RU-2020:0018-1 as SUSE-SLE-SDK-12-SP5-2020-18 is not security or has no CVEs. patches: SUSE-2020-18,SUSE-SLE-SDK-12-SP4-2020-18,SUSE-SLE-SDK-12-SP5-2020-18 SKIP SUSE-RU-2020:0020-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2020-19 is not security or has no CVEs. patches: SUSE-2020-20,SUSE-SLE-Live-Patching-12-2020-20,SUSE-SLE-Live-Patching-12-SP3-2020-20,SUSE-SLE-Live-Patching-12-SP4-2020-20,SUSE-SLE-Live-Patching-12-SP5-2020-20,SUSE-SLE-Module-Live-Patching-15-2020-19,SUSE-SLE-Module-Live-Patching-15-SP1-2020-19 SKIP SUSE-RU-2020:0021-1 as SUSE-SLE-SERVER-12-SP5-2020-21 is not security or has no CVEs. patches: SUSE-2020-21,SUSE-SLE-SDK-12-SP5-2020-21,SUSE-SLE-SERVER-12-SP5-2020-21 SKIP SUSE-RU-2020:0022-1 as SUSE-SLE-Module-HPC-15-2020-22 is not security or has no CVEs. patches: SUSE-2020-22,SUSE-SLE-Module-Basesystem-15-2020-22,SUSE-SLE-Module-HPC-15-2020-22 SKIP SUSE-RU-2020:0022-2 as SUSE-SLE-Module-HPC-15-SP1-2020-22 is not security or has no CVEs. patches: SUSE-2020-22,SUSE-SLE-Module-HPC-15-SP1-2020-22 SKIP SUSE-RU-2020:0027-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-27 is not security or has no CVEs. patches: SUSE-2020-27,SUSE-SLE-Module-Basesystem-15-SP1-2020-27,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-27,SUSE-SLE-Module-Server-Applications-15-SP1-2020-27 SKIP SUSE-RU-2020:0030-1 as SUSE-SLE-Module-Public-Cloud-12-2020-30 is not security or has no CVEs. patches: SUSE-2020-30,SUSE-SLE-Module-Public-Cloud-12-2020-30 SKIP SUSE-RU-2020:0031-1 as SUSE-SLE-Module-Public-Cloud-15-2020-31 is not security or has no CVEs. patches: SUSE-2020-31,SUSE-SLE-Module-Public-Cloud-15-2020-31 SKIP SUSE-RU-2020:0031-2 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-31 is not security or has no CVEs. patches: SUSE-2020-31,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-31 SKIP SUSE-RU-2020:0032-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-32 is not security or has no CVEs. patches: SUSE-2020-32,SUSE-SLE-Module-Development-Tools-15-2020-32,SUSE-SLE-Module-Development-Tools-15-SP1-2020-32 SKIP SUSE-RU-2020:0033-1 as SUSE-SLE-Module-Public-Cloud-12-2020-33 is not security or has no CVEs. patches: SUSE-2020-33,SUSE-SLE-Module-Public-Cloud-12-2020-33 SKIP SUSE-RU-2020:0038-1 as SUSE-SLE-Module-Basesystem-15-2020-38 is not security or has no CVEs. patches: SUSE-2020-38,SUSE-SLE-Module-Basesystem-15-2020-38,SUSE-SLE-Module-Development-Tools-OBS-15-2020-38 SKIP SUSE-RU-2020:0040-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-40 is not security or has no CVEs. patches: SUSE-2020-40,SUSE-SLE-Module-Basesystem-15-2020-40,SUSE-SLE-Module-Basesystem-15-SP1-2020-40 SKIP SUSE-RU-2020:0041-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-41 is not security or has no CVEs. patches: SUSE-2020-41,SUSE-SLE-Module-Basesystem-15-SP1-2020-41,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-41 SKIP SUSE-RU-2020:0042-1 as SUSE-SLE-Product-SLES_SAP-15-2020-42 is not security or has no CVEs. patches: SUSE-2020-42,SUSE-SLE-Product-SLES-15-2020-42,SUSE-SLE-Product-SLES_SAP-15-2020-42 SKIP SUSE-RU-2020:0048-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-48 is not security or has no CVEs. patches: SUSE-2020-48,SUSE-SLE-Module-Basesystem-15-SP1-2020-48 SKIP SUSE-RU-2020:0049-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-49 is not security or has no CVEs. patches: SUSE-2020-49,SUSE-SLE-Module-Basesystem-15-SP1-2020-49,SUSE-SLE-Module-Development-Tools-15-SP1-2020-49,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-49 SKIP SUSE-RU-2020:0057-1 as SUSE-SLE-SERVER-12-SP5-2020-57 is not security or has no CVEs. patches: SUSE-2020-57,SUSE-SLE-SERVER-12-SP5-2020-57 SKIP SUSE-RU-2020:0061-1 as SUSE-SLE-SERVER-12-SP5-2020-61 is not security or has no CVEs. patches: SUSE-2020-61,SUSE-SLE-SDK-12-SP5-2020-61,SUSE-SLE-SERVER-12-SP5-2020-61 SKIP SUSE-RU-2020:0062-1 as SUSE-Storage-5-2020-62 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-62,SUSE-2020-62,SUSE-OpenStack-Cloud-7-2020-62,SUSE-OpenStack-Cloud-8-2020-62,SUSE-OpenStack-Cloud-Crowbar-8-2020-62,SUSE-SLE-SAP-12-SP1-2020-62,SUSE-SLE-SAP-12-SP2-2020-62,SUSE-SLE-SAP-12-SP3-2020-62,SUSE-SLE-SDK-12-SP4-2020-62,SUSE-SLE-SDK-12-SP5-2020-62,SUSE-SLE-SERVER-12-SP1-2020-62,SUSE-SLE-SERVER-12-SP2-2020-62,SUSE-SLE-SERVER-12-SP2-BCL-2020-62,SUSE-SLE-SERVER-12-SP3-2020-62,SUSE-SLE-SERVER-12-SP3-BCL-2020-62,SUSE-SLE-SERVER-12-SP4-2020-62,SUSE-SLE-SERVER-12-SP5-2020-62,SUSE-Storage-5-2020-62 SKIP SUSE-RU-2020:0066-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-66 is not security or has no CVEs. patches: SUSE-2020-66,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-66 SKIP SUSE-RU-2020:0067-1 as SUSE-SUSE-Manager-Server-3.2-2020-67 is not security or has no CVEs. patches: SUSE-2020-67,SUSE-SUSE-Manager-Server-3.2-2020-67 SKIP SUSE-RU-2020:0072-1 as SUSE-SLE-Product-HPC-15-2020-72 is not security or has no CVEs. patches: SUSE-2020-72,SUSE-SLE-Product-HPC-15-2020-72 SKIP SUSE-RU-2020:0073-1 as SUSE-SLE-Product-HPC-15-2020-73 is not security or has no CVEs. patches: SUSE-2020-73,SUSE-SLE-Product-HPC-15-2020-73 SKIP SUSE-RU-2020:0076-1 as SUSE-SLE-HA-12-SP3-2020-76 is not security or has no CVEs. patches: SUSE-2020-76,SUSE-SLE-HA-12-SP3-2020-76 SKIP SUSE-RU-2020:0077-1 as SUSE-SLE-Product-HA-15-SP1-2020-77 is not security or has no CVEs. patches: SUSE-2020-77,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-77,SUSE-SLE-Product-HA-15-SP1-2020-77 SKIP SUSE-RU-2020:0080-1 as SUSE-SLE-WE-12-SP5-2020-80 is not security or has no CVEs. patches: SUSE-2020-80,SUSE-SLE-WE-12-SP5-2020-80 SKIP SUSE-RU-2020:0082-1 as SUSE-SLE-HA-GEO-12-SP5-2020-82 is not security or has no CVEs. patches: SUSE-2020-82,SUSE-SLE-HA-GEO-12-SP5-2020-82 SKIP SUSE-RU-2020:0083-1 as SUSE-SLE-HA-12-SP5-2020-83 is not security or has no CVEs. patches: SUSE-2020-83,SUSE-SLE-HA-12-SP5-2020-83 SKIP SUSE-RU-2020:0084-1 as SUSE-SLE-HA-12-SP5-2020-84 is not security or has no CVEs. patches: SUSE-2020-84,SUSE-SLE-HA-12-SP4-2020-84,SUSE-SLE-HA-12-SP5-2020-84 SKIP SUSE-RU-2020:0090-1 as SUSE-Storage-5-2020-90 is not security or has no CVEs. patches: SUSE-2020-90,SUSE-Storage-5-2020-90 SKIP SUSE-RU-2020:0091-1 as SUSE-SLE-HA-12-SP5-2020-91 is not security or has no CVEs. patches: SUSE-2020-91,SUSE-SLE-HA-12-SP4-2020-91,SUSE-SLE-HA-12-SP5-2020-91 SKIP SUSE-RU-2020:0092-1 as SUSE-SLE-Module-RT-15-SP1-2020-92 is not security or has no CVEs. patches: SUSE-2020-92,SUSE-SLE-Module-Development-Tools-15-SP1-2020-92,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-92,SUSE-SLE-Module-RT-15-SP1-2020-92 SKIP SUSE-RU-2020:0094-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-94 is not security or has no CVEs. patches: SUSE-2020-94,SUSE-SLE-Module-Basesystem-15-2020-94,SUSE-SLE-Module-Basesystem-15-SP1-2020-94,SUSE-SLE-Module-Development-Tools-OBS-15-2020-94,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-94 SKIP SUSE-RU-2020:0095-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-95 is not security or has no CVEs. patches: SUSE-2020-95,SUSE-SLE-Module-Development-Tools-15-SP1-2020-95 SKIP SUSE-RU-2020:0096-1 as SUSE-SLE-Module-Development-Tools-15-2020-96 is not security or has no CVEs. patches: SUSE-2020-96,SUSE-SLE-Module-Development-Tools-15-2020-96 SKIP SUSE-RU-2020:0098-1 as SUSE-SLE-WE-12-SP5-2020-98 is not security or has no CVEs. patches: SUSE-2020-98,SUSE-SLE-DESKTOP-12-SP4-2020-98,SUSE-SLE-SDK-12-SP4-2020-98,SUSE-SLE-SDK-12-SP5-2020-98,SUSE-SLE-SERVER-12-SP4-2020-98,SUSE-SLE-SERVER-12-SP5-2020-98,SUSE-SLE-WE-12-SP4-2020-98,SUSE-SLE-WE-12-SP5-2020-98 SKIP SUSE-RU-2020:0100-1 as SUSE-SLE-Module-Development-Tools-15-2020-100 is not security or has no CVEs. patches: SUSE-2020-100,SUSE-SLE-Module-Development-Tools-15-2020-100 SKIP SUSE-RU-2020:0106-1 as SUSE-Storage-5-2020-106 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-106,SUSE-2020-106,SUSE-OpenStack-Cloud-7-2020-106,SUSE-OpenStack-Cloud-8-2020-106,SUSE-OpenStack-Cloud-Crowbar-8-2020-106,SUSE-SLE-DESKTOP-12-SP4-2020-106,SUSE-SLE-SAP-12-SP1-2020-106,SUSE-SLE-SAP-12-SP2-2020-106,SUSE-SLE-SAP-12-SP3-2020-106,SUSE-SLE-SDK-12-SP4-2020-106,SUSE-SLE-SDK-12-SP5-2020-106,SUSE-SLE-SERVER-12-SP1-2020-106,SUSE-SLE-SERVER-12-SP2-2020-106,SUSE-SLE-SERVER-12-SP2-BCL-2020-106,SUSE-SLE-SERVER-12-SP3-2020-106,SUSE-SLE-SERVER-12-SP3-BCL-2020-106,SUSE-SLE-SERVER-12-SP4-2020-106,SUSE-SLE-SERVER-12-SP5-2020-106,SUSE-Storage-5-2020-106 SKIP SUSE-RU-2020:0107-1 as SUSE-SLE-Module-Basesystem-15-2020-107 is not security or has no CVEs. patches: SUSE-2020-107,SUSE-SLE-INSTALLER-15-2020-107,SUSE-SLE-Module-Basesystem-15-2020-107 SKIP SUSE-RU-2020:0108-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-108 is not security or has no CVEs. patches: SUSE-2020-108,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-108 SKIP SUSE-RU-2020:0109-1 as SUSE-SLE-Product-HA-15-SP1-2020-109 is not security or has no CVEs. patches: SUSE-2020-109,SUSE-SLE-Product-HA-15-2020-109,SUSE-SLE-Product-HA-15-SP1-2020-109 SKIP SUSE-RU-2020:0117-1 as SUSE-Storage-6-2020-117 is not security or has no CVEs. patches: SUSE-2020-117,SUSE-Storage-6-2020-117 SKIP SUSE-RU-2020:0119-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-119 is not security or has no CVEs. patches: SUSE-2020-119,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-119,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-119 SKIP SUSE-RU-2020:0119-2 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-119 is not security or has no CVEs. patches: SUSE-2020-119,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-119,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-119,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-119 SKIP SUSE-RU-2020:0120-1 as SUSE-SLE-Module-Public-Cloud-15-2020-120 is not security or has no CVEs. patches: SUSE-2020-120,SUSE-SLE-Module-Development-Tools-OBS-15-2020-120,SUSE-SLE-Module-Packagehub-Subpackages-15-2020-120,SUSE-SLE-Module-Public-Cloud-15-2020-120 SKIP SUSE-RU-2020:0122-1 as SUSE-SLE-Module-Containers-15-SP1-2020-122 is not security or has no CVEs. patches: SUSE-2020-122,SUSE-SLE-Module-Containers-15-2020-122,SUSE-SLE-Module-Containers-15-SP1-2020-122 SKIP SUSE-RU-2020:0123-1 as SUSE-SLE-SERVER-12-SP1-2020-123 is not security or has no CVEs. patches: SUSE-2020-123,SUSE-SLE-SAP-12-SP1-2020-123,SUSE-SLE-SERVER-12-SP1-2020-123 SKIP SUSE-RU-2020:0124-1 as SUSE-SLE-SERVER-12-SP5-2020-124 is not security or has no CVEs. patches: SUSE-2020-124,SUSE-SLE-SERVER-12-SP4-2020-124,SUSE-SLE-SERVER-12-SP5-2020-124 SKIP SUSE-RU-2020:0125-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-125 is not security or has no CVEs. patches: SUSE-2020-125,SUSE-SLE-Module-Basesystem-15-2020-125,SUSE-SLE-Module-Basesystem-15-SP1-2020-125,SUSE-SLE-Module-Development-Tools-OBS-15-2020-125,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-125 SKIP SUSE-RU-2020:0126-1 as SUSE-SLE-Module-Basesystem-15-2020-126 is not security or has no CVEs. patches: SUSE-2020-126,SUSE-SLE-Module-Basesystem-15-2020-126 SKIP SUSE-RU-2020:0133-1 as SUSE-SLE-Module-SAP-Applications-15-2020-133 is not security or has no CVEs. patches: SUSE-2020-133,SUSE-SLE-Module-SAP-Applications-15-2020-133 SKIP SUSE-RU-2020:0134-1 as SUSE-SLE-SAP-12-SP5-2020-134 is not security or has no CVEs. patches: SUSE-2020-134,SUSE-SLE-SAP-12-SP2-2020-134,SUSE-SLE-SAP-12-SP3-2020-134,SUSE-SLE-SAP-12-SP4-2020-134,SUSE-SLE-SAP-12-SP5-2020-134 SKIP SUSE-RU-2020:0135-1 as SUSE-SLE-SERVER-12-SP5-2020-135 is not security or has no CVEs. patches: SUSE-2020-135,SUSE-SLE-SERVER-12-SP5-2020-135 SKIP SUSE-RU-2020:0136-1 as SUSE-SLE-SERVER-12-SP4-2020-136 is not security or has no CVEs. patches: SUSE-2020-136,SUSE-SLE-DESKTOP-12-SP4-2020-136,SUSE-SLE-SERVER-12-SP4-2020-136 SKIP SUSE-RU-2020:0137-1 as SUSE-SLE-HA-12-SP5-2020-137 is not security or has no CVEs. patches: SUSE-2020-137,SUSE-SLE-HA-12-SP5-2020-137 SKIP SUSE-RU-2020:0141-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-141 is not security or has no CVEs. patches: SUSE-2020-141,SUSE-SLE-SERVER-12-SP5-2020-141,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-141 SKIP SUSE-RU-2020:0144-1 as SUSE-SLE-SERVER-12-SP5-2020-144 is not security or has no CVEs. patches: SUSE-2020-144,SUSE-SLE-DESKTOP-12-SP4-2020-144,SUSE-SLE-SERVER-12-SP4-2020-144,SUSE-SLE-SERVER-12-SP5-2020-144 SKIP SUSE-RU-2020:0147-1 as SUSE-SLE-SAP-12-SP5-2020-147 is not security or has no CVEs. patches: SUSE-2020-147,SUSE-SLE-SAP-12-SP2-2020-147,SUSE-SLE-SAP-12-SP3-2020-147,SUSE-SLE-SAP-12-SP4-2020-147,SUSE-SLE-SAP-12-SP5-2020-147 SKIP SUSE-RU-2020:0148-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-148 is not security or has no CVEs. patches: SUSE-2020-148,SUSE-SLE-Module-Basesystem-15-SP1-2020-148 SKIP SUSE-RU-2020:0149-1 as SUSE-SLE-SERVER-12-SP5-2020-149 is not security or has no CVEs. patches: SUSE-2020-149,SUSE-SLE-DESKTOP-12-SP4-2020-149,SUSE-SLE-SERVER-12-SP4-2020-149,SUSE-SLE-SERVER-12-SP5-2020-149 SKIP SUSE-RU-2020:0150-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-150 is not security or has no CVEs. patches: SUSE-2020-150,SUSE-SLE-Module-Basesystem-15-SP1-2020-150 SKIP SUSE-RU-2020:0154-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-154 is not security or has no CVEs. patches: SUSE-2020-154,SUSE-SLE-Module-Server-Applications-15-SP1-2020-154 SKIP SUSE-RU-2020:0155-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-155 is not security or has no CVEs. patches: SUSE-2020-155,SUSE-SLE-Module-Development-Tools-15-SP1-2020-155,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-155,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-155 SKIP SUSE-RU-2020:0156-1 as SUSE-SLE-Product-SLES_SAP-15-2020-156 is not security or has no CVEs. patches: SUSE-2020-156,SUSE-SLE-Module-Basesystem-15-2020-156,SUSE-SLE-Module-Development-Tools-OBS-15-2020-156,SUSE-SLE-Product-HPC-15-2020-156,SUSE-SLE-Product-SLES-15-2020-156,SUSE-SLE-Product-SLES_SAP-15-2020-156 SKIP SUSE-RU-2020:0157-1 as SUSE-SLE-Product-SLES_SAP-15-2020-157 is not security or has no CVEs. patches: SUSE-2020-157,SUSE-SLE-Module-Basesystem-15-2020-157,SUSE-SLE-Module-Development-Tools-OBS-15-2020-157,SUSE-SLE-Product-HPC-15-2020-157,SUSE-SLE-Product-SLES-15-2020-157,SUSE-SLE-Product-SLES_SAP-15-2020-157 SKIP SUSE-RU-2020:0158-1 as SUSE-Storage-6-2020-158 is not security or has no CVEs. patches: SUSE-2020-158,SUSE-SLE-Module-Basesystem-15-SP1-2020-158,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-158,SUSE-Storage-6-2020-158 SKIP SUSE-RU-2020:0214-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-214 is not security or has no CVEs. patches: SUSE-2020-214,SUSE-SLE-Module-Development-Tools-15-SP1-2020-214 SKIP SUSE-RU-2020:0216-1 as SUSE-SLE-Product-WE-15-SP1-2020-216 is not security or has no CVEs. patches: SUSE-2020-216,SUSE-SLE-Product-WE-15-SP1-2020-216 SKIP SUSE-RU-2020:0217-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-217 is not security or has no CVEs. patches: SUSE-2020-217,SUSE-SLE-Module-Development-Tools-15-2020-217,SUSE-SLE-Module-Development-Tools-15-SP1-2020-217 SKIP SUSE-RU-2020:0218-1 as SUSE-SLE-Module-Basesystem-15-2020-218 is not security or has no CVEs. patches: SUSE-2020-218,SUSE-SLE-INSTALLER-15-2020-218,SUSE-SLE-Module-Basesystem-15-2020-218 SKIP SUSE-RU-2020:0219-1 as SUSE-SLE-HA-12-SP5-2020-219 is not security or has no CVEs. patches: SUSE-2020-219,SUSE-SLE-HA-12-SP4-2020-219,SUSE-SLE-HA-12-SP5-2020-219 SKIP SUSE-RU-2020:0220-1 as SUSE-SLE-Product-SLES_SAP-15-2020-220 is not security or has no CVEs. patches: SUSE-2020-220,SUSE-SLE-Module-Basesystem-15-2020-220,SUSE-SLE-Product-HPC-15-2020-220,SUSE-SLE-Product-SLES_SAP-15-2020-220 SKIP SUSE-RU-2020:0221-1 as SUSE-SLE-SERVER-12-SP5-2020-221 is not security or has no CVEs. patches: SUSE-2020-221,SUSE-SLE-SERVER-12-SP5-2020-221 SKIP SUSE-RU-2020:0222-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-222 is not security or has no CVEs. patches: SUSE-2020-222,SUSE-SLE-Module-Basesystem-15-SP1-2020-222 SKIP SUSE-RU-2020:0225-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-225 is not security or has no CVEs. patches: SUSE-2020-225,SUSE-SLE-Module-Basesystem-15-2020-225,SUSE-SLE-Module-Basesystem-15-SP1-2020-225 SKIP SUSE-RU-2020:0227-1 as SUSE-SLE-SERVER-12-SP5-2020-227 is not security or has no CVEs. patches: SUSE-2020-227,SUSE-SLE-DESKTOP-12-SP4-2020-227,SUSE-SLE-SDK-12-SP4-2020-227,SUSE-SLE-SDK-12-SP5-2020-227,SUSE-SLE-SERVER-12-SP4-2020-227,SUSE-SLE-SERVER-12-SP5-2020-227 SKIP SUSE-RU-2020:0229-1 as SUSE-SLE-HA-12-SP3-2020-229 is not security or has no CVEs. patches: SUSE-2020-229,SUSE-SLE-HA-12-SP3-2020-229 SKIP SUSE-RU-2020:0230-1 as SUSE-Storage-6-2020-230 is not security or has no CVEs. patches: SUSE-2020-230,SUSE-Storage-6-2020-230 SKIP SUSE-RU-2020:0232-1 as SUSE-SLE-Product-SLES_SAP-15-2020-232 is not security or has no CVEs. patches: SUSE-2020-232,SUSE-SLE-Module-Basesystem-15-2020-232,SUSE-SLE-Module-Basesystem-15-SP1-2020-232,SUSE-SLE-Module-Development-Tools-OBS-15-2020-232,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-232,SUSE-SLE-Product-HPC-15-2020-232,SUSE-SLE-Product-SLES-15-2020-232,SUSE-SLE-Product-SLES_SAP-15-2020-232 SKIP SUSE-RU-2020:0235-1 as SUSE-SLE-Product-HA-15-2020-235 is not security or has no CVEs. patches: SUSE-2020-235,SUSE-SLE-Product-HA-15-2020-235 SKIP SUSE-RU-2020:0236-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-236 is not security or has no CVEs. patches: SUSE-2020-236,SUSE-SLE-INSTALLER-15-SP1-2020-236,SUSE-SLE-Module-Basesystem-15-SP1-2020-236 SKIP SUSE-RU-2020:0237-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-237 is not security or has no CVEs. patches: SUSE-2020-237,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-237 SKIP SUSE-RU-2020:0238-1 as SUSE-SLE-Module-SAP-Applications-15-2020-238 is not security or has no CVEs. patches: SUSE-2020-238,SUSE-SLE-Module-SAP-Applications-15-2020-238 SKIP SUSE-RU-2020:0239-1 as SUSE-SLE-SAP-12-SP5-2020-239 is not security or has no CVEs. patches: SUSE-2020-239,SUSE-SLE-SAP-12-SP4-2020-239,SUSE-SLE-SAP-12-SP5-2020-239 SKIP SUSE-RU-2020:0240-1 as SUSE-SLE-Module-Public-Cloud-15-2020-240 is not security or has no CVEs. patches: SUSE-2020-240,SUSE-SLE-Module-Development-Tools-OBS-15-2020-240,SUSE-SLE-Module-Public-Cloud-15-2020-240 SKIP SUSE-RU-2020:0242-1 as SUSE-SLE-SAP-12-SP3-2020-242 is not security or has no CVEs. patches: SUSE-2020-242,SUSE-SLE-SAP-12-SP3-2020-242 SKIP SUSE-RU-2020:0243-1 as SUSE-SLE-SAP-12-SP2-2020-243 is not security or has no CVEs. patches: SUSE-2020-243,SUSE-SLE-SAP-12-SP2-2020-243 SKIP SUSE-RU-2020:0244-1 as SUSE-SLE-Module-Public-Cloud-12-2020-244 is not security or has no CVEs. patches: SUSE-2020-244,SUSE-SLE-Module-Public-Cloud-12-2020-244 SKIP SUSE-RU-2020:0245-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-245 is not security or has no CVEs. patches: SUSE-2020-245,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-245,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-245 SKIP SUSE-RU-2020:0246-1 as SUSE-SLE-HA-12-SP5-2020-246 is not security or has no CVEs. patches: SUSE-2020-246,SUSE-SLE-HA-12-SP4-2020-246,SUSE-SLE-HA-12-SP5-2020-246 SKIP SUSE-RU-2020:0248-1 as SUSE-2020-248 is not security or has no CVEs. patches: SUSE-2020-248,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-248 SKIP SUSE-RU-2020:0249-1 as SUSE-SUSE-Manager-Server-3.2-2020-249 is not security or has no CVEs. patches: SUSE-2020-249,SUSE-SUSE-Manager-Proxy-3.2-2020-249,SUSE-SUSE-Manager-Server-3.2-2020-249 SKIP SUSE-RU-2020:0250-1 as SUSE-SUSE-Manager-Server-3.2-2020-250 is not security or has no CVEs. patches: SUSE-2020-250,SUSE-SUSE-Manager-Proxy-3.2-2020-250,SUSE-SUSE-Manager-Server-3.2-2020-250 SKIP SUSE-RU-2020:0252-1 as SUSE-Storage-5-2020-252 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-252,SUSE-2020-252,SUSE-OpenStack-Cloud-7-2020-252,SUSE-OpenStack-Cloud-8-2020-252,SUSE-OpenStack-Cloud-Crowbar-8-2020-252,SUSE-SLE-DESKTOP-12-SP4-2020-252,SUSE-SLE-SAP-12-SP1-2020-252,SUSE-SLE-SAP-12-SP2-2020-252,SUSE-SLE-SAP-12-SP3-2020-252,SUSE-SLE-SERVER-12-SP1-2020-252,SUSE-SLE-SERVER-12-SP2-2020-252,SUSE-SLE-SERVER-12-SP2-BCL-2020-252,SUSE-SLE-SERVER-12-SP3-2020-252,SUSE-SLE-SERVER-12-SP3-BCL-2020-252,SUSE-SLE-SERVER-12-SP4-2020-252,SUSE-Storage-5-2020-252 SKIP SUSE-RU-2020:0253-1 as SUSE-2020-253 is not security or has no CVEs. patches: SUSE-2020-253,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-253 SKIP SUSE-RU-2020:0254-1 as SUSE-Storage-5-2020-254 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-254,SUSE-2020-254,SUSE-OpenStack-Cloud-8-2020-254,SUSE-OpenStack-Cloud-Crowbar-8-2020-254,SUSE-SLE-SAP-12-SP3-2020-254,SUSE-SLE-SERVER-12-SP3-2020-254,SUSE-SLE-SERVER-12-SP3-BCL-2020-254,SUSE-Storage-5-2020-254 SKIP SUSE-RU-2020:0256-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-256 is not security or has no CVEs. patches: SUSE-2020-256,SUSE-SLE-Module-Basesystem-15-SP1-2020-256,SUSE-SLE-Module-Development-Tools-15-SP1-2020-256,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-256 SKIP SUSE-RU-2020:0257-1 as SUSE-Storage-5-2020-257 is not security or has no CVEs. patches: SUSE-2020-257,SUSE-SLE-DESKTOP-12-SP4-2020-257,SUSE-SLE-Module-Public-Cloud-12-2020-257,SUSE-SLE-SAP-12-SP2-2020-257,SUSE-SLE-SAP-12-SP3-2020-257,SUSE-SLE-SERVER-12-SP2-2020-257,SUSE-SLE-SERVER-12-SP2-BCL-2020-257,SUSE-SLE-SERVER-12-SP3-2020-257,SUSE-SLE-SERVER-12-SP3-BCL-2020-257,SUSE-SLE-SERVER-12-SP4-2020-257,SUSE-SLE-SERVER-12-SP5-2020-257,SUSE-Storage-5-2020-257 SKIP SUSE-RU-2020:0258-1 as SUSE-SLE-Module-HPC-15-SP1-2020-258 is not security or has no CVEs. patches: SUSE-2020-258,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-258,SUSE-SLE-Module-HPC-15-2020-258,SUSE-SLE-Module-HPC-15-SP1-2020-258 SKIP SUSE-RU-2020:0259-1 as SUSE-SLE-SERVER-12-SP5-2020-259 is not security or has no CVEs. patches: SUSE-2020-259,SUSE-SLE-SERVER-12-SP4-2020-259,SUSE-SLE-SERVER-12-SP5-2020-259 SKIP SUSE-RU-2020:0268-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2020-268 is not security or has no CVEs. patches: SUSE-2020-268,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-268,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-268 SKIP SUSE-RU-2020:0270-1 as SUSE-SLE-Product-SLES_SAP-15-2020-270 is not security or has no CVEs. patches: SUSE-2020-270,SUSE-SLE-Module-Basesystem-15-2020-270,SUSE-SLE-Module-Development-Tools-OBS-15-2020-270,SUSE-SLE-Product-HPC-15-2020-270,SUSE-SLE-Product-SLES-15-2020-270,SUSE-SLE-Product-SLES_SAP-15-2020-270 SKIP SUSE-RU-2020:0271-1 as SUSE-SLE-Module-Python2-15-SP1-2020-271 is not security or has no CVEs. patches: SUSE-2020-271,SUSE-SLE-Module-Basesystem-15-SP1-2020-271,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-271,SUSE-SLE-Module-Python2-15-SP1-2020-271 SKIP SUSE-RU-2020:0272-1 as SUSE-SLE-SERVER-12-SP5-2020-272 is not security or has no CVEs. patches: SUSE-2020-272,SUSE-SLE-SDK-12-SP5-2020-272,SUSE-SLE-SERVER-12-SP5-2020-272 SKIP SUSE-RU-2020:0273-1 as SUSE-SLE-Product-HPC-15-2020-273 is not security or has no CVEs. patches: SUSE-2020-273,SUSE-SLE-Module-HPC-15-2020-273,SUSE-SLE-Product-HPC-15-2020-273 SKIP SUSE-RU-2020:0274-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-274 is not security or has no CVEs. patches: SUSE-2020-274,SUSE-SLE-Module-Desktop-Applications-15-2020-274,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-274,SUSE-SLE-Module-Development-Tools-OBS-15-2020-274,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-274 SKIP SUSE-RU-2020:0276-1 as SUSE-Storage-5-2020-276 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-276,SUSE-2020-276,SUSE-OpenStack-Cloud-7-2020-276,SUSE-OpenStack-Cloud-8-2020-276,SUSE-OpenStack-Cloud-Crowbar-8-2020-276,SUSE-SLE-SAP-12-SP2-2020-276,SUSE-SLE-SAP-12-SP3-2020-276,SUSE-SLE-SDK-12-SP4-2020-276,SUSE-SLE-SDK-12-SP5-2020-276,SUSE-SLE-SERVER-12-SP2-2020-276,SUSE-SLE-SERVER-12-SP2-BCL-2020-276,SUSE-SLE-SERVER-12-SP3-2020-276,SUSE-SLE-SERVER-12-SP3-BCL-2020-276,SUSE-SLE-SERVER-12-SP4-2020-276,SUSE-SLE-SERVER-12-SP5-2020-276,SUSE-Storage-5-2020-276 SKIP SUSE-RU-2020:0279-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-279 is not security or has no CVEs. patches: SUSE-2020-279,SUSE-SLE-Module-Basesystem-15-SP1-2020-279,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-279 SKIP SUSE-RU-2020:0279-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-279 is not security or has no CVEs. patches: SUSE-2020-279,SUSE-SLE-Module-Basesystem-15-SP2-2020-279,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-279,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-279 SKIP SUSE-RU-2020:0280-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-280 is not security or has no CVEs. patches: SUSE-2020-280,SUSE-SLE-Module-Basesystem-15-SP1-2020-280 SKIP SUSE-RU-2020:0282-1 as SUSE-SLE-Product-HA-15-SP1-2020-282 is not security or has no CVEs. patches: SUSE-2020-282,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-282,SUSE-SLE-Product-HA-15-SP1-2020-282 SKIP SUSE-RU-2020:0285-1 as SUSE-2020-285 is not security or has no CVEs. patches: SUSE-2020-285,SUSE-SLE-Manager-Tools-15-2020-285 SKIP SUSE-RU-2020:0292-1 as SUSE-2020-292 is not security or has no CVEs. patches: SUSE-2020-292,SUSE-SLE-Manager-Tools-12-2020-292 SKIP SUSE-RU-2020:0294-1 as SUSE-2020-294 is not security or has no CVEs. patches: SUSE-2020-294,SUSE-SLE-Manager-Tools-15-2020-294 SKIP SUSE-RU-2020:0295-1 as SUSE-2020-295 is not security or has no CVEs. patches: SUSE-2020-295,SUSE-SLE-Manager-Tools-12-2020-295 SKIP SUSE-RU-2020:0298-1 as SUSE-Storage-6-2020-298 is not security or has no CVEs. patches: SUSE-2020-298,SUSE-Storage-6-2020-298 SKIP SUSE-RU-2020:0299-1 as SUSE-SLE-Module-Public-Cloud-12-2020-299 is not security or has no CVEs. patches: SUSE-2020-299,SUSE-SLE-Module-Public-Cloud-12-2020-299 SKIP SUSE-RU-2020:0301-1 as SUSE-SLE-Product-SLES_SAP-15-2020-301 is not security or has no CVEs. patches: SUSE-2020-301,SUSE-SLE-Module-Development-Tools-OBS-15-2020-301,SUSE-SLE-Module-Web-Scripting-15-2020-301,SUSE-SLE-Product-HPC-15-2020-301,SUSE-SLE-Product-SLES-15-2020-301,SUSE-SLE-Product-SLES_SAP-15-2020-301 SKIP SUSE-RU-2020:0303-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-303 is not security or has no CVEs. patches: SUSE-2020-303,SUSE-SLE-Module-Basesystem-15-2020-303,SUSE-SLE-Module-Basesystem-15-SP1-2020-303 SKIP SUSE-RU-2020:0304-1 as SUSE-Storage-5-2020-304 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-304,SUSE-2020-304,SUSE-OpenStack-Cloud-8-2020-304,SUSE-OpenStack-Cloud-Crowbar-8-2020-304,SUSE-SLE-DESKTOP-12-SP4-2020-304,SUSE-SLE-SAP-12-SP3-2020-304,SUSE-SLE-SDK-12-SP4-2020-304,SUSE-SLE-SERVER-12-SP3-2020-304,SUSE-SLE-SERVER-12-SP3-BCL-2020-304,SUSE-SLE-SERVER-12-SP4-2020-304,SUSE-Storage-5-2020-304 SKIP SUSE-RU-2020:0305-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-305 is not security or has no CVEs. patches: SUSE-2020-305,SUSE-OpenStack-Cloud-7-2020-305,SUSE-SLE-SAP-12-SP2-2020-305,SUSE-SLE-SERVER-12-SP2-2020-305,SUSE-SLE-SERVER-12-SP2-BCL-2020-305 SKIP SUSE-RU-2020:0306-1 as SUSE-SLE-SAP-12-SP2-2020-306 is not security or has no CVEs. patches: SUSE-2020-306,SUSE-SLE-SAP-12-SP1-2020-306,SUSE-SLE-SAP-12-SP2-2020-306 SKIP SUSE-RU-2020:0307-1 as SUSE-SLE-SAP-12-SP5-2020-307 is not security or has no CVEs. patches: SUSE-2020-307,SUSE-SLE-SAP-12-SP3-2020-307,SUSE-SLE-SAP-12-SP4-2020-307,SUSE-SLE-SAP-12-SP5-2020-307 SKIP SUSE-RU-2020:0308-1 as SUSE-SLE-SERVER-12-SP5-2020-308 is not security or has no CVEs. patches: SUSE-2020-308,SUSE-SLE-DESKTOP-12-SP4-2020-308,SUSE-SLE-HA-12-SP4-2020-308,SUSE-SLE-HA-12-SP5-2020-308,SUSE-SLE-SDK-12-SP4-2020-308,SUSE-SLE-SDK-12-SP5-2020-308,SUSE-SLE-SERVER-12-SP4-2020-308,SUSE-SLE-SERVER-12-SP5-2020-308 SKIP SUSE-RU-2020:0309-1 as SUSE-2020-309 is not security or has no CVEs. patches: SUSE-2020-309,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-309 SKIP SUSE-RU-2020:0312-1 as SUSE-SLE-SERVER-12-SP1-2020-312 is not security or has no CVEs. patches: SUSE-2020-312,SUSE-SLE-SAP-12-SP1-2020-312,SUSE-SLE-SERVER-12-SP1-2020-312 SKIP SUSE-RU-2020:0313-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-313 is not security or has no CVEs. patches: SUSE-2020-313,SUSE-SLE-SDK-12-SP5-2020-313,SUSE-SLE-SERVER-12-SP5-2020-313,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-313 SKIP SUSE-RU-2020:0314-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-314 is not security or has no CVEs. patches: SUSE-2020-314,SUSE-SLE-Module-Basesystem-15-2020-314,SUSE-SLE-Module-Basesystem-15-SP1-2020-314,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-314 SKIP SUSE-RU-2020:0315-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-315 is not security or has no CVEs. patches: SUSE-2020-315,SUSE-SLE-INSTALLER-15-SP1-2020-315,SUSE-SLE-Module-Basesystem-15-SP1-2020-315 SKIP SUSE-RU-2020:0316-1 as SUSE-SLE-Module-Development-Tools-15-2020-316 is not security or has no CVEs. patches: SUSE-2020-316,SUSE-SLE-Module-Development-Tools-15-2020-316,SUSE-SLE-Module-Development-Tools-OBS-15-2020-316 SKIP SUSE-RU-2020:0321-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-321 is not security or has no CVEs. patches: SUSE-2020-321,SUSE-SLE-Module-Basesystem-15-SP1-2020-321,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-321 SKIP SUSE-RU-2020:0322-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-322 is not security or has no CVEs. patches: SUSE-2020-322,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-322 SKIP SUSE-RU-2020:0323-1 as SUSE-SLE-SERVER-12-SP5-2020-323 is not security or has no CVEs. patches: SUSE-2020-323,SUSE-SLE-SDK-12-SP5-2020-323,SUSE-SLE-SERVER-12-SP5-2020-323 SKIP SUSE-RU-2020:0325-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-325 is not security or has no CVEs. patches: SUSE-2020-325,SUSE-SLE-Module-Basesystem-15-SP1-2020-325 SKIP SUSE-RU-2020:0326-1 as SUSE-SLE-Module-Public-Cloud-12-2020-326 is not security or has no CVEs. patches: SUSE-2020-326,SUSE-SLE-Module-Public-Cloud-12-2020-326 SKIP SUSE-RU-2020:0327-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-327 is not security or has no CVEs. patches: SUSE-2020-327,SUSE-SLE-Module-Basesystem-15-SP1-2020-327,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-327 SKIP SUSE-RU-2020:0328-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-328 is not security or has no CVEs. patches: SUSE-2020-328,SUSE-SLE-Module-Basesystem-15-SP1-2020-328 SKIP SUSE-RU-2020:0330-1 as SUSE-SLE-Module-Basesystem-15-2020-330 is not security or has no CVEs. patches: SUSE-2020-330,SUSE-SLE-Module-Basesystem-15-2020-330 SKIP SUSE-RU-2020:0332-1 as SUSE-SLE-SERVER-12-SP5-2020-332 is not security or has no CVEs. patches: SUSE-2020-332,SUSE-SLE-DESKTOP-12-SP4-2020-332,SUSE-SLE-SERVER-12-SP4-2020-332,SUSE-SLE-SERVER-12-SP5-2020-332 SKIP SUSE-RU-2020:0333-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-333 is not security or has no CVEs. patches: SUSE-2020-333,SUSE-SLE-Module-Basesystem-15-SP1-2020-333 SKIP SUSE-RU-2020:0336-1 as SUSE-SLE-Product-SLES_SAP-15-2020-336 is not security or has no CVEs. patches: SUSE-2020-336,SUSE-SLE-Module-Basesystem-15-2020-336,SUSE-SLE-Module-Basesystem-15-SP1-2020-336,SUSE-SLE-Module-Desktop-Applications-15-2020-336,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-336,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-336,SUSE-SLE-Product-HPC-15-2020-336,SUSE-SLE-Product-SLES-15-2020-336,SUSE-SLE-Product-SLES_SAP-15-2020-336 SKIP SUSE-RU-2020:0337-1 as SUSE-SLE-SERVER-12-SP5-2020-337 is not security or has no CVEs. patches: SUSE-2020-337,SUSE-SLE-SDK-12-SP4-2020-337,SUSE-SLE-SDK-12-SP5-2020-337,SUSE-SLE-SERVER-12-SP4-2020-337,SUSE-SLE-SERVER-12-SP5-2020-337 SKIP SUSE-RU-2020:0337-2 as SUSE-Storage-5-2020-337 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-337,SUSE-2020-337,SUSE-OpenStack-Cloud-7-2020-337,SUSE-OpenStack-Cloud-8-2020-337,SUSE-OpenStack-Cloud-Crowbar-8-2020-337,SUSE-SLE-SAP-12-SP2-2020-337,SUSE-SLE-SAP-12-SP3-2020-337,SUSE-SLE-SERVER-12-SP2-2020-337,SUSE-SLE-SERVER-12-SP2-BCL-2020-337,SUSE-SLE-SERVER-12-SP3-2020-337,SUSE-SLE-SERVER-12-SP3-BCL-2020-337,SUSE-Storage-5-2020-337 SKIP SUSE-RU-2020:0338-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-338 is not security or has no CVEs. patches: SUSE-2020-338,SUSE-SLE-Module-Basesystem-15-SP1-2020-338 SKIP SUSE-RU-2020:0339-1 as SUSE-SLE-Module-Legacy-15-SP1-2020-339 is not security or has no CVEs. patches: SUSE-2020-339,SUSE-SLE-Module-Basesystem-15-2020-339,SUSE-SLE-Module-Basesystem-15-SP1-2020-339,SUSE-SLE-Module-Development-Tools-15-2020-339,SUSE-SLE-Module-Development-Tools-15-SP1-2020-339,SUSE-SLE-Module-Development-Tools-OBS-15-2020-339,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-339,SUSE-SLE-Module-Legacy-15-2020-339,SUSE-SLE-Module-Legacy-15-SP1-2020-339 SKIP SUSE-RU-2020:0340-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-340 is not security or has no CVEs. patches: SUSE-2020-340,SUSE-SLE-Module-Basesystem-15-SP1-2020-340 SKIP SUSE-RU-2020:0341-1 as SUSE-SLE-Product-WE-15-SP1-2020-341 is not security or has no CVEs. patches: SUSE-2020-341,SUSE-SLE-Module-Basesystem-15-SP1-2020-341,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-341,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-341,SUSE-SLE-Product-WE-15-SP1-2020-341 SKIP SUSE-RU-2020:0342-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-342 is not security or has no CVEs. patches: SUSE-2020-342,SUSE-SLE-Module-Basesystem-15-SP1-2020-342 SKIP SUSE-RU-2020:0343-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-343 is not security or has no CVEs. patches: SUSE-2020-343,SUSE-SLE-Module-SAP-Applications-15-2020-343,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-343 SKIP SUSE-RU-2020:0344-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-344 is not security or has no CVEs. patches: SUSE-2020-344,SUSE-SLE-Module-Development-Tools-15-SP1-2020-344,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-344 SKIP SUSE-RU-2020:0345-1 as SUSE-SLE-SERVER-12-SP5-2020-345 is not security or has no CVEs. patches: SUSE-2020-345,SUSE-SLE-SERVER-12-SP5-2020-345 SKIP SUSE-RU-2020:0354-1 as SUSE-SLE-SERVER-12-SP5-2020-354 is not security or has no CVEs. patches: SUSE-2020-354,SUSE-SLE-HA-12-SP5-2020-354,SUSE-SLE-SDK-12-SP5-2020-354,SUSE-SLE-SERVER-12-SP5-2020-354 SKIP SUSE-RU-2020:0361-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-361 is not security or has no CVEs. patches: SUSE-2020-361,SUSE-SLE-Module-Basesystem-15-SP1-2020-361 SKIP SUSE-RU-2020:0362-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-362 is not security or has no CVEs. patches: SUSE-2020-362,SUSE-SLE-Module-Basesystem-15-SP1-2020-362,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-362,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-362 SKIP SUSE-RU-2020:0363-1 as SUSE-SLE-SERVER-12-SP5-2020-363 is not security or has no CVEs. patches: SUSE-2020-363,SUSE-SLE-SERVER-12-SP5-2020-363 SKIP SUSE-RU-2020:0364-1 as SUSE-Storage-5-2020-364 is not security or has no CVEs. patches: SUSE-2020-364,SUSE-Storage-5-2020-364 SKIP SUSE-RU-2020:0365-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-365 is not security or has no CVEs. patches: SUSE-2020-365,SUSE-SLE-Module-Basesystem-15-SP1-2020-365,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-365 SKIP SUSE-RU-2020:0365-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-365 is not security or has no CVEs. patches: SUSE-2020-365,SUSE-SLE-Module-Basesystem-15-SP2-2020-365,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-365,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-365 SKIP SUSE-RU-2020:0366-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-366 is not security or has no CVEs. patches: SUSE-2020-366,SUSE-SLE-Module-Basesystem-15-SP1-2020-366 SKIP SUSE-RU-2020:0367-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-367 is not security or has no CVEs. patches: SUSE-2020-367,SUSE-SLE-Module-Basesystem-15-SP1-2020-367 SKIP SUSE-RU-2020:0368-1 as SUSE-SLE-Product-HA-15-SP1-2020-368 is not security or has no CVEs. patches: SUSE-2020-368,SUSE-SLE-Module-Basesystem-15-SP1-2020-368,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-368,SUSE-SLE-Product-HA-15-SP1-2020-368 SKIP SUSE-RU-2020:0374-1 as SUSE-Storage-5-2020-374 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-374,SUSE-2020-374,SUSE-OpenStack-Cloud-8-2020-374,SUSE-OpenStack-Cloud-Crowbar-8-2020-374,SUSE-SLE-SAP-12-SP3-2020-374,SUSE-SLE-SERVER-12-SP3-2020-374,SUSE-SLE-SERVER-12-SP3-BCL-2020-374,SUSE-SLE-SERVER-12-SP4-2020-374,SUSE-SLE-SERVER-12-SP5-2020-374,SUSE-Storage-5-2020-374 SKIP SUSE-RU-2020:0377-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-377 is not security or has no CVEs. patches: SUSE-2020-377,SUSE-SLE-SERVER-12-SP5-2020-377,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-377 SKIP SUSE-RU-2020:0378-1 as SUSE-SLE-SERVER-12-SP5-2020-378 is not security or has no CVEs. patches: SUSE-2020-378,SUSE-SLE-SERVER-12-SP5-2020-378 SKIP SUSE-RU-2020:0379-1 as SUSE-SLE-SERVER-12-SP5-2020-379 is not security or has no CVEs. patches: SUSE-2020-379,SUSE-SLE-DESKTOP-12-SP4-2020-379,SUSE-SLE-SERVER-12-SP4-2020-379,SUSE-SLE-SERVER-12-SP5-2020-379 SKIP SUSE-RU-2020:0381-1 as SUSE-Storage-6-2020-381 is not security or has no CVEs. patches: SUSE-2020-381,SUSE-Storage-6-2020-381 SKIP SUSE-RU-2020:0382-1 as SUSE-SLE-SERVER-12-SP5-2020-382 is not security or has no CVEs. patches: SUSE-2020-382,SUSE-SLE-HA-12-SP4-2020-382,SUSE-SLE-HA-12-SP5-2020-382,SUSE-SLE-SDK-12-SP4-2020-382,SUSE-SLE-SDK-12-SP5-2020-382,SUSE-SLE-SERVER-12-SP4-2020-382,SUSE-SLE-SERVER-12-SP5-2020-382 SKIP SUSE-RU-2020:0386-1 as SUSE-SLE-Module-Containers-15-SP1-2020-386 is not security or has no CVEs. patches: SUSE-2020-386,SUSE-SLE-Module-Containers-15-SP1-2020-386 SKIP SUSE-RU-2020:0392-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2020-392 is not security or has no CVEs. patches: SUSE-2020-392,SUSE-SLE-Live-Patching-12-2020-391,SUSE-SLE-Live-Patching-12-SP3-2020-391,SUSE-SLE-Live-Patching-12-SP4-2020-391,SUSE-SLE-Live-Patching-12-SP5-2020-391,SUSE-SLE-Module-Live-Patching-15-SP1-2020-392 SKIP SUSE-RU-2020:0395-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-395 is not security or has no CVEs. patches: SUSE-2020-395,SUSE-SLE-Module-Basesystem-15-SP1-2020-395,SUSE-SLE-Module-Development-Tools-15-SP1-2020-395,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-395 SKIP SUSE-RU-2020:0398-1 as SUSE-SLE-Module-HPC-15-SP1-2020-398 is not security or has no CVEs. patches: SUSE-2020-398,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-398,SUSE-SLE-Module-HPC-15-SP1-2020-398 SKIP SUSE-RU-2020:0399-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-399 is not security or has no CVEs. patches: SUSE-2020-399,SUSE-SLE-SERVER-12-SP4-2020-399,SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-399 SKIP SUSE-RU-2020:0401-1 as SUSE-SLE-SERVER-12-SP5-2020-401 is not security or has no CVEs. patches: SUSE-2020-401,SUSE-SLE-SERVER-12-SP4-2020-401,SUSE-SLE-SERVER-12-SP5-2020-401 SKIP SUSE-RU-2020:0402-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-402 is not security or has no CVEs. patches: SUSE-2020-402,SUSE-SLE-Module-Basesystem-15-SP1-2020-402 SKIP SUSE-RU-2020:0403-1 as SUSE-SLE-SERVER-12-SP5-2020-403 is not security or has no CVEs. patches: SUSE-2020-403,SUSE-SLE-SDK-12-SP4-2020-403,SUSE-SLE-SDK-12-SP5-2020-403,SUSE-SLE-SERVER-12-SP4-2020-403,SUSE-SLE-SERVER-12-SP5-2020-403 SKIP SUSE-RU-2020:0404-1 as SUSE-SLE-SERVER-12-SP5-2020-404 is not security or has no CVEs. patches: SUSE-2020-404,SUSE-SLE-DESKTOP-12-SP4-2020-404,SUSE-SLE-SDK-12-SP4-2020-404,SUSE-SLE-SDK-12-SP5-2020-404,SUSE-SLE-SERVER-12-SP4-2020-404,SUSE-SLE-SERVER-12-SP5-2020-404 SKIP SUSE-RU-2020:0414-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-414 is not security or has no CVEs. patches: SUSE-2020-414,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-414,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-414 SKIP SUSE-RU-2020:0415-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-415 is not security or has no CVEs. patches: SUSE-2020-415,SUSE-SLE-Module-Basesystem-15-SP1-2020-415,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-415 SKIP SUSE-RU-2020:0416-1 as SUSE-SLE-SERVER-12-SP5-2020-416 is not security or has no CVEs. patches: SUSE-2020-416,SUSE-SLE-SERVER-12-SP4-2020-416,SUSE-SLE-SERVER-12-SP5-2020-416 SKIP SUSE-RU-2020:0417-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-417 is not security or has no CVEs. patches: SUSE-2020-417,SUSE-SLE-Module-Basesystem-15-SP1-2020-417 SKIP SUSE-RU-2020:0418-1 as SUSE-SLE-Product-SLES_SAP-15-2020-418 is not security or has no CVEs. patches: SUSE-2020-418,SUSE-SLE-Module-Basesystem-15-2020-418,SUSE-SLE-Module-Development-Tools-OBS-15-2020-418,SUSE-SLE-Product-HPC-15-2020-418,SUSE-SLE-Product-SLES-15-2020-418,SUSE-SLE-Product-SLES_SAP-15-2020-418 SKIP SUSE-RU-2020:0421-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-421 is not security or has no CVEs. patches: SUSE-2020-421,SUSE-SLE-Module-Basesystem-15-SP1-2020-421,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-421,SUSE-SLE-Module-Server-Applications-15-SP1-2020-421 SKIP SUSE-RU-2020:0425-1 as SUSE-SLE-Module-HPC-15-SP1-2020-425 is not security or has no CVEs. patches: SUSE-2020-425,SUSE-SLE-Module-HPC-15-SP1-2020-425 SKIP SUSE-RU-2020:0430-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-430 is not security or has no CVEs. patches: SUSE-2020-430,SUSE-SLE-Module-Development-Tools-15-SP1-2020-430 SKIP SUSE-RU-2020:0431-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-431 is not security or has no CVEs. patches: SUSE-2020-431,SUSE-SLE-Module-Basesystem-15-SP1-2020-431,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-431 SKIP SUSE-RU-2020:0441-1 as SUSE-SLE-SERVER-12-SP4-2020-441 is not security or has no CVEs. patches: SUSE-2020-441,SUSE-SLE-SERVER-12-SP4-2020-441 SKIP SUSE-RU-2020:0444-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-444 is not security or has no CVEs. patches: SUSE-2020-444,SUSE-SLE-Module-Basesystem-15-SP1-2020-444,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-444 SKIP SUSE-RU-2020:0445-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-445 is not security or has no CVEs. patches: SUSE-2020-445,SUSE-SLE-Module-Development-Tools-15-SP1-2020-445,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-445 SKIP SUSE-RU-2020:0446-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-446 is not security or has no CVEs. patches: SUSE-2020-446,SUSE-SLE-Module-Basesystem-15-SP1-2020-446 SKIP SUSE-RU-2020:0447-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-447 is not security or has no CVEs. patches: SUSE-2020-447,SUSE-SLE-Module-Basesystem-15-SP1-2020-447 SKIP SUSE-RU-2020:0448-1 as SUSE-SLE-SERVER-12-SP5-2020-448 is not security or has no CVEs. patches: SUSE-2020-448,SUSE-SLE-DESKTOP-12-SP4-2020-448,SUSE-SLE-SERVER-12-SP4-2020-448,SUSE-SLE-SERVER-12-SP5-2020-448 SKIP SUSE-RU-2020:0449-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-449 is not security or has no CVEs. patches: SUSE-2020-449,SUSE-SLE-Module-Basesystem-15-SP1-2020-449 SKIP SUSE-RU-2020:0450-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-450 is not security or has no CVEs. patches: SUSE-2020-450,SUSE-SLE-Module-Basesystem-15-SP1-2020-450 SKIP SUSE-RU-2020:0451-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-451 is not security or has no CVEs. patches: SUSE-2020-451,SUSE-SLE-Module-Basesystem-15-SP1-2020-451,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-451 SKIP SUSE-RU-2020:0452-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-452 is not security or has no CVEs. patches: SUSE-2020-452,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-452,SUSE-SLE-Module-Server-Applications-15-SP1-2020-452 SKIP SUSE-RU-2020:0453-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-453 is not security or has no CVEs. patches: SUSE-2020-453,SUSE-SLE-Module-Basesystem-15-SP1-2020-453,SUSE-SLE-Module-Development-Tools-15-SP1-2020-453,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-453,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-453 SKIP SUSE-RU-2020:0460-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-460 is not security or has no CVEs. patches: SUSE-2020-460,SUSE-SLE-Module-Development-Tools-15-SP1-2020-460,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-460 SKIP SUSE-RU-2020:0461-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-461 is not security or has no CVEs. patches: SUSE-2020-461,SUSE-SLE-Module-Basesystem-15-SP1-2020-461 SKIP SUSE-RU-2020:0462-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-462 is not security or has no CVEs. patches: SUSE-2020-462,SUSE-SLE-Module-Basesystem-15-SP1-2020-462 SKIP SUSE-RU-2020:0463-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-463 is not security or has no CVEs. patches: SUSE-2020-463,SUSE-SLE-Module-Development-Tools-15-SP1-2020-463 SKIP SUSE-RU-2020:0464-1 as SUSE-SLE-HA-12-SP3-2020-464 is not security or has no CVEs. patches: SUSE-2020-464,SUSE-SLE-HA-12-SP3-2020-464 SKIP SUSE-RU-2020:0465-1 as SUSE-SLE-HA-12-SP5-2020-465 is not security or has no CVEs. patches: SUSE-2020-465,SUSE-SLE-HA-12-SP4-2020-465,SUSE-SLE-HA-12-SP5-2020-465 SKIP SUSE-RU-2020:0469-1 as SUSE-Storage-5-2020-469 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-469,SUSE-2020-469,SUSE-OpenStack-Cloud-7-2020-469,SUSE-OpenStack-Cloud-8-2020-469,SUSE-OpenStack-Cloud-Crowbar-8-2020-469,SUSE-SLE-SAP-12-SP1-2020-469,SUSE-SLE-SAP-12-SP2-2020-469,SUSE-SLE-SAP-12-SP3-2020-469,SUSE-SLE-SDK-12-SP4-2020-469,SUSE-SLE-SDK-12-SP5-2020-469,SUSE-SLE-SERVER-12-SP1-2020-469,SUSE-SLE-SERVER-12-SP2-2020-469,SUSE-SLE-SERVER-12-SP2-BCL-2020-469,SUSE-SLE-SERVER-12-SP3-2020-469,SUSE-SLE-SERVER-12-SP3-BCL-2020-469,SUSE-SLE-SERVER-12-SP4-2020-469,SUSE-SLE-SERVER-12-SP5-2020-469,SUSE-Storage-5-2020-469 SKIP SUSE-RU-2020:0470-1 as SUSE-SLE-Product-HA-15-SP1-2020-470 is not security or has no CVEs. patches: SUSE-2020-470,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-470,SUSE-SLE-Product-HA-15-SP1-2020-470 SKIP SUSE-RU-2020:0471-1 as SUSE-SLE-Product-HA-15-2020-471 is not security or has no CVEs. patches: SUSE-2020-471,SUSE-SLE-Product-HA-15-2020-471 SKIP SUSE-RU-2020:0475-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-475 is not security or has no CVEs. patches: SUSE-2020-475,SUSE-SLE-Module-Basesystem-15-SP1-2020-475,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-475 SKIP SUSE-RU-2020:0475-2 as SUSE-SLE-Product-SLES_SAP-15-2020-475 is not security or has no CVEs. patches: SUSE-2020-475,SUSE-SLE-Product-HPC-15-2020-475,SUSE-SLE-Product-SLES-15-2020-475,SUSE-SLE-Product-SLES_SAP-15-2020-475 SKIP SUSE-RU-2020:0476-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-476 is not security or has no CVEs. patches: SUSE-2020-476,SUSE-SLE-Module-Basesystem-15-SP1-2020-476,SUSE-SLE-Module-Development-Tools-15-SP1-2020-476,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-476 SKIP SUSE-RU-2020:0477-1 as SUSE-SLE-SDK-12-SP5-2020-477 is not security or has no CVEs. patches: SUSE-2020-477,SUSE-SLE-SDK-12-SP5-2020-477 SKIP SUSE-RU-2020:0478-1 as SUSE-SLE-Product-HA-15-SP1-2020-478 is not security or has no CVEs. patches: SUSE-2020-478,SUSE-SLE-Product-HA-15-SP1-2020-478 SKIP SUSE-RU-2020:0479-1 as SUSE-SLE-SERVER-12-SP5-2020-479 is not security or has no CVEs. patches: SUSE-2020-479,SUSE-SLE-SERVER-12-SP5-2020-479 SKIP SUSE-RU-2020:0480-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-480 is not security or has no CVEs. patches: SUSE-2020-480,SUSE-SLE-Module-Basesystem-15-SP1-2020-480,SUSE-SLE-Module-Development-Tools-15-SP1-2020-480,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-480 SKIP SUSE-RU-2020:0481-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-481 is not security or has no CVEs. patches: SUSE-2020-481,SUSE-SLE-Module-Basesystem-15-SP1-2020-481 SKIP SUSE-RU-2020:0482-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-482 is not security or has no CVEs. patches: SUSE-2020-482,SUSE-SLE-Module-Basesystem-15-SP1-2020-482,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-482 SKIP SUSE-RU-2020:0483-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-483 is not security or has no CVEs. patches: SUSE-2020-483,SUSE-SLE-Module-Basesystem-15-SP1-2020-483,SUSE-SLE-Module-Server-Applications-15-SP1-2020-483 SKIP SUSE-RU-2020:0484-1 as SUSE-Storage-5-2020-484 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-484,SUSE-2020-484,SUSE-OpenStack-Cloud-8-2020-484,SUSE-OpenStack-Cloud-Crowbar-8-2020-484,SUSE-SLE-SAP-12-SP3-2020-484,SUSE-SLE-SERVER-12-SP3-2020-484,SUSE-SLE-SERVER-12-SP3-BCL-2020-484,SUSE-Storage-5-2020-484 SKIP SUSE-RU-2020:0485-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-485 is not security or has no CVEs. patches: SUSE-2020-485,SUSE-SLE-Module-Basesystem-15-SP1-2020-485,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-485 SKIP SUSE-RU-2020:0486-1 as SUSE-2020-486 is not security or has no CVEs. patches: SUSE-2020-486,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-486 SKIP SUSE-RU-2020:0492-1 as SUSE-SLE-Module-Basesystem-15-2020-492 is not security or has no CVEs. patches: SUSE-2020-492,SUSE-SLE-Module-Basesystem-15-2020-492 SKIP SUSE-RU-2020:0494-1 as SUSE-SLE-SERVER-12-SP4-2020-494 is not security or has no CVEs. patches: SUSE-2020-494,SUSE-SLE-SDK-12-SP4-2020-494,SUSE-SLE-SERVER-12-SP4-2020-494 SKIP SUSE-RU-2020:0498-1 as SUSE-SLE-Module-Python2-15-SP1-2020-498 is not security or has no CVEs. patches: SUSE-2020-498,SUSE-SLE-Module-Basesystem-15-SP1-2020-498,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-498,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-498,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-498,SUSE-SLE-Module-Python2-15-SP1-2020-498 SKIP SUSE-RU-2020:0499-1 as SUSE-SLE-SERVER-12-SP5-2020-499 is not security or has no CVEs. patches: SUSE-2020-499,SUSE-SLE-SERVER-12-SP5-2020-499 SKIP SUSE-RU-2020:0500-1 as SUSE-SLE-SERVER-12-SP5-2020-500 is not security or has no CVEs. patches: SUSE-2020-500,SUSE-SLE-SDK-12-SP5-2020-500,SUSE-SLE-SERVER-12-SP5-2020-500 SKIP SUSE-RU-2020:0502-1 as SUSE-SLE-POS-12-SP2-2020-502 is not security or has no CVEs. patches: SUSE-2020-502,SUSE-SLE-POS-12-SP2-2020-502 SKIP SUSE-RU-2020:0503-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-503 is not security or has no CVEs. patches: SUSE-2020-503,SUSE-SLE-Module-Basesystem-15-SP1-2020-503 SKIP SUSE-RU-2020:0506-1 as SUSE-SLE-SERVER-12-SP5-2020-506 is not security or has no CVEs. patches: SUSE-2020-506,SUSE-SLE-SERVER-12-SP5-2020-506 SKIP SUSE-RU-2020:0507-1 as SUSE-Storage-5-2020-507 is not security or has no CVEs. patches: SUSE-2020-507,SUSE-Storage-5-2020-507 SKIP SUSE-RU-2020:0508-1 as SUSE-SLE-SERVER-12-SP4-2020-508 is not security or has no CVEs. patches: SUSE-2020-508,SUSE-SLE-SERVER-12-SP4-2020-508 SKIP SUSE-RU-2020:0509-1 as SUSE-SLE-Module-Server-Applications-15-2020-509 is not security or has no CVEs. patches: SUSE-2020-509,SUSE-SLE-Module-Development-Tools-OBS-15-2020-509,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-509,SUSE-SLE-Module-Server-Applications-15-2020-509 SKIP SUSE-RU-2020:0513-1 as SUSE-SLE-SERVER-12-SP5-2020-513 is not security or has no CVEs. patches: SUSE-2020-513,SUSE-SLE-SAP-12-SP5-2020-513,SUSE-SLE-SERVER-12-SP5-2020-513 SKIP SUSE-RU-2020:0514-1 as SUSE-SLE-WE-12-SP5-2020-514 is not security or has no CVEs. patches: SUSE-2020-514,SUSE-SLE-WE-12-SP4-2020-514,SUSE-SLE-WE-12-SP5-2020-514 SKIP SUSE-RU-2020:0517-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-517 is not security or has no CVEs. patches: SUSE-2020-517,SUSE-SLE-Module-Basesystem-15-SP1-2020-517,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-517 SKIP SUSE-RU-2020:0518-1 as SUSE-SLE-SDK-12-SP5-2020-518 is not security or has no CVEs. patches: SUSE-2020-518,SUSE-SLE-SDK-12-SP4-2020-518,SUSE-SLE-SDK-12-SP5-2020-518 SKIP SUSE-RU-2020:0521-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-521 is not security or has no CVEs. patches: SUSE-2020-521,SUSE-SLE-Module-Basesystem-15-2020-521,SUSE-SLE-Module-Basesystem-15-SP1-2020-521,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-521 SKIP SUSE-RU-2020:0524-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-524 is not security or has no CVEs. patches: SUSE-2020-524,SUSE-SLE-Module-Development-Tools-15-SP1-2020-524 SKIP SUSE-RU-2020:0525-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-525 is not security or has no CVEs. patches: SUSE-2020-525,SUSE-SLE-Module-Basesystem-15-SP1-2020-525,SUSE-SLE-Module-Development-Tools-15-SP1-2020-525 SKIP SUSE-RU-2020:0526-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-526 is not security or has no CVEs. patches: SUSE-2020-526,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-526,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-526 SKIP SUSE-RU-2020:0529-1 as SUSE-SLE-WE-12-SP5-2020-529 is not security or has no CVEs. patches: SUSE-2020-529,SUSE-SLE-DESKTOP-12-SP4-2020-529,SUSE-SLE-SDK-12-SP4-2020-529,SUSE-SLE-SDK-12-SP5-2020-529,SUSE-SLE-WE-12-SP4-2020-529,SUSE-SLE-WE-12-SP5-2020-529 SKIP SUSE-RU-2020:0530-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-530 is not security or has no CVEs. patches: SUSE-2020-530,SUSE-SLE-INSTALLER-15-SP1-2020-530,SUSE-SLE-Module-Basesystem-15-SP1-2020-530,SUSE-SLE-Module-Development-Tools-15-SP1-2020-530,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-530 SKIP SUSE-RU-2020:0537-1 as SUSE-SLE-Manager-Tools-12-2020-537 is not security or has no CVEs. patches: SUSE-2020-537,SUSE-SLE-Manager-Tools-12-2020-537 SKIP SUSE-RU-2020:0539-1 as SUSE-2020-539 is not security or has no CVEs. patches: SUSE-2020-539,SUSE-SLE-Manager-Tools-15-2020-539 SKIP SUSE-RU-2020:0548-1 as SUSE-2020-548 is not security or has no CVEs. patches: SUSE-2020-548,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-548 SKIP SUSE-RU-2020:0549-1 as SUSE-SLE-Product-SLES_SAP-15-2020-549 is not security or has no CVEs. patches: SUSE-2020-549,SUSE-SLE-Module-Basesystem-15-2020-549,SUSE-SLE-Module-Development-Tools-OBS-15-2020-549,SUSE-SLE-Product-HPC-15-2020-549,SUSE-SLE-Product-SLES-15-2020-549,SUSE-SLE-Product-SLES_SAP-15-2020-549 SKIP SUSE-RU-2020:0550-1 as SUSE-2020-550 is not security or has no CVEs. patches: SUSE-2020-550,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-550 SKIP SUSE-RU-2020:0553-1 as SUSE-SLE-SERVER-12-SP4-2020-553 is not security or has no CVEs. patches: SUSE-2020-553,SUSE-SLE-SERVER-12-SP4-2020-553 SKIP SUSE-RU-2020:0554-1 as SUSE-Storage-5-2020-554 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-554,SUSE-2020-554,SUSE-OpenStack-Cloud-7-2020-554,SUSE-OpenStack-Cloud-8-2020-554,SUSE-OpenStack-Cloud-Crowbar-8-2020-554,SUSE-SLE-DESKTOP-12-SP4-2020-554,SUSE-SLE-SAP-12-SP1-2020-554,SUSE-SLE-SAP-12-SP2-2020-554,SUSE-SLE-SAP-12-SP3-2020-554,SUSE-SLE-SERVER-12-SP1-2020-554,SUSE-SLE-SERVER-12-SP2-2020-554,SUSE-SLE-SERVER-12-SP2-BCL-2020-554,SUSE-SLE-SERVER-12-SP3-2020-554,SUSE-SLE-SERVER-12-SP3-BCL-2020-554,SUSE-SLE-SERVER-12-SP4-2020-554,SUSE-SLE-SERVER-12-SP5-2020-554,SUSE-Storage-5-2020-554 SKIP SUSE-RU-2020:0556-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-556 is not security or has no CVEs. patches: SUSE-2020-556,SUSE-SLE-Module-Basesystem-15-SP1-2020-556,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-556,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-556,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-556,SUSE-SLE-Module-Server-Applications-15-SP1-2020-556 SKIP SUSE-RU-2020:0561-1 as SUSE-SLE-SERVER-12-SP5-2020-561 is not security or has no CVEs. patches: SUSE-2020-561,SUSE-SLE-SDK-12-SP4-2020-561,SUSE-SLE-SDK-12-SP5-2020-561,SUSE-SLE-SERVER-12-SP4-2020-561,SUSE-SLE-SERVER-12-SP5-2020-561 SKIP SUSE-RU-2020:0562-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-562 is not security or has no CVEs. patches: SUSE-2020-562,SUSE-SLE-Module-Basesystem-15-SP1-2020-562,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-562,SUSE-SLE-Module-Server-Applications-15-SP1-2020-562 SKIP SUSE-RU-2020:0563-1 as SUSE-SLE-SERVER-12-SP5-2020-563 is not security or has no CVEs. patches: SUSE-2020-563,SUSE-SLE-SERVER-12-SP4-2020-563,SUSE-SLE-SERVER-12-SP5-2020-563 SKIP SUSE-RU-2020:0564-1 as SUSE-SLE-Manager-Tools-12-2020-564 is not security or has no CVEs. patches: SUSE-2020-564,SUSE-SLE-Manager-Tools-12-2020-564 SKIP SUSE-RU-2020:0566-1 as SUSE-SLE-Product-SLES_SAP-15-2020-566 is not security or has no CVEs. patches: SUSE-2020-566,SUSE-SLE-Module-Basesystem-15-2020-566,SUSE-SLE-Module-Basesystem-15-SP1-2020-566,SUSE-SLE-Product-HPC-15-2020-566,SUSE-SLE-Product-SLES-15-2020-566,SUSE-SLE-Product-SLES_SAP-15-2020-566 SKIP SUSE-RU-2020:0567-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-567 is not security or has no CVEs. patches: SUSE-2020-567,SUSE-SLE-Module-Basesystem-15-SP1-2020-567,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-567 SKIP SUSE-RU-2020:0567-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-567 is not security or has no CVEs. patches: SUSE-2020-567,SUSE-SLE-Module-Basesystem-15-SP2-2020-567,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-567,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-567 SKIP SUSE-RU-2020:0570-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-570 is not security or has no CVEs. patches: SUSE-2020-570,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-570 SKIP SUSE-RU-2020:0571-1 as SUSE-Storage-5-2020-571 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-571,SUSE-2020-571,SUSE-OpenStack-Cloud-7-2020-571,SUSE-OpenStack-Cloud-8-2020-571,SUSE-OpenStack-Cloud-Crowbar-8-2020-571,SUSE-SLE-DESKTOP-12-SP4-2020-571,SUSE-SLE-SAP-12-SP1-2020-571,SUSE-SLE-SAP-12-SP2-2020-571,SUSE-SLE-SAP-12-SP3-2020-571,SUSE-SLE-SDK-12-SP4-2020-571,SUSE-SLE-SDK-12-SP5-2020-571,SUSE-SLE-SERVER-12-SP1-2020-571,SUSE-SLE-SERVER-12-SP2-2020-571,SUSE-SLE-SERVER-12-SP2-BCL-2020-571,SUSE-SLE-SERVER-12-SP3-2020-571,SUSE-SLE-SERVER-12-SP3-BCL-2020-571,SUSE-SLE-SERVER-12-SP4-2020-571,SUSE-SLE-SERVER-12-SP5-2020-571,SUSE-SLE-WE-12-SP4-2020-571,SUSE-SLE-WE-12-SP5-2020-571,SUSE-Storage-5-2020-571 SKIP SUSE-RU-2020:0572-1 as SUSE-SLE-Product-SLES_SAP-15-2020-572 is not security or has no CVEs. patches: SUSE-2020-572,SUSE-SLE-Module-Basesystem-15-2020-572,SUSE-SLE-Module-Basesystem-15-SP1-2020-572,SUSE-SLE-Module-Development-Tools-OBS-15-2020-572,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-572,SUSE-SLE-Module-Server-Applications-15-2020-572,SUSE-SLE-Module-Server-Applications-15-SP1-2020-572,SUSE-SLE-Product-HPC-15-2020-572,SUSE-SLE-Product-SLES-15-2020-572,SUSE-SLE-Product-SLES_SAP-15-2020-572 SKIP SUSE-RU-2020:0573-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-573 is not security or has no CVEs. patches: SUSE-2020-573,SUSE-SLE-Module-Basesystem-15-SP1-2020-573 SKIP SUSE-RU-2020:0574-1 as SUSE-SLE-Product-SLES_SAP-15-2020-574 is not security or has no CVEs. patches: SUSE-2020-574,SUSE-SLE-Module-Server-Applications-15-2020-574,SUSE-SLE-Product-HPC-15-2020-574,SUSE-SLE-Product-SLES-15-2020-574,SUSE-SLE-Product-SLES_SAP-15-2020-574 SKIP SUSE-RU-2020:0575-1 as SUSE-SLE-Product-WE-15-SP1-2020-575 is not security or has no CVEs. patches: SUSE-2020-575,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-575,SUSE-SLE-Product-WE-15-SP1-2020-575 SKIP SUSE-RU-2020:0579-1 as SUSE-2020-579 is not security or has no CVEs. patches: SUSE-2020-579,SUSE-SLE-Manager-Tools-12-2020-579 SKIP SUSE-RU-2020:0581-1 as SUSE-SLE-Product-SLES_SAP-15-2020-581 is not security or has no CVEs. patches: SUSE-2020-581,SUSE-SLE-Module-Basesystem-15-2020-581,SUSE-SLE-Module-Desktop-Applications-15-2020-581,SUSE-SLE-Module-Development-Tools-OBS-15-2020-581,SUSE-SLE-Module-Server-Applications-15-2020-581,SUSE-SLE-Product-HPC-15-2020-581,SUSE-SLE-Product-SLES-15-2020-581,SUSE-SLE-Product-SLES_SAP-15-2020-581 SKIP SUSE-RU-2020:0582-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-582 is not security or has no CVEs. patches: SUSE-2020-582,SUSE-SLE-Module-Basesystem-15-2020-582,SUSE-SLE-Module-Basesystem-15-SP1-2020-582 SKIP SUSE-RU-2020:0583-1 as SUSE-SLE-Module-Toolchain-12-2020-583 is not security or has no CVEs. patches: SUSE-2020-583,SUSE-SLE-Module-Toolchain-12-2020-583 SKIP SUSE-RU-2020:0587-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-587 is not security or has no CVEs. patches: SUSE-2020-587,SUSE-SLE-Module-Basesystem-15-SP1-2020-587,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-587 SKIP SUSE-RU-2020:0588-1 as SUSE-SLE-Product-SLES-15-2020-588 is not security or has no CVEs. patches: SUSE-2020-588,SUSE-SLE-Module-Basesystem-15-SP1-2020-588,SUSE-SLE-Product-SLES-15-2020-588 SKIP SUSE-RU-2020:0590-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-590 is not security or has no CVEs. patches: SUSE-2020-590,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-590 SKIP SUSE-RU-2020:0591-1 as SUSE-SLE-Product-WE-15-SP1-2020-591 is not security or has no CVEs. patches: SUSE-2020-591,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-591,SUSE-SLE-Product-WE-15-SP1-2020-591 SKIP SUSE-RU-2020:0592-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-592 is not security or has no CVEs. patches: SUSE-2020-592,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-592,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-592 SKIP SUSE-RU-2020:0593-1 as SUSE-SLE-Module-Containers-15-SP1-2020-593 is not security or has no CVEs. patches: SUSE-2020-593,SUSE-SLE-Module-Containers-15-SP1-2020-593 SKIP SUSE-RU-2020:0596-1 as SUSE-SLE-SERVER-12-SP5-2020-596 is not security or has no CVEs. patches: SUSE-2020-596,SUSE-SLE-DESKTOP-12-SP4-2020-596,SUSE-SLE-SERVER-12-SP4-2020-596,SUSE-SLE-SERVER-12-SP5-2020-596 SKIP SUSE-RU-2020:0597-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-597 is not security or has no CVEs. patches: SUSE-2020-597,SUSE-SLE-Module-Basesystem-15-SP1-2020-597,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-597 SKIP SUSE-RU-2020:0600-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-600 is not security or has no CVEs. patches: SUSE-2020-600,SUSE-SLE-Module-Basesystem-15-SP1-2020-600 SKIP SUSE-RU-2020:0602-1 as SUSE-SLE-Product-SLES_SAP-15-2020-602 is not security or has no CVEs. patches: SUSE-2020-602,SUSE-SLE-Product-SLES_SAP-15-2020-602 SKIP SUSE-RU-2020:0606-1 as SUSE-Storage-6-2020-606 is not security or has no CVEs. patches: SUSE-2020-606,SUSE-SLE-Module-Basesystem-15-SP1-2020-606,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-606,SUSE-SLE-Module-Python2-15-SP1-2020-606,SUSE-SLE-Product-HA-15-SP1-2020-606,SUSE-Storage-6-2020-606 SKIP SUSE-RU-2020:0607-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-607 is not security or has no CVEs. patches: SUSE-2020-607,SUSE-SLE-SERVER-12-SP4-2020-607,SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-607 SKIP SUSE-RU-2020:0608-1 as SUSE-SLE-SERVER-12-SP5-2020-608 is not security or has no CVEs. patches: SUSE-2020-608,SUSE-SLE-SDK-12-SP4-2020-608,SUSE-SLE-SDK-12-SP5-2020-608,SUSE-SLE-SERVER-12-SP4-2020-608,SUSE-SLE-SERVER-12-SP5-2020-608 SKIP SUSE-RU-2020:0609-1 as SUSE-SLE-Product-SLES_SAP-15-2020-609 is not security or has no CVEs. patches: SUSE-2020-609,SUSE-SLE-Module-Basesystem-15-SP1-2020-609,SUSE-SLE-Product-HPC-15-2020-609,SUSE-SLE-Product-SLES-15-2020-609,SUSE-SLE-Product-SLES_SAP-15-2020-609 SKIP SUSE-RU-2020:0611-1 as SUSE-Storage-6-2020-611 is not security or has no CVEs. patches: SUSE-2020-611,SUSE-Storage-6-2020-611 SKIP SUSE-RU-2020:0614-1 as SUSE-SLE-SERVER-12-SP5-2020-614 is not security or has no CVEs. patches: SUSE-2020-614,SUSE-SLE-SDK-12-SP5-2020-614,SUSE-SLE-SERVER-12-SP5-2020-614 SKIP SUSE-RU-2020:0616-1 as SUSE-SLE-SERVER-12-SP5-2020-616 is not security or has no CVEs. patches: SUSE-2020-616,SUSE-SLE-SERVER-12-SP4-2020-616,SUSE-SLE-SERVER-12-SP5-2020-616 SKIP SUSE-RU-2020:0618-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-618 is not security or has no CVEs. patches: SUSE-2020-618,SUSE-SLE-INSTALLER-15-SP1-2020-618,SUSE-SLE-Module-Basesystem-15-SP1-2020-618 SKIP SUSE-RU-2020:0619-1 as SUSE-SLE-SERVER-12-SP5-2020-619 is not security or has no CVEs. patches: SUSE-2020-619,SUSE-SLE-SERVER-12-SP5-2020-619 SKIP SUSE-RU-2020:0620-1 as SUSE-SLE-SERVER-12-SP4-2020-620 is not security or has no CVEs. patches: SUSE-2020-620,SUSE-SLE-SERVER-12-SP4-2020-620 SKIP SUSE-RU-2020:0621-1 as SUSE-SLE-SERVER-12-SP4-2020-621 is not security or has no CVEs. patches: SUSE-2020-621,SUSE-SLE-SERVER-12-SP4-2020-621 SKIP SUSE-RU-2020:0624-1 as SUSE-SLE-Module-Python2-15-SP1-2020-624 is not security or has no CVEs. patches: SUSE-2020-624,SUSE-SLE-Module-Basesystem-15-SP1-2020-624,SUSE-SLE-Module-Python2-15-SP1-2020-624 SKIP SUSE-RU-2020:0626-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-626 is not security or has no CVEs. patches: SUSE-2020-626,SUSE-SLE-Module-Basesystem-15-SP1-2020-626 SKIP SUSE-RU-2020:0627-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-627 is not security or has no CVEs. patches: SUSE-2020-627,SUSE-SLE-Module-Development-Tools-15-SP1-2020-627 SKIP SUSE-RU-2020:0633-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-633 is not security or has no CVEs. patches: SUSE-2020-633,SUSE-SLE-Module-Basesystem-15-SP1-2020-633,SUSE-SLE-Module-Development-Tools-15-SP1-2020-633,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-633 SKIP SUSE-RU-2020:0634-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-634 is not security or has no CVEs. patches: SUSE-2020-634,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-634,SUSE-SLE-Module-Server-Applications-15-SP1-2020-634 SKIP SUSE-RU-2020:0635-1 as SUSE-SLE-WE-12-SP5-2020-635 is not security or has no CVEs. patches: SUSE-2020-635,SUSE-SLE-WE-12-SP5-2020-635 SKIP SUSE-RU-2020:0636-1 as SUSE-SLE-Product-HA-15-SP1-2020-636 is not security or has no CVEs. patches: SUSE-2020-636,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-636,SUSE-SLE-Product-HA-15-SP1-2020-636 SKIP SUSE-RU-2020:0637-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-637 is not security or has no CVEs. patches: SUSE-2020-637,SUSE-SLE-Module-Public-Cloud-15-2020-637,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-637 SKIP SUSE-RU-2020:0638-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-638 is not security or has no CVEs. patches: SUSE-2020-638,SUSE-SLE-SERVER-12-SP5-2020-638,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-638 SKIP SUSE-RU-2020:0639-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-639 is not security or has no CVEs. patches: SUSE-2020-639,SUSE-SLE-Module-Basesystem-15-SP1-2020-639 SKIP SUSE-RU-2020:0641-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-641 is not security or has no CVEs. patches: SUSE-2020-641,SUSE-SLE-Module-Basesystem-15-SP1-2020-641,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-641,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-641 SKIP SUSE-RU-2020:0643-1 as SUSE-SLE-SERVER-12-SP5-2020-643 is not security or has no CVEs. patches: SUSE-2020-643,SUSE-SLE-SDK-12-SP5-2020-643,SUSE-SLE-SERVER-12-SP5-2020-643 SKIP SUSE-RU-2020:0644-1 as SUSE-SLE-SERVER-12-SP4-2020-644 is not security or has no CVEs. patches: SUSE-2020-644,SUSE-SLE-DESKTOP-12-SP4-2020-644,SUSE-SLE-SERVER-12-SP4-2020-644 SKIP SUSE-RU-2020:0652-1 as SUSE-SLE-SERVER-12-SP5-2020-652 is not security or has no CVEs. patches: SUSE-2020-652,SUSE-SLE-SERVER-12-SP4-2020-652,SUSE-SLE-SERVER-12-SP5-2020-652 SKIP SUSE-RU-2020:0653-1 as SUSE-SLE-Product-HA-15-SP1-2020-653 is not security or has no CVEs. patches: SUSE-2020-653,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-653,SUSE-SLE-Product-HA-15-SP1-2020-653 SKIP SUSE-RU-2020:0654-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-654 is not security or has no CVEs. patches: SUSE-2020-654,SUSE-SLE-Module-Basesystem-15-SP1-2020-654,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-654 SKIP SUSE-RU-2020:0655-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-655 is not security or has no CVEs. patches: SUSE-2020-655,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-655 SKIP SUSE-RU-2020:0657-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-657 is not security or has no CVEs. patches: SUSE-2020-657,SUSE-SLE-Module-Public-Cloud-15-2020-657,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-657 SKIP SUSE-RU-2020:0662-1 as SUSE-SLE-Product-SLES_SAP-15-2020-662 is not security or has no CVEs. patches: SUSE-2020-662,SUSE-SLE-Module-Basesystem-15-SP1-2020-662,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-662,SUSE-SLE-Product-HPC-15-2020-662,SUSE-SLE-Product-SLES-15-2020-662,SUSE-SLE-Product-SLES_SAP-15-2020-662 SKIP SUSE-RU-2020:0663-1 as SUSE-Storage-5-2020-663 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-663,SUSE-2020-663,SUSE-OpenStack-Cloud-7-2020-663,SUSE-OpenStack-Cloud-8-2020-663,SUSE-OpenStack-Cloud-Crowbar-8-2020-663,SUSE-SLE-DESKTOP-12-SP4-2020-663,SUSE-SLE-SAP-12-SP1-2020-663,SUSE-SLE-SAP-12-SP2-2020-663,SUSE-SLE-SAP-12-SP3-2020-663,SUSE-SLE-SERVER-12-SP1-2020-663,SUSE-SLE-SERVER-12-SP2-2020-663,SUSE-SLE-SERVER-12-SP2-BCL-2020-663,SUSE-SLE-SERVER-12-SP3-2020-663,SUSE-SLE-SERVER-12-SP3-BCL-2020-663,SUSE-SLE-SERVER-12-SP4-2020-663,SUSE-SLE-SERVER-12-SP5-2020-663,SUSE-Storage-5-2020-663 SKIP SUSE-RU-2020:0664-1 as SUSE-SLE-SERVER-12-SP5-2020-664 is not security or has no CVEs. patches: SUSE-2020-664,SUSE-SLE-SERVER-12-SP5-2020-664 SKIP SUSE-RU-2020:0669-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-669 is not security or has no CVEs. patches: SUSE-2020-669,SUSE-SLE-Module-Basesystem-15-SP1-2020-669 SKIP SUSE-RU-2020:0682-1 as SUSE-SLE-Manager-Tools-12-2020-682 is not security or has no CVEs. patches: SUSE-2020-682,SUSE-SLE-Manager-Tools-12-2020-682 SKIP SUSE-RU-2020:0683-1 as SUSE-SLE-Manager-Tools-15-2020-683 is not security or has no CVEs. patches: SUSE-2020-683,SUSE-SLE-Manager-Tools-15-2020-683,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-683 SKIP SUSE-RU-2020:0687-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-687 is not security or has no CVEs. patches: SUSE-2020-687,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-687,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-687,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-687,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-687 SKIP SUSE-RU-2020:0689-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-689 is not security or has no CVEs. patches: SUSE-2020-689,SUSE-SLE-Module-Basesystem-15-SP1-2020-689,SUSE-SLE-Module-Development-Tools-15-SP1-2020-689 SKIP SUSE-RU-2020:0690-1 as SUSE-SLE-Product-SLES_SAP-15-2020-690 is not security or has no CVEs. patches: SUSE-2020-690,SUSE-SLE-Module-Basesystem-15-SP1-2020-690,SUSE-SLE-Module-Basesystem-15-SP2-2020-690,SUSE-SLE-Product-HPC-15-2020-690,SUSE-SLE-Product-SLES-15-2020-690,SUSE-SLE-Product-SLES_SAP-15-2020-690 SKIP SUSE-RU-2020:0691-1 as SUSE-SLE-SERVER-12-SP5-2020-691 is not security or has no CVEs. patches: SUSE-2020-691,SUSE-SLE-SERVER-12-SP5-2020-691 SKIP SUSE-RU-2020:0692-1 as SUSE-SLE-SERVER-12-SP4-2020-692 is not security or has no CVEs. patches: SUSE-2020-692,SUSE-SLE-SERVER-12-SP4-2020-692 SKIP SUSE-RU-2020:0694-1 as SUSE-SLE-Product-SLES_SAP-15-2020-694 is not security or has no CVEs. patches: SUSE-2020-694,SUSE-SLE-Product-HPC-15-2020-694,SUSE-SLE-Product-SLES-15-2020-694,SUSE-SLE-Product-SLES_SAP-15-2020-694 SKIP SUSE-RU-2020:0695-1 as SUSE-SLE-SERVER-12-SP5-2020-695 is not security or has no CVEs. patches: SUSE-2020-695,SUSE-SLE-SERVER-12-SP4-2020-695,SUSE-SLE-SERVER-12-SP5-2020-695 SKIP SUSE-RU-2020:0698-1 as SUSE-SLE-Module-Public-Cloud-12-2020-698 is not security or has no CVEs. patches: SUSE-2020-698,SUSE-SLE-Module-Public-Cloud-12-2020-698 SKIP SUSE-RU-2020:0700-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-700 is not security or has no CVEs. patches: SUSE-2020-700,SUSE-SLE-Module-Basesystem-15-SP1-2020-700 SKIP SUSE-RU-2020:0704-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-704 is not security or has no CVEs. patches: SUSE-2020-704,SUSE-SLE-Module-Basesystem-15-SP1-2020-704,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-704,SUSE-SLE-Module-Server-Applications-15-SP1-2020-704 SKIP SUSE-RU-2020:0708-1 as SUSE-SLE-Module-Public-Cloud-12-2020-708 is not security or has no CVEs. patches: SUSE-2020-708,SUSE-SLE-Module-Public-Cloud-12-2020-708 SKIP SUSE-RU-2020:0709-1 as SUSE-SLE-SERVER-12-SP4-2020-709 is not security or has no CVEs. patches: SUSE-2020-709,SUSE-SLE-SERVER-12-SP4-2020-709 SKIP SUSE-RU-2020:0716-1 as SUSE-SLE-Module-Public-Cloud-12-2020-716 is not security or has no CVEs. patches: SUSE-2020-716,SUSE-SLE-Module-Public-Cloud-12-2020-716 SKIP SUSE-RU-2020:0718-1 as SUSE-SLE-SERVER-12-SP3-2020-718 is not security or has no CVEs. patches: SUSE-2020-718,SUSE-SLE-SAP-12-SP3-2020-718,SUSE-SLE-SERVER-12-SP3-2020-718 SKIP SUSE-RU-2020:0719-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-719 is not security or has no CVEs. patches: SUSE-2020-719,SUSE-SLE-Module-Basesystem-15-SP1-2020-719 SKIP SUSE-RU-2020:0720-2 as SUSE-Storage-5-2020-720 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-720,SUSE-2020-720,SUSE-OpenStack-Cloud-7-2020-720,SUSE-OpenStack-Cloud-8-2020-720,SUSE-OpenStack-Cloud-Crowbar-8-2020-720,SUSE-SLE-SAP-12-SP2-2020-720,SUSE-SLE-SAP-12-SP3-2020-720,SUSE-SLE-SERVER-12-SP2-2020-720,SUSE-SLE-SERVER-12-SP2-BCL-2020-720,SUSE-SLE-SERVER-12-SP3-2020-720,SUSE-SLE-SERVER-12-SP3-BCL-2020-720,SUSE-Storage-5-2020-720 SKIP SUSE-RU-2020:0723-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-723 is not security or has no CVEs. patches: SUSE-2020-723,SUSE-SLE-Module-Development-Tools-15-SP1-2020-723,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-723 SKIP SUSE-RU-2020:0724-1 as SUSE-SLE-SERVER-12-SP5-2020-724 is not security or has no CVEs. patches: SUSE-2020-724,SUSE-SLE-SERVER-12-SP5-2020-724 SKIP SUSE-RU-2020:0727-1 as SUSE-SLE-Product-SLES_SAP-15-2020-727 is not security or has no CVEs. patches: SUSE-2020-727,SUSE-SLE-Product-HPC-15-2020-727,SUSE-SLE-Product-SLES-15-2020-727,SUSE-SLE-Product-SLES_SAP-15-2020-727 SKIP SUSE-RU-2020:0728-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-728 is not security or has no CVEs. patches: SUSE-2020-728,SUSE-SLE-Module-Basesystem-15-SP1-2020-728,SUSE-SLE-Module-Server-Applications-15-SP1-2020-728 SKIP SUSE-RU-2020:0729-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-729 is not security or has no CVEs. patches: SUSE-2020-729,SUSE-SLE-Module-Basesystem-15-SP1-2020-729,SUSE-SLE-Module-Development-Tools-15-SP1-2020-729,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-729 SKIP SUSE-RU-2020:0730-1 as SUSE-SLE-SERVER-12-SP5-2020-730 is not security or has no CVEs. patches: SUSE-2020-730,SUSE-SLE-SERVER-12-SP4-2020-730,SUSE-SLE-SERVER-12-SP5-2020-730 SKIP SUSE-RU-2020:0731-1 as SUSE-SLE-Module-Public-Cloud-12-2020-731 is not security or has no CVEs. patches: SUSE-2020-731,SUSE-SLE-Module-Public-Cloud-12-2020-731 SKIP SUSE-RU-2020:0732-1 as SUSE-SLE-SAP-12-SP5-2020-732 is not security or has no CVEs. patches: SUSE-2020-732,SUSE-SLE-SAP-12-SP5-2020-732 SKIP SUSE-RU-2020:0733-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-733 is not security or has no CVEs. patches: SUSE-2020-733,SUSE-SLE-Module-Basesystem-15-SP1-2020-733 SKIP SUSE-RU-2020:0734-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-734 is not security or has no CVEs. patches: SUSE-2020-734,SUSE-SLE-Module-Basesystem-15-SP1-2020-734 SKIP SUSE-RU-2020:0735-1 as SUSE-SLE-SERVER-12-SP4-2020-735 is not security or has no CVEs. patches: SUSE-2020-735,SUSE-SLE-SDK-12-SP4-2020-735,SUSE-SLE-SERVER-12-SP4-2020-735 SKIP SUSE-RU-2020:0736-1 as SUSE-SLE-SERVER-12-SP5-2020-736 is not security or has no CVEs. patches: SUSE-2020-736,SUSE-SLE-SERVER-12-SP4-2020-736,SUSE-SLE-SERVER-12-SP5-2020-736 SKIP SUSE-RU-2020:0738-1 as SUSE-SLE-Product-SLES_SAP-15-2020-738 is not security or has no CVEs. patches: SUSE-2020-738,SUSE-SLE-Product-HPC-15-2020-738,SUSE-SLE-Product-SLES-15-2020-738,SUSE-SLE-Product-SLES_SAP-15-2020-738 SKIP SUSE-RU-2020:0739-1 as SUSE-SLE-HA-12-SP5-2020-739 is not security or has no CVEs. patches: SUSE-2020-739,SUSE-SLE-HA-12-SP4-2020-739,SUSE-SLE-HA-12-SP5-2020-739 SKIP SUSE-RU-2020:0742-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-742 is not security or has no CVEs. patches: SUSE-2020-742,SUSE-SLE-Module-Basesystem-15-SP1-2020-742,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-742 SKIP SUSE-RU-2020:0744-1 as SUSE-SLE-SERVER-12-SP1-2020-744 is not security or has no CVEs. patches: SUSE-2020-744,SUSE-SLE-SAP-12-SP1-2020-744,SUSE-SLE-SERVER-12-SP1-2020-744 SKIP SUSE-RU-2020:0745-1 as SUSE-SLE-Product-SLES_SAP-15-2020-745 is not security or has no CVEs. patches: SUSE-2020-745,SUSE-SLE-Module-Development-Tools-15-SP1-2020-745,SUSE-SLE-Product-HPC-15-2020-745,SUSE-SLE-Product-SLES-15-2020-745,SUSE-SLE-Product-SLES_SAP-15-2020-745 SKIP SUSE-RU-2020:0746-1 as SUSE-SLE-SERVER-12-SP5-2020-746 is not security or has no CVEs. patches: SUSE-2020-746,SUSE-SLE-SDK-12-SP5-2020-746,SUSE-SLE-SERVER-12-SP5-2020-746 SKIP SUSE-RU-2020:0747-1 as SUSE-SLE-SERVER-12-SP5-2020-747 is not security or has no CVEs. patches: SUSE-2020-747,SUSE-SLE-SERVER-12-SP4-2020-747,SUSE-SLE-SERVER-12-SP5-2020-747 SKIP SUSE-RU-2020:0747-2 as SUSE-Storage-5-2020-747 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-747,SUSE-2020-747,SUSE-OpenStack-Cloud-7-2020-747,SUSE-OpenStack-Cloud-8-2020-747,SUSE-OpenStack-Cloud-Crowbar-8-2020-747,SUSE-SLE-SAP-12-SP1-2020-747,SUSE-SLE-SAP-12-SP2-2020-747,SUSE-SLE-SAP-12-SP3-2020-747,SUSE-SLE-SERVER-12-SP1-2020-747,SUSE-SLE-SERVER-12-SP2-2020-747,SUSE-SLE-SERVER-12-SP2-BCL-2020-747,SUSE-SLE-SERVER-12-SP3-2020-747,SUSE-SLE-SERVER-12-SP3-BCL-2020-747,SUSE-Storage-5-2020-747 SKIP SUSE-RU-2020:0748-1 as SUSE-SLE-Product-SLES_SAP-15-2020-748 is not security or has no CVEs. patches: SUSE-2020-748,SUSE-SLE-Product-HPC-15-2020-748,SUSE-SLE-Product-SLES-15-2020-748,SUSE-SLE-Product-SLES_SAP-15-2020-748 SKIP SUSE-RU-2020:0749-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-749 is not security or has no CVEs. patches: SUSE-2020-749,SUSE-SLE-Module-Basesystem-15-SP1-2020-749,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-749,SUSE-SLE-Module-Server-Applications-15-SP1-2020-749 SKIP SUSE-RU-2020:0755-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-755 is not security or has no CVEs. patches: SUSE-2020-755,SUSE-SLE-Module-Basesystem-15-SP1-2020-755,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-755,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-755 SKIP SUSE-RU-2020:0755-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-755 is not security or has no CVEs. patches: SUSE-2020-755,SUSE-SLE-Module-Basesystem-15-SP2-2020-755,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-755,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-755,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-755 SKIP SUSE-RU-2020:0756-1 as SUSE-SLE-Module-Web-Scripting-12-2020-756 is not security or has no CVEs. patches: SUSE-2020-756,SUSE-SLE-Module-Web-Scripting-12-2020-756 SKIP SUSE-RU-2020:0757-1 as SUSE-SLE-SERVER-12-SP5-2020-757 is not security or has no CVEs. patches: SUSE-2020-757,SUSE-SLE-SERVER-12-SP4-2020-757,SUSE-SLE-SERVER-12-SP5-2020-757 SKIP SUSE-RU-2020:0758-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-758 is not security or has no CVEs. patches: SUSE-2020-758,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-758 SKIP SUSE-RU-2020:0759-1 as SUSE-SLE-SAP-12-SP5-2020-759 is not security or has no CVEs. patches: SUSE-2020-759,SUSE-SLE-SAP-12-SP4-2020-759,SUSE-SLE-SAP-12-SP5-2020-759 SKIP SUSE-RU-2020:0768-1 as SUSE-2020-768 is not security or has no CVEs. patches: SUSE-2020-768,SUSE-SLE-Manager-Tools-15-2020-768 SKIP SUSE-RU-2020:0771-1 as SUSE-2020-771 is not security or has no CVEs. patches: SUSE-2020-771,SUSE-SLE-Manager-Tools-12-2020-771 SKIP SUSE-RU-2020:0773-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-773 is not security or has no CVEs. patches: SUSE-2020-773,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-773,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-773 SKIP SUSE-RU-2020:0773-2 as SUSE-2020-773 is not security or has no CVEs. patches: SUSE-2020-773,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-773,SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-773 SKIP SUSE-RU-2020:0774-1 as SUSE-SLE-Module-Legacy-15-SP1-2020-774 is not security or has no CVEs. patches: SUSE-2020-774,SUSE-SLE-Module-Legacy-15-SP1-2020-774 SKIP SUSE-RU-2020:0776-1 as SUSE-SLE-Module-Containers-15-SP1-2020-776 is not security or has no CVEs. patches: SUSE-2020-776,SUSE-SLE-Module-Containers-15-SP1-2020-776 SKIP SUSE-RU-2020:0777-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-777 is not security or has no CVEs. patches: SUSE-2020-777,SUSE-SLE-Module-Basesystem-15-SP1-2020-777,SUSE-SLE-Module-Development-Tools-15-SP1-2020-777,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-777 SKIP SUSE-RU-2020:0778-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2020-778 is not security or has no CVEs. patches: SUSE-2020-778,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-778,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-778,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-778,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-778 SKIP SUSE-RU-2020:0780-1 as SUSE-SLE-SERVER-12-SP5-2020-780 is not security or has no CVEs. patches: SUSE-2020-780,SUSE-SLE-SERVER-12-SP4-2020-780,SUSE-SLE-SERVER-12-SP5-2020-780 SKIP SUSE-RU-2020:0781-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-781 is not security or has no CVEs. patches: SUSE-2020-781,SUSE-SLE-INSTALLER-15-SP1-2020-781,SUSE-SLE-Module-Basesystem-15-SP1-2020-781,SUSE-SLE-Module-Development-Tools-15-SP1-2020-781,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-781 SKIP SUSE-RU-2020:0782-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-782 is not security or has no CVEs. patches: SUSE-2020-782,SUSE-SLE-Module-Basesystem-15-SP1-2020-782 SKIP SUSE-RU-2020:0783-1 as SUSE-SLE-Product-HA-15-2020-783 is not security or has no CVEs. patches: SUSE-2020-783,SUSE-SLE-Product-HA-15-2020-783 SKIP SUSE-RU-2020:0784-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-784 is not security or has no CVEs. patches: SUSE-2020-784,SUSE-SLE-Module-Basesystem-15-SP1-2020-784 SKIP SUSE-RU-2020:0785-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-785 is not security or has no CVEs. patches: SUSE-2020-785,SUSE-SLE-Module-Server-Applications-15-SP1-2020-785 SKIP SUSE-RU-2020:0786-1 as SUSE-SLE-SERVER-12-SP5-2020-786 is not security or has no CVEs. patches: SUSE-2020-786,SUSE-SLE-SDK-12-SP4-2020-786,SUSE-SLE-SDK-12-SP5-2020-786,SUSE-SLE-SERVER-12-SP4-2020-786,SUSE-SLE-SERVER-12-SP5-2020-786 SKIP SUSE-RU-2020:0788-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2020-787 is not security or has no CVEs. patches: SUSE-2020-788,SUSE-SLE-Live-Patching-12-2020-788,SUSE-SLE-Live-Patching-12-SP3-2020-788,SUSE-SLE-Live-Patching-12-SP4-2020-788,SUSE-SLE-Live-Patching-12-SP5-2020-788,SUSE-SLE-Module-Live-Patching-15-SP1-2020-787 SKIP SUSE-RU-2020:0789-1 as SUSE-Storage-6-2020-789 is not security or has no CVEs. patches: SUSE-2020-789,SUSE-Storage-6-2020-789 SKIP SUSE-RU-2020:0791-1 as SUSE-SLE-Module-Web-Scripting-12-2020-791 is not security or has no CVEs. patches: SUSE-2020-791,SUSE-SLE-Module-Web-Scripting-12-2020-791 SKIP SUSE-RU-2020:0794-1 as SUSE-SLE-Product-HA-15-2020-794 is not security or has no CVEs. patches: SUSE-2020-794,SUSE-SLE-Product-HA-15-2020-794 SKIP SUSE-RU-2020:0795-1 as SUSE-SLE-SAP-12-SP2-2020-795 is not security or has no CVEs. patches: SUSE-2020-795,SUSE-SLE-SAP-12-SP2-2020-795 SKIP SUSE-RU-2020:0796-1 as SUSE-SLE-SAP-12-SP3-2020-796 is not security or has no CVEs. patches: SUSE-2020-796,SUSE-SLE-SAP-12-SP3-2020-796 SKIP SUSE-RU-2020:0797-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-797 is not security or has no CVEs. patches: SUSE-2020-797,SUSE-SLE-Module-Basesystem-15-SP1-2020-797 SKIP SUSE-RU-2020:0798-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-798 is not security or has no CVEs. patches: SUSE-2020-798,SUSE-SLE-Module-Basesystem-15-SP1-2020-798,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-798 SKIP SUSE-RU-2020:0800-1 as SUSE-Storage-5-2020-800 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-800,SUSE-2020-800,SUSE-OpenStack-Cloud-7-2020-800,SUSE-OpenStack-Cloud-8-2020-800,SUSE-OpenStack-Cloud-Crowbar-8-2020-800,SUSE-SLE-SAP-12-SP1-2020-800,SUSE-SLE-SAP-12-SP2-2020-800,SUSE-SLE-SAP-12-SP3-2020-800,SUSE-SLE-SERVER-12-SP1-2020-800,SUSE-SLE-SERVER-12-SP2-2020-800,SUSE-SLE-SERVER-12-SP2-BCL-2020-800,SUSE-SLE-SERVER-12-SP3-2020-800,SUSE-SLE-SERVER-12-SP3-BCL-2020-800,SUSE-SLE-SERVER-12-SP4-2020-800,SUSE-Storage-5-2020-800 SKIP SUSE-RU-2020:0803-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-803 is not security or has no CVEs. patches: SUSE-2020-803,SUSE-SLE-Module-Basesystem-15-SP1-2020-803,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-803 SKIP SUSE-RU-2020:0804-1 as SUSE-SLE-SERVER-12-SP5-2020-804 is not security or has no CVEs. patches: SUSE-2020-804,SUSE-SLE-SERVER-12-SP4-2020-804,SUSE-SLE-SERVER-12-SP5-2020-804 SKIP SUSE-RU-2020:0807-1 as SUSE-SLE-SDK-12-SP5-2020-807 is not security or has no CVEs. patches: SUSE-2020-807,SUSE-SLE-SDK-12-SP5-2020-807 SKIP SUSE-RU-2020:0812-1 as SUSE-Storage-6-2020-812 is not security or has no CVEs. patches: SUSE-2020-812,SUSE-Storage-6-2020-812 SKIP SUSE-RU-2020:0814-1 as SUSE-SLE-Product-WE-15-SP1-2020-814 is not security or has no CVEs. patches: SUSE-2020-814,SUSE-SLE-Module-Basesystem-15-SP1-2020-814,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-814,SUSE-SLE-Module-Legacy-15-SP1-2020-814,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-814,SUSE-SLE-Product-WE-15-SP1-2020-814 SKIP SUSE-RU-2020:0815-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-815 is not security or has no CVEs. patches: SUSE-2020-815,SUSE-SLE-INSTALLER-15-SP1-2020-815,SUSE-SLE-Module-Basesystem-15-SP1-2020-815,SUSE-SLE-Module-Development-Tools-15-SP1-2020-815,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-815 SKIP SUSE-RU-2020:0817-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-817 is not security or has no CVEs. patches: SUSE-2020-817,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-817 SKIP SUSE-RU-2020:0821-1 as SUSE-SLE-Module-Containers-15-SP1-2020-821 is not security or has no CVEs. patches: SUSE-2020-821,SUSE-SLE-Module-Containers-15-SP1-2020-821 SKIP SUSE-RU-2020:0822-1 as SUSE-SLE-SERVER-12-SP5-2020-822 is not security or has no CVEs. patches: SUSE-2020-822,SUSE-SLE-SDK-12-SP4-2020-822,SUSE-SLE-SDK-12-SP5-2020-822,SUSE-SLE-SERVER-12-SP4-2020-822,SUSE-SLE-SERVER-12-SP5-2020-822 SKIP SUSE-RU-2020:0822-2 as SUSE-Storage-5-2020-822 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-822,SUSE-2020-822,SUSE-OpenStack-Cloud-8-2020-822,SUSE-OpenStack-Cloud-Crowbar-8-2020-822,SUSE-SLE-SAP-12-SP3-2020-822,SUSE-SLE-SERVER-12-SP3-2020-822,SUSE-SLE-SERVER-12-SP3-BCL-2020-822,SUSE-Storage-5-2020-822 SKIP SUSE-RU-2020:0823-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-823 is not security or has no CVEs. patches: SUSE-2020-823,SUSE-SLE-Module-Basesystem-15-SP1-2020-823 SKIP SUSE-RU-2020:0824-1 as SUSE-SLE-Module-Python2-15-SP1-2020-824 is not security or has no CVEs. patches: SUSE-2020-824,SUSE-SLE-Module-Basesystem-15-SP1-2020-824,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-824,SUSE-SLE-Module-Python2-15-SP1-2020-824 SKIP SUSE-RU-2020:0825-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-825 is not security or has no CVEs. patches: SUSE-2020-825,SUSE-SLE-Module-Basesystem-15-SP1-2020-825,SUSE-SLE-Module-Server-Applications-15-SP1-2020-825 SKIP SUSE-RU-2020:0826-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-826 is not security or has no CVEs. patches: SUSE-2020-826,SUSE-SLE-Module-Basesystem-15-SP1-2020-826,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-826 SKIP SUSE-RU-2020:0827-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-827 is not security or has no CVEs. patches: SUSE-2020-827,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-827 SKIP SUSE-RU-2020:0828-1 as SUSE-SLE-SERVER-12-SP5-2020-828 is not security or has no CVEs. patches: SUSE-2020-828,SUSE-SLE-SERVER-12-SP4-2020-828,SUSE-SLE-SERVER-12-SP5-2020-828 SKIP SUSE-RU-2020:0829-1 as SUSE-SLE-Product-SLES_SAP-15-2020-829 is not security or has no CVEs. patches: SUSE-2020-829,SUSE-SLE-Module-Basesystem-15-SP1-2020-829,SUSE-SLE-Product-HPC-15-2020-829,SUSE-SLE-Product-SLES-15-2020-829,SUSE-SLE-Product-SLES_SAP-15-2020-829 SKIP SUSE-RU-2020:0830-1 as SUSE-SLE-SERVER-12-SP1-2020-830 is not security or has no CVEs. patches: SUSE-2020-830,SUSE-SLE-Module-Public-Cloud-12-2020-830,SUSE-SLE-SAP-12-SP1-2020-830,SUSE-SLE-SERVER-12-SP1-2020-830 SKIP SUSE-RU-2020:0833-1 as SUSE-SLE-Product-HA-15-SP1-2020-833 is not security or has no CVEs. patches: SUSE-2020-833,SUSE-SLE-Product-HA-15-SP1-2020-833 SKIP SUSE-RU-2020:0834-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-834 is not security or has no CVEs. patches: SUSE-2020-834,SUSE-SLE-Module-Basesystem-15-SP1-2020-834 SKIP SUSE-RU-2020:0835-1 as SUSE-SLE-Product-HA-15-SP1-2020-835 is not security or has no CVEs. patches: SUSE-2020-835,SUSE-SLE-Product-HA-15-SP1-2020-835 SKIP SUSE-RU-2020:0837-1 as SUSE-Storage-6-2020-837 is not security or has no CVEs. patches: SUSE-2020-837,SUSE-SLE-Module-Basesystem-15-SP1-2020-837,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-837,SUSE-SLE-Module-Python2-15-SP1-2020-837,SUSE-SLE-Product-HA-15-SP1-2020-837,SUSE-Storage-6-2020-837 SKIP SUSE-RU-2020:0838-1 as SUSE-Storage-5-2020-838 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-838,SUSE-2020-838,SUSE-OpenStack-Cloud-7-2020-838,SUSE-OpenStack-Cloud-8-2020-838,SUSE-OpenStack-Cloud-Crowbar-8-2020-838,SUSE-SLE-SAP-12-SP2-2020-838,SUSE-SLE-SAP-12-SP3-2020-838,SUSE-SLE-SDK-12-SP4-2020-838,SUSE-SLE-SDK-12-SP5-2020-838,SUSE-SLE-SERVER-12-SP2-2020-838,SUSE-SLE-SERVER-12-SP3-2020-838,SUSE-SLE-SERVER-12-SP4-2020-838,SUSE-SLE-SERVER-12-SP5-2020-838,SUSE-Storage-5-2020-838 SKIP SUSE-RU-2020:0839-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-839 is not security or has no CVEs. patches: SUSE-2020-839,SUSE-SLE-Module-Development-Tools-15-SP1-2020-839,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-839 SKIP SUSE-RU-2020:0840-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-840 is not security or has no CVEs. patches: SUSE-2020-840,SUSE-SLE-Module-Development-Tools-15-SP1-2020-840,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-840 SKIP SUSE-RU-2020:0841-1 as SUSE-SLE-Product-HA-15-2020-841 is not security or has no CVEs. patches: SUSE-2020-841,SUSE-SLE-Product-HA-15-2020-841 SKIP SUSE-RU-2020:0842-1 as SUSE-2020-842 is not security or has no CVEs. patches: SUSE-2020-842,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-842 SKIP SUSE-RU-2020:0846-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-846 is not security or has no CVEs. patches: SUSE-2020-846,SUSE-SLE-Module-Basesystem-15-SP1-2020-846,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-846 SKIP SUSE-RU-2020:0848-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-848 is not security or has no CVEs. patches: SUSE-2020-848,SUSE-SLE-Module-Basesystem-15-SP1-2020-848,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-848,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-848 SKIP SUSE-RU-2020:0849-1 as SUSE-SLE-Product-SLES_SAP-15-2020-849 is not security or has no CVEs. patches: SUSE-2020-849,SUSE-SLE-Product-HPC-15-2020-849,SUSE-SLE-Product-SLES-15-2020-849,SUSE-SLE-Product-SLES_SAP-15-2020-849 SKIP SUSE-RU-2020:0850-1 as SUSE-SLE-Product-SLES_SAP-15-2020-850 is not security or has no CVEs. patches: SUSE-2020-850,SUSE-SLE-Module-Basesystem-15-SP1-2020-850,SUSE-SLE-Module-Basesystem-15-SP2-2020-850,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-850,SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-850,SUSE-SLE-Module-Server-Applications-15-SP1-2020-850,SUSE-SLE-Module-Server-Applications-15-SP2-2020-850,SUSE-SLE-Product-HPC-15-2020-850,SUSE-SLE-Product-SLES-15-2020-850,SUSE-SLE-Product-SLES_SAP-15-2020-850 SKIP SUSE-RU-2020:0855-1 as SUSE-SUSE-Manager-Server-3.2-2020-855 is not security or has no CVEs. patches: SUSE-2020-855,SUSE-SUSE-Manager-Proxy-3.2-2020-855,SUSE-SUSE-Manager-Server-3.2-2020-855 SKIP SUSE-RU-2020:0856-1 as SUSE-SUSE-Manager-Proxy-3.2-2020-856 is not security or has no CVEs. patches: SUSE-2020-856,SUSE-SUSE-Manager-Proxy-3.2-2020-856 SKIP SUSE-RU-2020:0857-1 as SUSE-SLE-HA-12-SP3-2020-857 is not security or has no CVEs. patches: SUSE-2020-857,SUSE-SLE-HA-12-SP3-2020-857 SKIP SUSE-RU-2020:0858-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-858 is not security or has no CVEs. patches: SUSE-2020-858,SUSE-SLE-Module-Basesystem-15-SP1-2020-858 SKIP SUSE-RU-2020:0912-1 as SUSE-SLE-Product-WE-15-SP1-2020-912 is not security or has no CVEs. patches: SUSE-2020-912,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-912,SUSE-SLE-Product-WE-15-SP1-2020-912 SKIP SUSE-RU-2020:0913-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-913 is not security or has no CVEs. patches: SUSE-2020-913,SUSE-SLE-Module-Basesystem-15-SP1-2020-913,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-913 SKIP SUSE-RU-2020:0914-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-914 is not security or has no CVEs. patches: SUSE-2020-914,SUSE-SLE-Module-Basesystem-15-SP1-2020-914 SKIP SUSE-RU-2020:0915-1 as SUSE-SLE-SERVER-12-SP5-2020-915 is not security or has no CVEs. patches: SUSE-2020-915,SUSE-SLE-SDK-12-SP4-2020-915,SUSE-SLE-SDK-12-SP5-2020-915,SUSE-SLE-SERVER-12-SP4-2020-915,SUSE-SLE-SERVER-12-SP5-2020-915 SKIP SUSE-RU-2020:0916-1 as SUSE-SLE-SERVER-12-SP5-2020-916 is not security or has no CVEs. patches: SUSE-2020-916,SUSE-SLE-SERVER-12-SP5-2020-916 SKIP SUSE-RU-2020:0917-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-917 is not security or has no CVEs. patches: SUSE-2020-917,SUSE-SLE-Module-Basesystem-15-SP1-2020-917,SUSE-SLE-Module-Development-Tools-15-SP1-2020-917 SKIP SUSE-RU-2020:0919-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-919 is not security or has no CVEs. patches: SUSE-2020-919,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-919,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-919 SKIP SUSE-RU-2020:0919-2 as SUSE-SLE-Module-Public-Cloud-15-2020-919 is not security or has no CVEs. patches: SUSE-2020-919,SUSE-SLE-Module-Public-Cloud-15-2020-919 SKIP SUSE-RU-2020:0923-1 as SUSE-SLE-Module-Public-Cloud-12-2020-923 is not security or has no CVEs. patches: SUSE-2020-923,SUSE-SLE-Module-Public-Cloud-12-2020-923 SKIP SUSE-RU-2020:0925-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-925 is not security or has no CVEs. patches: SUSE-2020-925,SUSE-SLE-Module-Public-Cloud-15-2020-925,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-925 SKIP SUSE-RU-2020:0927-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-927 is not security or has no CVEs. patches: SUSE-2020-927,SUSE-SLE-Module-Basesystem-15-SP1-2020-927 SKIP SUSE-RU-2020:0932-1 as SUSE-SLE-HA-12-SP3-2020-932 is not security or has no CVEs. patches: SUSE-2020-932,SUSE-SLE-HA-12-SP3-2020-932 SKIP SUSE-RU-2020:0933-1 as SUSE-SLE-Product-HA-15-2020-933 is not security or has no CVEs. patches: SUSE-2020-933,SUSE-SLE-Product-HA-15-2020-933 SKIP SUSE-RU-2020:0934-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-934 is not security or has no CVEs. patches: SUSE-2020-934,SUSE-SLE-Module-Basesystem-15-SP1-2020-934 SKIP SUSE-RU-2020:0935-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-935 is not security or has no CVEs. patches: SUSE-2020-935,SUSE-SLE-Module-Basesystem-15-SP1-2020-935 SKIP SUSE-RU-2020:0936-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-936 is not security or has no CVEs. patches: SUSE-2020-936,SUSE-SLE-Module-Basesystem-15-SP1-2020-936 SKIP SUSE-RU-2020:0937-1 as SUSE-SLE-Module-Public-Cloud-15-2020-937 is not security or has no CVEs. patches: SUSE-2020-937,SUSE-SLE-Module-Public-Cloud-15-2020-937 SKIP SUSE-RU-2020:0938-1 as SUSE-SLE-SERVER-12-SP4-2020-938 is not security or has no CVEs. patches: SUSE-2020-938,SUSE-SLE-SERVER-12-SP4-2020-938 SKIP SUSE-RU-2020:0942-1 as SUSE-SLE-HA-12-SP5-2020-942 is not security or has no CVEs. patches: SUSE-2020-942,SUSE-SLE-HA-12-SP4-2020-942,SUSE-SLE-HA-12-SP5-2020-942 SKIP SUSE-RU-2020:0943-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-943 is not security or has no CVEs. patches: SUSE-2020-943,SUSE-SLE-Module-Server-Applications-15-SP1-2020-943 SKIP SUSE-RU-2020:0945-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-945 is not security or has no CVEs. patches: SUSE-2020-945,SUSE-SLE-INSTALLER-15-SP1-2020-945,SUSE-SLE-Module-Basesystem-15-SP1-2020-945 SKIP SUSE-RU-2020:0946-1 as SUSE-SLE-Module-Public-Cloud-12-2020-946 is not security or has no CVEs. patches: SUSE-2020-946,SUSE-SLE-Module-Public-Cloud-12-2020-946 SKIP SUSE-RU-2020:0947-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-947 is not security or has no CVEs. patches: SUSE-2020-947,SUSE-SLE-INSTALLER-15-SP1-2020-947,SUSE-SLE-Module-Basesystem-15-SP1-2020-947,SUSE-SLE-Module-Development-Tools-15-SP1-2020-947,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-947 SKIP SUSE-RU-2020:0949-1 as SUSE-SLE-Product-SLES_SAP-15-2020-949 is not security or has no CVEs. patches: SUSE-2020-949,SUSE-SLE-Module-Basesystem-15-SP1-2020-949,SUSE-SLE-Module-Basesystem-15-SP2-2020-949,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-949,SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-949,SUSE-SLE-Module-Server-Applications-15-SP1-2020-949,SUSE-SLE-Module-Server-Applications-15-SP2-2020-949,SUSE-SLE-Product-HPC-15-2020-949,SUSE-SLE-Product-SLES-15-2020-949,SUSE-SLE-Product-SLES_SAP-15-2020-949 SKIP SUSE-RU-2020:0950-1 as SUSE-SLE-Module-Public-Cloud-12-2020-950 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-950,SUSE-2020-950,SUSE-OpenStack-Cloud-7-2020-950,SUSE-OpenStack-Cloud-8-2020-950,SUSE-OpenStack-Cloud-Crowbar-8-2020-950,SUSE-SLE-Module-Public-Cloud-12-2020-950 SKIP SUSE-RU-2020:0951-1 as SUSE-SLE-SERVER-12-SP5-2020-951 is not security or has no CVEs. patches: SUSE-2020-951,SUSE-SLE-SERVER-12-SP5-2020-951 SKIP SUSE-RU-2020:0952-1 as SUSE-SLE-SERVER-12-SP5-2020-952 is not security or has no CVEs. patches: SUSE-2020-952,SUSE-SLE-SDK-12-SP5-2020-952,SUSE-SLE-SERVER-12-SP5-2020-952 SKIP SUSE-RU-2020:0953-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-953 is not security or has no CVEs. patches: SUSE-2020-953,SUSE-SLE-INSTALLER-15-SP1-2020-953,SUSE-SLE-Module-Basesystem-15-SP1-2020-953 SKIP SUSE-RU-2020:0958-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-958 is not security or has no CVEs. patches: SUSE-2020-958,SUSE-SLE-Module-Public-Cloud-15-2020-958,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-958 SKIP SUSE-RU-2020:0960-1 as SUSE-SLE-SERVER-12-SP5-2020-960 is not security or has no CVEs. patches: SUSE-2020-960,SUSE-SLE-SERVER-12-SP4-2020-960,SUSE-SLE-SERVER-12-SP5-2020-960 SKIP SUSE-RU-2020:0961-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-961 is not security or has no CVEs. patches: SUSE-2020-961,SUSE-SLE-Module-Basesystem-15-SP1-2020-961,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-961 SKIP SUSE-RU-2020:0964-1 as SUSE-SLE-SERVER-12-SP5-2020-964 is not security or has no CVEs. patches: SUSE-2020-964,SUSE-SLE-SDK-12-SP4-2020-964,SUSE-SLE-SDK-12-SP5-2020-964,SUSE-SLE-SERVER-12-SP4-2020-964,SUSE-SLE-SERVER-12-SP5-2020-964 SKIP SUSE-RU-2020:0965-1 as SUSE-SLE-Module-SAP-Applications-15-2020-965 is not security or has no CVEs. patches: SUSE-2020-965,SUSE-SLE-Module-SAP-Applications-15-2020-965 SKIP SUSE-RU-2020:0966-1 as SUSE-SLE-Module-Legacy-15-SP1-2020-966 is not security or has no CVEs. patches: SUSE-2020-966,SUSE-SLE-Module-Legacy-15-SP1-2020-966 SKIP SUSE-RU-2020:0976-1 as SUSE-SLE-SERVER-12-SP4-2020-976 is not security or has no CVEs. patches: SUSE-2020-976,SUSE-SLE-SDK-12-SP4-2020-976,SUSE-SLE-SERVER-12-SP4-2020-976 SKIP SUSE-RU-2020:0977-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-977 is not security or has no CVEs. patches: SUSE-2020-977,SUSE-SLE-Module-Basesystem-15-SP1-2020-977,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-977 SKIP SUSE-RU-2020:0979-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-979 is not security or has no CVEs. patches: SUSE-2020-979,SUSE-SLE-Module-Basesystem-15-SP1-2020-979 SKIP SUSE-RU-2020:0980-1 as SUSE-SLE-Module-Public-Cloud-12-2020-980 is not security or has no CVEs. patches: SUSE-2020-980,SUSE-SLE-Module-Public-Cloud-12-2020-980 SKIP SUSE-RU-2020:0981-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-981 is not security or has no CVEs. patches: SUSE-2020-981,SUSE-SLE-Module-Basesystem-15-SP1-2020-981,SUSE-SLE-Module-Development-Tools-15-SP1-2020-981,SUSE-SLE-Module-Python2-15-SP1-2020-981,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-981,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-981 SKIP SUSE-RU-2020:0982-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-982 is not security or has no CVEs. patches: SUSE-2020-982,SUSE-SLE-Module-Development-Tools-15-SP1-2020-982,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-982,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-982 SKIP SUSE-RU-2020:0985-1 as SUSE-SLE-SDK-12-SP5-2020-985 is not security or has no CVEs. patches: SUSE-2020-985,SUSE-SLE-SDK-12-SP4-2020-985,SUSE-SLE-SDK-12-SP5-2020-985 SKIP SUSE-RU-2020:0986-1 as SUSE-SLE-Product-SLES_SAP-15-2020-986 is not security or has no CVEs. patches: SUSE-2020-986,SUSE-SLE-Product-HPC-15-2020-986,SUSE-SLE-Product-SLES-15-2020-986,SUSE-SLE-Product-SLES_SAP-15-2020-986 SKIP SUSE-RU-2020:0987-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-987 is not security or has no CVEs. patches: SUSE-2020-987,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-987,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-987 SKIP SUSE-RU-2020:0988-1 as SUSE-2020-988 is not security or has no CVEs. patches: SUSE-2020-988,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-988 SKIP SUSE-RU-2020:0989-1 as SUSE-SLE-SERVER-12-SP5-2020-989 is not security or has no CVEs. patches: SUSE-2020-989,SUSE-SLE-Module-Public-Cloud-12-2020-989,SUSE-SLE-SERVER-12-SP5-2020-989 SKIP SUSE-RU-2020:0990-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-990 is not security or has no CVEs. patches: SUSE-2020-990,SUSE-SLE-SERVER-12-SP5-2020-990,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-990 SKIP SUSE-RU-2020:0993-1 as SUSE-SLE-Product-SLES_SAP-15-2020-993 is not security or has no CVEs. patches: SUSE-2020-993,SUSE-SLE-Product-HPC-15-2020-993,SUSE-SLE-Product-SLES-15-2020-993,SUSE-SLE-Product-SLES_SAP-15-2020-993 SKIP SUSE-RU-2020:0994-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-994 is not security or has no CVEs. patches: SUSE-2020-994,SUSE-SLE-Module-Basesystem-15-SP1-2020-994 SKIP SUSE-RU-2020:0996-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-996 is not security or has no CVEs. patches: SUSE-2020-996,SUSE-SLE-Module-Basesystem-15-SP1-2020-996 SKIP SUSE-RU-2020:0997-1 as SUSE-SLE-SERVER-12-SP5-2020-997 is not security or has no CVEs. patches: SUSE-2020-997,SUSE-SLE-SERVER-12-SP5-2020-997 SKIP SUSE-RU-2020:0998-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-998 is not security or has no CVEs. patches: SUSE-2020-998,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-998,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-998 SKIP SUSE-RU-2020:0998-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-998 is not security or has no CVEs. patches: SUSE-2020-998,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-998,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-998 SKIP SUSE-RU-2020:0999-1 as SUSE-SLE-Product-HA-15-SP1-2020-999 is not security or has no CVEs. patches: SUSE-2020-999,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-999,SUSE-SLE-Product-HA-15-SP1-2020-999 SKIP SUSE-RU-2020:1000-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1000 is not security or has no CVEs. patches: SUSE-2020-1000,SUSE-SLE-Manager-Tools-15-2020-1000,SUSE-SLE-Module-Basesystem-15-SP1-2020-1000,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1000,SUSE-SLE-Module-Public-Cloud-15-2020-1000,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1000 SKIP SUSE-RU-2020:1000-2 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1000 is not security or has no CVEs. patches: SUSE-2020-1000,SUSE-SLE-Module-Basesystem-15-SP2-2020-1000,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1000,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1000,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1000 SKIP SUSE-RU-2020:1001-1 as SUSE-SLE-SERVER-12-SP5-2020-1001 is not security or has no CVEs. patches: SUSE-2020-1001,SUSE-SLE-SDK-12-SP4-2020-1001,SUSE-SLE-SDK-12-SP5-2020-1001,SUSE-SLE-SERVER-12-SP4-2020-1001,SUSE-SLE-SERVER-12-SP5-2020-1001 SKIP SUSE-RU-2020:1002-1 as SUSE-SLE-HA-12-SP3-2020-1002 is not security or has no CVEs. patches: SUSE-2020-1002,SUSE-SLE-HA-12-SP3-2020-1002 SKIP SUSE-RU-2020:1003-1 as SUSE-SLE-HA-12-SP5-2020-1003 is not security or has no CVEs. patches: SUSE-2020-1003,SUSE-SLE-HA-12-SP4-2020-1003,SUSE-SLE-HA-12-SP5-2020-1003 SKIP SUSE-RU-2020:1005-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1005 is not security or has no CVEs. patches: SUSE-2020-1005,SUSE-SLE-Module-Basesystem-15-SP1-2020-1005 SKIP SUSE-RU-2020:1006-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1006 is not security or has no CVEs. patches: SUSE-2020-1006,SUSE-SLE-Module-Basesystem-15-SP1-2020-1006,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1006,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1006 SKIP SUSE-RU-2020:1007-1 as SUSE-SLE-SDK-12-SP5-2020-1007 is not security or has no CVEs. patches: SUSE-2020-1007,SUSE-SLE-SDK-12-SP5-2020-1007 SKIP SUSE-RU-2020:1008-1 as SUSE-SLE-Module-HPC-12-2020-1008 is not security or has no CVEs. patches: SUSE-2020-1008,SUSE-SLE-Module-HPC-12-2020-1008 SKIP SUSE-RU-2020:1010-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1010 is not security or has no CVEs. patches: SUSE-2020-1010,SUSE-SLE-Module-Basesystem-15-SP1-2020-1010,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1010 SKIP SUSE-RU-2020:1010-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1010 is not security or has no CVEs. patches: SUSE-2020-1010,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1010 SKIP SUSE-RU-2020:1011-1 as SUSE-SLE-SERVER-12-SP1-2020-1011 is not security or has no CVEs. patches: SUSE-2020-1011,SUSE-SLE-SAP-12-SP1-2020-1011,SUSE-SLE-SERVER-12-SP1-2020-1011 SKIP SUSE-RU-2020:1012-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1012 is not security or has no CVEs. patches: SUSE-2020-1012,SUSE-SLE-Module-Basesystem-15-SP1-2020-1012,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1012 SKIP SUSE-RU-2020:1013-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1013 is not security or has no CVEs. patches: SUSE-2020-1013,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1013 SKIP SUSE-RU-2020:1014-1 as SUSE-SLE-SERVER-12-SP4-2020-1014 is not security or has no CVEs. patches: SUSE-2020-1014,SUSE-SLE-SERVER-12-SP4-2020-1014 SKIP SUSE-RU-2020:1015-1 as SUSE-SLE-SERVER-12-SP5-2020-1015 is not security or has no CVEs. patches: SUSE-2020-1015,SUSE-SLE-SERVER-12-SP5-2020-1015 SKIP SUSE-RU-2020:1016-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1016 is not security or has no CVEs. patches: SUSE-2020-1016,SUSE-SLE-Module-Public-Cloud-15-2020-1016,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1016 SKIP SUSE-RU-2020:1017-1 as SUSE-SLE-SERVER-12-SP4-2020-1017 is not security or has no CVEs. patches: SUSE-2020-1017,SUSE-SLE-SERVER-12-SP4-2020-1017 SKIP SUSE-RU-2020:1019-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1019 is not security or has no CVEs. patches: SUSE-2020-1019,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1019,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1019 SKIP SUSE-RU-2020:1022-1 as SUSE-SLE-Product-HA-15-SP1-2020-1022 is not security or has no CVEs. patches: SUSE-2020-1022,SUSE-SLE-Product-HA-15-SP1-2020-1022 SKIP SUSE-RU-2020:1024-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2020-1024 is not security or has no CVEs. patches: SUSE-2020-1024,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1024,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-1024 SKIP SUSE-RU-2020:1025-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1025 is not security or has no CVEs. patches: SUSE-2020-1025,SUSE-SLE-Module-Public-Cloud-12-2020-1025 SKIP SUSE-RU-2020:1026-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1026 is not security or has no CVEs. patches: SUSE-2020-1026,SUSE-SLE-Module-Basesystem-15-SP1-2020-1026,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1026,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1026,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1026 SKIP SUSE-RU-2020:1029-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1029 is not security or has no CVEs. patches: SUSE-2020-1029,SUSE-SLE-INSTALLER-15-SP1-2020-1029,SUSE-SLE-Module-Basesystem-15-SP1-2020-1029 SKIP SUSE-RU-2020:1030-1 as SUSE-SLE-INSTALLER-15-2020-1030 is not security or has no CVEs. patches: SUSE-2020-1030,SUSE-SLE-INSTALLER-15-2020-1030 SKIP SUSE-RU-2020:1032-1 as SUSE-SLE-SERVER-12-SP5-2020-1032 is not security or has no CVEs. patches: SUSE-2020-1032,SUSE-SLE-SERVER-12-SP4-2020-1032,SUSE-SLE-SERVER-12-SP5-2020-1032 SKIP SUSE-RU-2020:1033-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1033 is not security or has no CVEs. patches: SUSE-2020-1033,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1033 SKIP SUSE-RU-2020:1034-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1034 is not security or has no CVEs. patches: SUSE-2020-1034,SUSE-SLE-Module-Basesystem-15-SP1-2020-1034 SKIP SUSE-RU-2020:1035-1 as SUSE-SLE-SERVER-12-SP1-2020-1035 is not security or has no CVEs. patches: SUSE-2020-1035,SUSE-SLE-SAP-12-SP1-2020-1035,SUSE-SLE-SERVER-12-SP1-2020-1035 SKIP SUSE-RU-2020:1036-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-1036 is not security or has no CVEs. patches: SUSE-2020-1036,SUSE-OpenStack-Cloud-7-2020-1036,SUSE-SLE-SAP-12-SP2-2020-1036,SUSE-SLE-SERVER-12-SP2-2020-1036,SUSE-SLE-SERVER-12-SP2-BCL-2020-1036 SKIP SUSE-RU-2020:1037-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1037 is not security or has no CVEs. patches: SUSE-2020-1037,SUSE-SLE-Module-Basesystem-15-SP1-2020-1037,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1037,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1037,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1037,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1037,SUSE-SLE-Module-Python2-15-SP1-2020-1037 SKIP SUSE-RU-2020:1038-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1038 is not security or has no CVEs. patches: SUSE-2020-1038,SUSE-SLE-Module-Basesystem-15-SP1-2020-1038 SKIP SUSE-RU-2020:1039-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1039 is not security or has no CVEs. patches: SUSE-2020-1039,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1039,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1039 SKIP SUSE-RU-2020:1040-1 as SUSE-SLE-SERVER-12-SP5-2020-1040 is not security or has no CVEs. patches: SUSE-2020-1040,SUSE-SLE-SERVER-12-SP5-2020-1040 SKIP SUSE-RU-2020:1041-1 as SUSE-SLE-Module-HPC-12-2020-1041 is not security or has no CVEs. patches: SUSE-2020-1041,SUSE-SLE-Module-HPC-12-2020-1041 SKIP SUSE-RU-2020:1042-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1042 is not security or has no CVEs. patches: SUSE-2020-1042,SUSE-SLE-Module-Basesystem-15-SP1-2020-1042,SUSE-SLE-Module-Basesystem-15-SP2-2020-1042,SUSE-SLE-Product-HPC-15-2020-1042,SUSE-SLE-Product-SLES-15-2020-1042,SUSE-SLE-Product-SLES_SAP-15-2020-1042 SKIP SUSE-RU-2020:1043-1 as SUSE-Storage-5-2020-1043 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1043,SUSE-2020-1043,SUSE-OpenStack-Cloud-7-2020-1043,SUSE-OpenStack-Cloud-8-2020-1043,SUSE-OpenStack-Cloud-Crowbar-8-2020-1043,SUSE-SLE-SAP-12-SP1-2020-1043,SUSE-SLE-SAP-12-SP2-2020-1043,SUSE-SLE-SAP-12-SP3-2020-1043,SUSE-SLE-SDK-12-SP4-2020-1043,SUSE-SLE-SDK-12-SP5-2020-1043,SUSE-SLE-SERVER-12-SP1-2020-1043,SUSE-SLE-SERVER-12-SP2-2020-1043,SUSE-SLE-SERVER-12-SP2-BCL-2020-1043,SUSE-SLE-SERVER-12-SP3-2020-1043,SUSE-SLE-SERVER-12-SP3-BCL-2020-1043,SUSE-SLE-SERVER-12-SP4-2020-1043,SUSE-SLE-SERVER-12-SP5-2020-1043,SUSE-SLE-WE-12-SP4-2020-1043,SUSE-SLE-WE-12-SP5-2020-1043,SUSE-Storage-5-2020-1043 SKIP SUSE-RU-2020:1047-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1047 is not security or has no CVEs. patches: SUSE-2020-1047,SUSE-SLE-Module-Basesystem-15-SP1-2020-1047,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1047,SUSE-SLE-Product-HPC-15-2020-1047,SUSE-SLE-Product-SLES-15-2020-1047,SUSE-SLE-Product-SLES_SAP-15-2020-1047 SKIP SUSE-RU-2020:1048-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1048 is not security or has no CVEs. patches: SUSE-2020-1048,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1048,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1048 SKIP SUSE-RU-2020:1050-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1050 is not security or has no CVEs. patches: SUSE-2020-1050,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1050,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1050 SKIP SUSE-RU-2020:1051-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-1051 is not security or has no CVEs. patches: SUSE-2020-1051,SUSE-OpenStack-Cloud-7-2020-1051,SUSE-SLE-SAP-12-SP2-2020-1051,SUSE-SLE-SERVER-12-SP2-2020-1051,SUSE-SLE-SERVER-12-SP2-BCL-2020-1051 SKIP SUSE-RU-2020:1052-1 as SUSE-SLE-SERVER-12-SP5-2020-1052 is not security or has no CVEs. patches: SUSE-2020-1052,SUSE-SLE-SERVER-12-SP4-2020-1052,SUSE-SLE-SERVER-12-SP5-2020-1052 SKIP SUSE-RU-2020:1053-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1053 is not security or has no CVEs. patches: SUSE-2020-1053,SUSE-SLE-Module-Public-Cloud-12-2020-1053 SKIP SUSE-RU-2020:1054-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-1054 is not security or has no CVEs. patches: SUSE-2020-1054,SUSE-SLE-SERVER-12-SP4-2020-1054,SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-1054 SKIP SUSE-RU-2020:1055-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1055 is not security or has no CVEs. patches: SUSE-2020-1055,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1055,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1055 SKIP SUSE-RU-2020:1056-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1056 is not security or has no CVEs. patches: SUSE-2020-1056,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1056,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1056 SKIP SUSE-RU-2020:1059-1 as SUSE-SLE-Module-Legacy-15-SP1-2020-1059 is not security or has no CVEs. patches: SUSE-2020-1059,SUSE-SLE-Module-Basesystem-15-SP1-2020-1059,SUSE-SLE-Module-Legacy-15-SP1-2020-1059 SKIP SUSE-RU-2020:1060-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1060 is not security or has no CVEs. patches: SUSE-2020-1060,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1060,SUSE-SLE-Product-HPC-15-2020-1060,SUSE-SLE-Product-SLES-15-2020-1060,SUSE-SLE-Product-SLES_SAP-15-2020-1060 SKIP SUSE-RU-2020:1061-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1061 is not security or has no CVEs. patches: SUSE-2020-1061,SUSE-SLE-Module-Basesystem-15-SP1-2020-1061,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1061,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1061,SUSE-SLE-Product-HPC-15-2020-1061,SUSE-SLE-Product-SLES-15-2020-1061,SUSE-SLE-Product-SLES_SAP-15-2020-1061 SKIP SUSE-RU-2020:1062-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1062 is not security or has no CVEs. patches: SUSE-2020-1062,SUSE-SLE-Product-HPC-15-2020-1062,SUSE-SLE-Product-SLES-15-2020-1062,SUSE-SLE-Product-SLES_SAP-15-2020-1062 SKIP SUSE-RU-2020:1063-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1063 is not security or has no CVEs. patches: SUSE-2020-1063,SUSE-SLE-Module-Basesystem-15-SP1-2020-1063,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1063 SKIP SUSE-RU-2020:1064-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1064 is not security or has no CVEs. patches: SUSE-2020-1064,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1064,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1064 SKIP SUSE-RU-2020:1067-1 as SUSE-SUSE-Manager-Server-3.2-2020-1067 is not security or has no CVEs. patches: SUSE-2020-1067,SUSE-OpenStack-Cloud-7-2020-1067,SUSE-SLE-Module-Public-Cloud-12-2020-1067,SUSE-SUSE-Manager-Server-3.2-2020-1067 SKIP SUSE-RU-2020:1068-1 as SUSE-2020-1068 is not security or has no CVEs. patches: SUSE-2020-1068,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1068 SKIP SUSE-RU-2020:1069-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1069 is not security or has no CVEs. patches: SUSE-2020-1069,SUSE-SLE-Module-Basesystem-15-SP1-2020-1069,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1069,SUSE-SLE-Module-Python2-15-SP1-2020-1069 SKIP SUSE-RU-2020:1070-1 as SUSE-SLE-Product-WE-15-SP1-2020-1070 is not security or has no CVEs. patches: SUSE-2020-1070,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1070,SUSE-SLE-Product-WE-15-SP1-2020-1070 SKIP SUSE-RU-2020:1071-1 as SUSE-SLE-Module-HPC-15-SP1-2020-1071 is not security or has no CVEs. patches: SUSE-2020-1071,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1071,SUSE-SLE-Module-HPC-15-SP1-2020-1071 SKIP SUSE-RU-2020:1073-1 as SUSE-2020-1073 is not security or has no CVEs. patches: SUSE-2020-1073,SUSE-SLE-Module-Basesystem-15-SP2-2020-1073,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1073 SKIP SUSE-RU-2020:1074-1 as SUSE-2020-1074 is not security or has no CVEs. patches: SUSE-2020-1074,SUSE-SLE-Module-Basesystem-15-SP2-2020-1074,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1074 ERROR: notice SUSE-RU-2020:1075-1 has no valid patches out of: SUSE-2020-1075,SUSE-SLE-Module-Basesystem-15-SP2-2020-1075 SKIP SUSE-RU-2020:1078-1 as SUSE-2020-1078 is not security or has no CVEs. patches: SUSE-2020-1078,SUSE-SLE-Module-Basesystem-15-SP2-2020-1078,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1078 SKIP SUSE-RU-2020:1080-1 as SUSE-2020-1080 is not security or has no CVEs. patches: SUSE-2020-1080,SUSE-SLE-Module-Basesystem-15-SP2-2020-1080,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1080 SKIP SUSE-RU-2020:1081-1 as SUSE-2020-1081 is not security or has no CVEs. patches: SUSE-2020-1081,SUSE-SLE-Module-Basesystem-15-SP2-2020-1081,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1081 SKIP SUSE-RU-2020:1082-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1082 is not security or has no CVEs. patches: SUSE-2020-1082,SUSE-SLE-Module-Basesystem-15-SP1-2020-1082,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1082 SKIP SUSE-RU-2020:1086-1 as SUSE-SLE-Product-HA-15-SP1-2020-1086 is not security or has no CVEs. patches: SUSE-2020-1086,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1086,SUSE-SLE-Product-HA-15-SP1-2020-1086 SKIP SUSE-RU-2020:1093-1 as SUSE-SLE-Product-HA-15-2020-1093 is not security or has no CVEs. patches: SUSE-2020-1093,SUSE-SLE-Product-HA-15-2020-1093 SKIP SUSE-RU-2020:1094-1 as SUSE-Storage-6-2020-1094 is not security or has no CVEs. patches: SUSE-2020-1094,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1094,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1094,SUSE-Storage-6-2020-1094 SKIP SUSE-RU-2020:1094-2 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1094 is not security or has no CVEs. patches: SUSE-2020-1094,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1094,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1094,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1094 SKIP SUSE-RU-2020:1095-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1095 is not security or has no CVEs. patches: SUSE-2020-1095,SUSE-SLE-Module-Public-Cloud-12-2020-1095 SKIP SUSE-RU-2020:1096-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1096 is not security or has no CVEs. patches: SUSE-2020-1096,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1096,SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-1096,SUSE-SLE-Module-Public-Cloud-15-2020-1096,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1096,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1096 SKIP SUSE-RU-2020:1097-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1097 is not security or has no CVEs. patches: SUSE-2020-1097,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1097 SKIP SUSE-RU-2020:1098-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1098 is not security or has no CVEs. patches: SUSE-2020-1098,SUSE-SLE-Module-Public-Cloud-12-2020-1098 SKIP SUSE-RU-2020:1099-1 as SUSE-SLE-SERVER-12-SP5-2020-1099 is not security or has no CVEs. patches: SUSE-2020-1099,SUSE-SLE-SERVER-12-SP5-2020-1099 SKIP SUSE-RU-2020:1106-1 as SUSE-2020-1106 is not security or has no CVEs. patches: SUSE-2020-1106,SUSE-SLE-Manager-Tools-12-2020-1106 SKIP SUSE-RU-2020:1107-1 as SUSE-2020-1107 is not security or has no CVEs. patches: SUSE-2020-1107,SUSE-SLE-Manager-Tools-15-2020-1107 SKIP SUSE-RU-2020:1108-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1108 is not security or has no CVEs. patches: SUSE-2020-1108,SUSE-SLE-Module-Basesystem-15-SP1-2020-1108,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1108,SUSE-SLE-Product-HPC-15-2020-1108,SUSE-SLE-Product-SLES-15-2020-1108,SUSE-SLE-Product-SLES_SAP-15-2020-1108 SKIP SUSE-RU-2020:1112-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1112 is not security or has no CVEs. patches: SUSE-2020-1112,SUSE-SLE-Module-Basesystem-15-SP1-2020-1112 SKIP SUSE-RU-2020:1113-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1113 is not security or has no CVEs. patches: SUSE-2020-1113,SUSE-SLE-Module-Basesystem-15-SP1-2020-1113 SKIP SUSE-RU-2020:1114-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1114 is not security or has no CVEs. patches: SUSE-2020-1114,SUSE-SLE-Product-HPC-15-2020-1114,SUSE-SLE-Product-SLES_SAP-15-2020-1114 SKIP SUSE-RU-2020:1115-1 as SUSE-Storage-5-2020-1115 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1115,SUSE-2020-1115,SUSE-OpenStack-Cloud-7-2020-1115,SUSE-OpenStack-Cloud-8-2020-1115,SUSE-OpenStack-Cloud-Crowbar-8-2020-1115,SUSE-SLE-SAP-12-SP1-2020-1115,SUSE-SLE-SAP-12-SP2-2020-1115,SUSE-SLE-SAP-12-SP3-2020-1115,SUSE-SLE-SERVER-12-SP1-2020-1115,SUSE-SLE-SERVER-12-SP2-2020-1115,SUSE-SLE-SERVER-12-SP2-BCL-2020-1115,SUSE-SLE-SERVER-12-SP3-2020-1115,SUSE-SLE-SERVER-12-SP3-BCL-2020-1115,SUSE-SLE-SERVER-12-SP4-2020-1115,SUSE-Storage-5-2020-1115 SKIP SUSE-RU-2020:1120-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1120 is not security or has no CVEs. patches: SUSE-2020-1120,SUSE-SLE-INSTALLER-15-SP1-2020-1120,SUSE-SLE-Module-Basesystem-15-SP1-2020-1120 SKIP SUSE-RU-2020:1122-1 as SUSE-SLE-SERVER-12-SP5-2020-1122 is not security or has no CVEs. patches: SUSE-2020-1122,SUSE-SLE-SERVER-12-SP5-2020-1122 SKIP SUSE-RU-2020:1127-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1127 is not security or has no CVEs. patches: SUSE-2020-1127,SUSE-SLE-INSTALLER-15-SP1-2020-1127,SUSE-SLE-Module-Basesystem-15-SP1-2020-1127 SKIP SUSE-RU-2020:1128-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-1128 is not security or has no CVEs. patches: SUSE-2020-1128,SUSE-SLE-SERVER-12-SP5-2020-1128,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-1128 SKIP SUSE-RU-2020:1129-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1129 is not security or has no CVEs. patches: SUSE-2020-1129,SUSE-SLE-INSTALLER-15-2020-1129,SUSE-SLE-Product-HPC-15-2020-1129,SUSE-SLE-Product-SLES-15-2020-1129,SUSE-SLE-Product-SLES_SAP-15-2020-1129 SKIP SUSE-RU-2020:1130-1 as SUSE-SLE-SERVER-12-SP4-2020-1130 is not security or has no CVEs. patches: SUSE-2020-1130,SUSE-SLE-SERVER-12-SP4-2020-1130 SKIP SUSE-RU-2020:1131-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1131 is not security or has no CVEs. patches: SUSE-2020-1131,SUSE-SLE-Module-Basesystem-15-SP1-2020-1131,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1131,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1131,SUSE-SLE-Product-HPC-15-2020-1131,SUSE-SLE-Product-SLES-15-2020-1131,SUSE-SLE-Product-SLES_SAP-15-2020-1131 SKIP SUSE-RU-2020:1136-1 as SUSE-SLE-Product-HA-15-2020-1136 is not security or has no CVEs. patches: SUSE-2020-1136,SUSE-SLE-Product-HA-15-2020-1136 SKIP SUSE-RU-2020:1137-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1137 is not security or has no CVEs. patches: SUSE-2020-1137,SUSE-SLE-Module-Basesystem-15-SP1-2020-1137 SKIP SUSE-RU-2020:1140-1 as SUSE-2020-1140 is not security or has no CVEs. patches: SUSE-2020-1140,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1140 SKIP SUSE-RU-2020:1143-1 as SUSE-SLE-HA-12-SP5-2020-1143 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1143,SUSE-2020-1143,SUSE-OpenStack-Cloud-7-2020-1143,SUSE-OpenStack-Cloud-8-2020-1143,SUSE-OpenStack-Cloud-9-2020-1143,SUSE-OpenStack-Cloud-Crowbar-8-2020-1143,SUSE-OpenStack-Cloud-Crowbar-9-2020-1143,SUSE-SLE-HA-12-SP3-2020-1143,SUSE-SLE-HA-12-SP4-2020-1143,SUSE-SLE-HA-12-SP5-2020-1143 SKIP SUSE-RU-2020:1155-1 as SUSE-SLE-Module-Public-Cloud-15-2020-1155 is not security or has no CVEs. patches: SUSE-2020-1155,SUSE-SLE-Module-Public-Cloud-15-2020-1155 SKIP SUSE-RU-2020:1159-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1159 is not security or has no CVEs. patches: SUSE-2020-1159,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1159 SKIP SUSE-RU-2020:1159-2 as SUSE-SLE-Module-Public-Cloud-15-2020-1159 is not security or has no CVEs. patches: SUSE-2020-1159,SUSE-SLE-Module-Public-Cloud-15-2020-1159 SKIP SUSE-RU-2020:1160-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1160 is not security or has no CVEs. patches: SUSE-2020-1160,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1160 SKIP SUSE-RU-2020:1162-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1162 is not security or has no CVEs. patches: SUSE-2020-1162,SUSE-SLE-Module-Public-Cloud-12-2020-1162 SKIP SUSE-RU-2020:1168-1 as SUSE-SLE-SERVER-12-SP5-2020-1168 is not security or has no CVEs. patches: SUSE-2020-1168,SUSE-SLE-SDK-12-SP4-2020-1168,SUSE-SLE-SDK-12-SP5-2020-1168,SUSE-SLE-SERVER-12-SP4-2020-1168,SUSE-SLE-SERVER-12-SP5-2020-1168 SKIP SUSE-RU-2020:1169-1 as SUSE-SLE-SERVER-12-SP5-2020-1169 is not security or has no CVEs. patches: SUSE-2020-1169,SUSE-SLE-SDK-12-SP4-2020-1169,SUSE-SLE-SDK-12-SP5-2020-1169,SUSE-SLE-SERVER-12-SP4-2020-1169,SUSE-SLE-SERVER-12-SP5-2020-1169 SKIP SUSE-RU-2020:1170-1 as SUSE-Storage-6-2020-1170 is not security or has no CVEs. patches: SUSE-2020-1170,SUSE-SLE-Module-Basesystem-15-SP1-2020-1170,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1170,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1170,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1170,SUSE-Storage-6-2020-1170 SKIP SUSE-RU-2020:1172-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1172 is not security or has no CVEs. patches: SUSE-2020-1172,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1172 SKIP SUSE-RU-2020:1173-1 as SUSE-Storage-6-2020-1173 is not security or has no CVEs. patches: SUSE-2020-1173,SUSE-Storage-6-2020-1173 SKIP SUSE-RU-2020:1174-1 as SUSE-SLE-SERVER-12-SP4-2020-1174 is not security or has no CVEs. patches: SUSE-2020-1174,SUSE-SLE-SERVER-12-SP4-2020-1174 SKIP SUSE-RU-2020:1175-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1175 is not security or has no CVEs. patches: SUSE-2020-1175,SUSE-SLE-INSTALLER-15-SP1-2020-1175,SUSE-SLE-Module-Basesystem-15-SP1-2020-1175,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1175,SUSE-SLE-Product-HPC-15-2020-1175,SUSE-SLE-Product-SLES-15-2020-1175,SUSE-SLE-Product-SLES_SAP-15-2020-1175 SKIP SUSE-RU-2020:1181-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1181 is not security or has no CVEs. patches: SUSE-2020-1181,SUSE-SLE-Module-Basesystem-15-SP1-2020-1181 SKIP SUSE-RU-2020:1182-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1182 is not security or has no CVEs. patches: SUSE-2020-1182,SUSE-SLE-Module-Basesystem-15-SP1-2020-1182,SUSE-SLE-Product-HPC-15-2020-1182,SUSE-SLE-Product-SLES-15-2020-1182,SUSE-SLE-Product-SLES_SAP-15-2020-1182 SKIP SUSE-RU-2020:1183-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1183 is not security or has no CVEs. patches: SUSE-2020-1183,SUSE-SLE-Module-Basesystem-15-SP1-2020-1183 SKIP SUSE-RU-2020:1184-1 as SUSE-SLE-Product-HA-15-SP1-2020-1184 is not security or has no CVEs. patches: SUSE-2020-1184,SUSE-SLE-Product-HA-15-SP1-2020-1184 SKIP SUSE-RU-2020:1185-1 as SUSE-SLE-Product-HA-15-2020-1185 is not security or has no CVEs. patches: SUSE-2020-1185,SUSE-SLE-Product-HA-15-2020-1185 SKIP SUSE-RU-2020:1186-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1186 is not security or has no CVEs. patches: SUSE-2020-1186,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1186,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1186 SKIP SUSE-RU-2020:1187-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1187 is not security or has no CVEs. patches: SUSE-2020-1187,SUSE-SLE-Module-Basesystem-15-SP1-2020-1187,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1187,SUSE-SLE-Module-Python2-15-SP1-2020-1187 SKIP SUSE-RU-2020:1188-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1188 is not security or has no CVEs. patches: SUSE-2020-1188,SUSE-SLE-Module-Public-Cloud-15-2020-1188,SUSE-SLE-Product-HPC-15-2020-1188,SUSE-SLE-Product-SLES-15-2020-1188,SUSE-SLE-Product-SLES_SAP-15-2020-1188 SKIP SUSE-RU-2020:1189-1 as SUSE-SLE-SERVER-12-SP5-2020-1189 is not security or has no CVEs. patches: SUSE-2020-1189,SUSE-OpenStack-Cloud-7-2020-1189,SUSE-SLE-SERVER-12-SP5-2020-1189 SKIP SUSE-RU-2020:1192-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1192 is not security or has no CVEs. patches: SUSE-2020-1192,SUSE-SLE-Product-HPC-15-2020-1192,SUSE-SLE-Product-SLES-15-2020-1192,SUSE-SLE-Product-SLES_SAP-15-2020-1192 SKIP SUSE-RU-2020:1201-1 as SUSE-SLE-Product-HA-15-SP1-2020-1201 is not security or has no CVEs. patches: SUSE-2020-1201,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1201,SUSE-SLE-Product-HA-15-2020-1201,SUSE-SLE-Product-HA-15-SP1-2020-1201 SKIP SUSE-RU-2020:1202-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1202 is not security or has no CVEs. patches: SUSE-2020-1202,SUSE-SLE-Module-SAP-Applications-15-2020-1202,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1202 SKIP SUSE-RU-2020:1203-1 as SUSE-SLE-SAP-12-SP5-2020-1203 is not security or has no CVEs. patches: SUSE-2020-1203,SUSE-SLE-SAP-12-SP1-2020-1203,SUSE-SLE-SAP-12-SP2-2020-1203,SUSE-SLE-SAP-12-SP3-2020-1203,SUSE-SLE-SAP-12-SP4-2020-1203,SUSE-SLE-SAP-12-SP5-2020-1203 SKIP SUSE-RU-2020:1204-1 as SUSE-SLE-SERVER-12-SP5-2020-1204 is not security or has no CVEs. patches: SUSE-2020-1204,SUSE-SLE-SAP-12-SP5-2020-1204,SUSE-SLE-SERVER-12-SP5-2020-1204 SKIP SUSE-RU-2020:1205-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1205 is not security or has no CVEs. patches: SUSE-2020-1205,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1205,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1205 SKIP SUSE-RU-2020:1206-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1206 is not security or has no CVEs. patches: SUSE-2020-1206,SUSE-SLE-Product-HPC-15-2020-1206,SUSE-SLE-Product-SLES-15-2020-1206,SUSE-SLE-Product-SLES_SAP-15-2020-1206 SKIP SUSE-RU-2020:1214-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1214 is not security or has no CVEs. patches: SUSE-2020-1214,SUSE-SLE-Module-Basesystem-15-SP1-2020-1214,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1214 SKIP SUSE-RU-2020:1216-1 as SUSE-SLE-HA-12-SP1-2020-1216 is not security or has no CVEs. patches: SUSE-2020-1216,SUSE-SLE-HA-12-SP1-2020-1216 SKIP SUSE-RU-2020:1217-1 as SUSE-SLE-WE-12-SP5-2020-1217 is not security or has no CVEs. patches: SUSE-2020-1217,SUSE-SLE-SDK-12-SP4-2020-1217,SUSE-SLE-SDK-12-SP5-2020-1217,SUSE-SLE-WE-12-SP4-2020-1217,SUSE-SLE-WE-12-SP5-2020-1217 SKIP SUSE-RU-2020:1222-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1222 is not security or has no CVEs. patches: SUSE-2020-1222,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1222,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1222 SKIP SUSE-RU-2020:1223-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1223 is not security or has no CVEs. patches: SUSE-2020-1223,SUSE-SLE-Module-Public-Cloud-12-2020-1223 SKIP SUSE-RU-2020:1224-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1224 is not security or has no CVEs. patches: SUSE-2020-1224,SUSE-SLE-Module-Public-Cloud-12-2020-1224 SKIP SUSE-RU-2020:1226-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1226 is not security or has no CVEs. patches: SUSE-2020-1226,SUSE-SLE-Module-Basesystem-15-SP1-2020-1226,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1226,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1226 SKIP SUSE-RU-2020:1226-2 as SUSE-SLE-Product-SLES_SAP-15-2020-1226 is not security or has no CVEs. patches: SUSE-2020-1226,SUSE-SLE-Product-HPC-15-2020-1226,SUSE-SLE-Product-SLES-15-2020-1226,SUSE-SLE-Product-SLES_SAP-15-2020-1226 SKIP SUSE-RU-2020:1229-1 as SUSE-2020-1229 is not security or has no CVEs. patches: SUSE-2020-1229,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1229 SKIP SUSE-RU-2020:1230-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1230 is not security or has no CVEs. patches: SUSE-2020-1230,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1230 SKIP SUSE-RU-2020:1231-1 as SUSE-SLE-SERVER-12-SP5-2020-1231 is not security or has no CVEs. patches: SUSE-2020-1231,SUSE-SLE-SDK-12-SP4-2020-1231,SUSE-SLE-SDK-12-SP5-2020-1231,SUSE-SLE-SERVER-12-SP4-2020-1231,SUSE-SLE-SERVER-12-SP5-2020-1231 SKIP SUSE-RU-2020:1232-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1232 is not security or has no CVEs. patches: SUSE-2020-1232,SUSE-SLE-INSTALLER-15-SP1-2020-1232,SUSE-SLE-Module-Basesystem-15-SP1-2020-1232 SKIP SUSE-RU-2020:1235-1 as SUSE-SLE-Manager-Tools-12-2020-1235 is not security or has no CVEs. patches: SUSE-2020-1235,SUSE-SLE-Manager-Tools-12-2020-1235 SKIP SUSE-RU-2020:1236-1 as SUSE-SLE-Manager-Tools-15-2020-1236 is not security or has no CVEs. patches: SUSE-2020-1236,SUSE-SLE-Manager-Tools-15-2020-1236,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1236 SKIP SUSE-RU-2020:1243-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-1243 is not security or has no CVEs. patches: SUSE-2020-1243,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1243,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-1243,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-1243,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-1243 SKIP SUSE-RU-2020:1244-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1244 is not security or has no CVEs. patches: SUSE-2020-1244,SUSE-SLE-Module-Basesystem-15-SP1-2020-1244,SUSE-SLE-Module-Python2-15-SP1-2020-1244,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1244 SKIP SUSE-RU-2020:1245-1 as SUSE-SUSE-Manager-Server-3.2-2020-1245 is not security or has no CVEs. patches: SUSE-2020-1245,SUSE-SLE-Manager-Tools-12-2020-1245,SUSE-SLE-Module-Adv-Systems-Management-12-2020-1245,SUSE-SLE-POS-12-SP2-2020-1245,SUSE-SUSE-Manager-Proxy-3.2-2020-1245,SUSE-SUSE-Manager-Server-3.2-2020-1245 SKIP SUSE-RU-2020:1246-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1246 is not security or has no CVEs. patches: SUSE-2020-1246,SUSE-SLE-Product-HPC-15-2020-1246,SUSE-SLE-Product-SLES-15-2020-1246,SUSE-SLE-Product-SLES_SAP-15-2020-1246 SKIP SUSE-RU-2020:1247-1 as SUSE-2020-1247 is not security or has no CVEs. patches: SUSE-2020-1247,SUSE-SLE-Module-Basesystem-15-SP2-2020-1247 SKIP SUSE-RU-2020:1251-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1251 is not security or has no CVEs. patches: SUSE-2020-1251,SUSE-SLE-Module-Public-Cloud-12-2020-1251 SKIP SUSE-RU-2020:1252-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1252 is not security or has no CVEs. patches: SUSE-2020-1252,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1252 SKIP SUSE-RU-2020:1252-2 as SUSE-SLE-Module-Public-Cloud-15-2020-1252 is not security or has no CVEs. patches: SUSE-2020-1252,SUSE-SLE-Module-Public-Cloud-15-2020-1252,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1252 SKIP SUSE-RU-2020:1253-1 as SUSE-SLE-Product-SLES-15-SP1-2020-1253 is not security or has no CVEs. patches: SUSE-2020-1253,SUSE-SLE-INSTALLER-15-SP1-2020-1253,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1253,SUSE-SLE-Product-SLES-15-SP1-2020-1253 SKIP SUSE-RU-2020:1254-1 as SUSE-Storage-5-2020-1254 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1254,SUSE-2020-1254,SUSE-OpenStack-Cloud-7-2020-1254,SUSE-OpenStack-Cloud-8-2020-1254,SUSE-OpenStack-Cloud-Crowbar-8-2020-1254,SUSE-SLE-SAP-12-SP1-2020-1254,SUSE-SLE-SAP-12-SP2-2020-1254,SUSE-SLE-SAP-12-SP3-2020-1254,SUSE-SLE-SDK-12-SP4-2020-1254,SUSE-SLE-SDK-12-SP5-2020-1254,SUSE-SLE-SERVER-12-SP1-2020-1254,SUSE-SLE-SERVER-12-SP2-2020-1254,SUSE-SLE-SERVER-12-SP2-BCL-2020-1254,SUSE-SLE-SERVER-12-SP3-2020-1254,SUSE-SLE-SERVER-12-SP3-BCL-2020-1254,SUSE-SLE-SERVER-12-SP4-2020-1254,SUSE-SLE-SERVER-12-SP5-2020-1254,SUSE-Storage-5-2020-1254 SKIP SUSE-RU-2020:1257-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1257 is not security or has no CVEs. patches: SUSE-2020-1257,SUSE-SLE-Module-Public-Cloud-12-2020-1257 SKIP SUSE-RU-2020:1258-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1258 is not security or has no CVEs. patches: SUSE-2020-1258,SUSE-SLE-Module-Public-Cloud-12-2020-1258 SKIP SUSE-RU-2020:1259-1 as SUSE-SLE-Module-HPC-12-2020-1259 is not security or has no CVEs. patches: SUSE-2020-1259,SUSE-SLE-Module-HPC-12-2020-1259 SKIP SUSE-RU-2020:1261-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1261 is not security or has no CVEs. patches: SUSE-2020-1261,SUSE-SLE-Manager-Tools-15-2020-1261,SUSE-SLE-Module-Basesystem-15-SP2-2020-1261,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-1261,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1261 SKIP SUSE-RU-2020:1263-1 as SUSE-SLE-Product-HA-15-SP1-2020-1263 is not security or has no CVEs. patches: SUSE-2020-1263,SUSE-SLE-Product-HA-15-2020-1263,SUSE-SLE-Product-HA-15-SP1-2020-1263 SKIP SUSE-RU-2020:1266-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1266 is not security or has no CVEs. patches: SUSE-2020-1266,SUSE-SLE-Module-Basesystem-15-SP1-2020-1266 SKIP SUSE-RU-2020:1267-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1267 is not security or has no CVEs. patches: SUSE-2020-1267,SUSE-SLE-Product-HPC-15-2020-1267,SUSE-SLE-Product-SLES-15-2020-1267,SUSE-SLE-Product-SLES_SAP-15-2020-1267 SKIP SUSE-RU-2020:1268-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1268 is not security or has no CVEs. patches: SUSE-2020-1268,SUSE-SLE-Module-Basesystem-15-SP1-2020-1268,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1268 SKIP SUSE-RU-2020:1269-1 as SUSE-SLE-SERVER-12-SP4-2020-1269 is not security or has no CVEs. patches: SUSE-2020-1269,SUSE-SLE-SERVER-12-SP4-2020-1269 SKIP SUSE-RU-2020:1270-1 as SUSE-SLE-SERVER-12-SP5-2020-1270 is not security or has no CVEs. patches: SUSE-2020-1270,SUSE-SLE-SERVER-12-SP5-2020-1270 SKIP SUSE-RU-2020:1271-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1271 is not security or has no CVEs. patches: SUSE-2020-1271,SUSE-SLE-Module-Basesystem-15-SP1-2020-1271 SKIP SUSE-RU-2020:1276-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1276 is not security or has no CVEs. patches: SUSE-2020-1276,SUSE-SLE-Module-Public-Cloud-12-2020-1276 SKIP SUSE-RU-2020:1279-1 as SUSE-Storage-5-2020-1279 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1279,SUSE-2020-1279,SUSE-OpenStack-Cloud-7-2020-1279,SUSE-OpenStack-Cloud-8-2020-1279,SUSE-OpenStack-Cloud-Crowbar-8-2020-1279,SUSE-SLE-SAP-12-SP2-2020-1279,SUSE-SLE-SAP-12-SP3-2020-1279,SUSE-SLE-SERVER-12-SP2-2020-1279,SUSE-SLE-SERVER-12-SP2-BCL-2020-1279,SUSE-SLE-SERVER-12-SP3-2020-1279,SUSE-SLE-SERVER-12-SP3-BCL-2020-1279,SUSE-SLE-SERVER-12-SP4-2020-1279,SUSE-SLE-SERVER-12-SP5-2020-1279,SUSE-Storage-5-2020-1279 SKIP SUSE-RU-2020:1281-1 as SUSE-Storage-6-2020-1281 is not security or has no CVEs. patches: SUSE-2020-1281,SUSE-Storage-6-2020-1281 SKIP SUSE-RU-2020:1284-1 as SUSE-SLE-HA-12-SP5-2020-1284 is not security or has no CVEs. patches: SUSE-2020-1284,SUSE-SLE-HA-12-SP4-2020-1284,SUSE-SLE-HA-12-SP5-2020-1284 SKIP SUSE-RU-2020:1286-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1286 is not security or has no CVEs. patches: SUSE-2020-1286,SUSE-SLE-Module-Basesystem-15-SP1-2020-1286,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1286,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1286 SKIP SUSE-RU-2020:1287-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1287 is not security or has no CVEs. patches: SUSE-2020-1287,SUSE-SLE-Module-Public-Cloud-12-2020-1287 SKIP SUSE-RU-2020:1288-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1288 is not security or has no CVEs. patches: SUSE-2020-1288,SUSE-SLE-Module-Public-Cloud-15-2020-1288,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1288 SKIP SUSE-RU-2020:1290-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1290 is not security or has no CVEs. patches: SUSE-2020-1290,SUSE-SLE-Module-Basesystem-15-SP1-2020-1290,SUSE-SLE-Module-Basesystem-15-SP2-2020-1290,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1290,SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2020-1290,SUSE-SLE-Product-HPC-15-2020-1290,SUSE-SLE-Product-SLES-15-2020-1290,SUSE-SLE-Product-SLES_SAP-15-2020-1290 SKIP SUSE-RU-2020:1291-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1291 is not security or has no CVEs. patches: SUSE-2020-1291,SUSE-SLE-Module-Basesystem-15-SP1-2020-1291,SUSE-SLE-Product-HPC-15-2020-1291,SUSE-SLE-Product-SLES-15-2020-1291,SUSE-SLE-Product-SLES_SAP-15-2020-1291 SKIP SUSE-RU-2020:1303-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1303 is not security or has no CVEs. patches: SUSE-2020-1303,SUSE-SLE-Module-Basesystem-15-SP1-2020-1303,SUSE-SLE-Product-HPC-15-2020-1303,SUSE-SLE-Product-SLES-15-2020-1303,SUSE-SLE-Product-SLES_SAP-15-2020-1303 SKIP SUSE-RU-2020:1304-1 as SUSE-SLE-SERVER-12-SP5-2020-1304 is not security or has no CVEs. patches: SUSE-2020-1304,SUSE-SLE-SDK-12-SP5-2020-1304,SUSE-SLE-SERVER-12-SP5-2020-1304 SKIP SUSE-RU-2020:1305-1 as SUSE-SLE-Product-HA-15-SP1-2020-1305 is not security or has no CVEs. patches: SUSE-2020-1305,SUSE-SLE-Product-HA-15-SP1-2020-1305 SKIP SUSE-RU-2020:1306-1 as SUSE-SLE-SERVER-12-SP5-2020-1306 is not security or has no CVEs. patches: SUSE-2020-1306,SUSE-SLE-SERVER-12-SP4-2020-1306,SUSE-SLE-SERVER-12-SP5-2020-1306 SKIP SUSE-RU-2020:1308-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1308 is not security or has no CVEs. patches: SUSE-2020-1308,SUSE-SLE-Module-Basesystem-15-SP1-2020-1308 SKIP SUSE-RU-2020:1309-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1309 is not security or has no CVEs. patches: SUSE-2020-1309,SUSE-SLE-Module-Basesystem-15-SP1-2020-1309,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1309 SKIP SUSE-RU-2020:1310-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1310 is not security or has no CVEs. patches: SUSE-2020-1310,SUSE-SLE-Module-Basesystem-15-SP1-2020-1310,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1310 SKIP SUSE-RU-2020:1311-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1311 is not security or has no CVEs. patches: SUSE-2020-1311,SUSE-SLE-Module-Basesystem-15-SP1-2020-1311 SKIP SUSE-RU-2020:1312-1 as SUSE-Storage-5-2020-1312 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1312,SUSE-2020-1312,SUSE-OpenStack-Cloud-7-2020-1312,SUSE-OpenStack-Cloud-8-2020-1312,SUSE-OpenStack-Cloud-Crowbar-8-2020-1312,SUSE-SLE-SAP-12-SP1-2020-1312,SUSE-SLE-SAP-12-SP2-2020-1312,SUSE-SLE-SAP-12-SP3-2020-1312,SUSE-SLE-SERVER-12-SP1-2020-1312,SUSE-SLE-SERVER-12-SP2-2020-1312,SUSE-SLE-SERVER-12-SP2-BCL-2020-1312,SUSE-SLE-SERVER-12-SP3-2020-1312,SUSE-SLE-SERVER-12-SP3-BCL-2020-1312,SUSE-SLE-SERVER-12-SP4-2020-1312,SUSE-SLE-SERVER-12-SP5-2020-1312,SUSE-Storage-5-2020-1312 SKIP SUSE-RU-2020:1313-1 as SUSE-SLE-Product-HA-15-2020-1313 is not security or has no CVEs. patches: SUSE-2020-1313,SUSE-SLE-Product-HA-15-2020-1313 SKIP SUSE-RU-2020:1314-1 as SUSE-SLE-HA-12-SP5-2020-1314 is not security or has no CVEs. patches: SUSE-2020-1314,SUSE-SLE-HA-12-SP4-2020-1314,SUSE-SLE-HA-12-SP5-2020-1314 SKIP SUSE-RU-2020:1315-1 as SUSE-SLE-Product-WE-15-SP1-2020-1315 is not security or has no CVEs. patches: SUSE-2020-1315,SUSE-SLE-Product-WE-15-SP1-2020-1315 SKIP SUSE-RU-2020:1316-1 as SUSE-SLE-WE-12-SP5-2020-1316 is not security or has no CVEs. patches: SUSE-2020-1316,SUSE-SLE-SDK-12-SP4-2020-1316,SUSE-SLE-SDK-12-SP5-2020-1316,SUSE-SLE-SERVER-12-SP4-2020-1316,SUSE-SLE-SERVER-12-SP5-2020-1316,SUSE-SLE-WE-12-SP4-2020-1316,SUSE-SLE-WE-12-SP5-2020-1316 SKIP SUSE-RU-2020:1317-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1317 is not security or has no CVEs. patches: SUSE-2020-1317,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1317,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1317 SKIP SUSE-RU-2020:1318-1 as SUSE-Storage-6-2020-1318 is not security or has no CVEs. patches: SUSE-2020-1318,SUSE-Storage-6-2020-1318 SKIP SUSE-RU-2020:1319-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1319 is not security or has no CVEs. patches: SUSE-2020-1319,SUSE-SLE-Module-Basesystem-15-SP1-2020-1319 SKIP SUSE-RU-2020:1320-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1320 is not security or has no CVEs. patches: SUSE-2020-1320,SUSE-SLE-Module-Public-Cloud-12-2020-1320 SKIP SUSE-RU-2020:1321-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1321 is not security or has no CVEs. patches: SUSE-2020-1321,SUSE-SLE-Module-Public-Cloud-15-2020-1321,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1321 SKIP SUSE-RU-2020:1322-1 as SUSE-SLE-HA-12-SP1-2020-1322 is not security or has no CVEs. patches: SUSE-2020-1322,SUSE-SLE-HA-12-SP1-2020-1322 SKIP SUSE-RU-2020:1323-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1323 is not security or has no CVEs. patches: SUSE-2020-1323,SUSE-SLE-Module-Public-Cloud-15-2020-1323,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1323 SKIP SUSE-RU-2020:1324-1 as SUSE-SLE-HA-12-SP1-2020-1324 is not security or has no CVEs. patches: SUSE-2020-1324,SUSE-SLE-HA-12-SP1-2020-1324 SKIP SUSE-RU-2020:1325-1 as SUSE-SLE-SERVER-12-SP5-2020-1325 is not security or has no CVEs. patches: SUSE-2020-1325,SUSE-SLE-SERVER-12-SP4-2020-1325,SUSE-SLE-SERVER-12-SP5-2020-1325 SKIP SUSE-RU-2020:1326-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1326 is not security or has no CVEs. patches: SUSE-2020-1326,SUSE-SLE-Product-HPC-15-2020-1326,SUSE-SLE-Product-SLES-15-2020-1326,SUSE-SLE-Product-SLES_SAP-15-2020-1326 SKIP SUSE-RU-2020:1327-1 as SUSE-SLE-Product-WE-15-SP1-2020-1327 is not security or has no CVEs. patches: SUSE-2020-1327,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1327,SUSE-SLE-Product-WE-15-SP1-2020-1327 SKIP SUSE-RU-2020:1328-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1328 is not security or has no CVEs. patches: SUSE-2020-1328,SUSE-SLE-Module-Basesystem-15-SP1-2020-1328 SKIP SUSE-RU-2020:1329-1 as SUSE-Storage-5-2020-1329 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1329,SUSE-2020-1329,SUSE-OpenStack-Cloud-7-2020-1329,SUSE-OpenStack-Cloud-8-2020-1329,SUSE-OpenStack-Cloud-Crowbar-8-2020-1329,SUSE-SLE-Module-Toolchain-12-2020-1329,SUSE-SLE-SAP-12-SP1-2020-1329,SUSE-SLE-SAP-12-SP2-2020-1329,SUSE-SLE-SAP-12-SP3-2020-1329,SUSE-SLE-SERVER-12-SP1-2020-1329,SUSE-SLE-SERVER-12-SP2-2020-1329,SUSE-SLE-SERVER-12-SP2-BCL-2020-1329,SUSE-SLE-SERVER-12-SP3-2020-1329,SUSE-SLE-SERVER-12-SP3-BCL-2020-1329,SUSE-SLE-SERVER-12-SP4-2020-1329,SUSE-SLE-SERVER-12-SP5-2020-1329,SUSE-Storage-5-2020-1329 SKIP SUSE-RU-2020:1330-1 as SUSE-SLE-Product-WE-15-SP1-2020-1330 is not security or has no CVEs. patches: SUSE-2020-1330,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1330,SUSE-SLE-Product-WE-15-SP1-2020-1330 SKIP SUSE-RU-2020:1331-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1331 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1331,SUSE-2020-1331,SUSE-OpenStack-Cloud-8-2020-1331,SUSE-OpenStack-Cloud-Crowbar-8-2020-1331,SUSE-SLE-Module-Public-Cloud-12-2020-1331 SKIP SUSE-RU-2020:1332-1 as SUSE-Storage-6-2020-1332 is not security or has no CVEs. patches: SUSE-2020-1332,SUSE-Storage-6-2020-1332 SKIP SUSE-RU-2020:1333-1 as SUSE-2020-1333 is not security or has no CVEs. patches: SUSE-2020-1333,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1333 SKIP SUSE-RU-2020:1340-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1340 is not security or has no CVEs. patches: SUSE-2020-1340,SUSE-SLE-Module-Basesystem-15-SP1-2020-1340,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1340,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1340 SKIP SUSE-RU-2020:1341-1 as SUSE-2020-1341 is not security or has no CVEs. patches: SUSE-2020-1341,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-1341 SKIP SUSE-RU-2020:1344-1 as SUSE-SLE-SERVER-12-SP5-2020-1344 is not security or has no CVEs. patches: SUSE-2020-1344,SUSE-SLE-SERVER-12-SP5-2020-1344 SKIP SUSE-RU-2020:1348-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1348 is not security or has no CVEs. patches: SUSE-2020-1348,SUSE-SLE-Module-Basesystem-15-SP1-2020-1348,SUSE-SLE-Module-Basesystem-15-SP2-2020-1348,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1348,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1348,SUSE-SLE-Product-HPC-15-2020-1348,SUSE-SLE-Product-SLES-15-2020-1348,SUSE-SLE-Product-SLES_SAP-15-2020-1348 SKIP SUSE-RU-2020:1349-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1349 is not security or has no CVEs. patches: SUSE-2020-1349,SUSE-SLE-INSTALLER-15-2020-1349,SUSE-SLE-Product-HPC-15-2020-1349,SUSE-SLE-Product-SLES-15-2020-1349,SUSE-SLE-Product-SLES_SAP-15-2020-1349 SKIP SUSE-RU-2020:1354-1 as SUSE-SLE-Product-WE-15-SP1-2020-1354 is not security or has no CVEs. patches: SUSE-2020-1354,SUSE-SLE-Product-WE-15-SP1-2020-1354 SKIP SUSE-RU-2020:1355-1 as SUSE-SLE-SERVER-12-SP5-2020-1355 is not security or has no CVEs. patches: SUSE-2020-1355,SUSE-SLE-SERVER-12-SP5-2020-1355 SKIP SUSE-RU-2020:1356-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1356 is not security or has no CVEs. patches: SUSE-2020-1356,SUSE-SLE-Module-Basesystem-15-SP1-2020-1356 SKIP SUSE-RU-2020:1357-1 as SUSE-Storage-5-2020-1357 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1357,SUSE-2020-1357,SUSE-OpenStack-Cloud-8-2020-1357,SUSE-OpenStack-Cloud-Crowbar-8-2020-1357,SUSE-SLE-SAP-12-SP3-2020-1357,SUSE-SLE-SERVER-12-SP3-2020-1357,SUSE-SLE-SERVER-12-SP3-BCL-2020-1357,SUSE-Storage-5-2020-1357 SKIP SUSE-RU-2020:1359-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1359 is not security or has no CVEs. patches: SUSE-2020-1359,SUSE-SLE-Module-Basesystem-15-SP1-2020-1359 SKIP SUSE-RU-2020:1361-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1361 is not security or has no CVEs. patches: SUSE-2020-1361,SUSE-SLE-Module-Basesystem-15-SP1-2020-1361 SKIP SUSE-RU-2020:1361-2 as SUSE-SLE-Module-Certifications-15-SP3-2022-2385 is not security or has no CVEs. patches: SUSE-2020-1361,SUSE-SLE-Module-Certifications-15-SP3-2022-2385 SKIP SUSE-RU-2020:1362-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1362 is not security or has no CVEs. patches: SUSE-2020-1362,SUSE-SLE-Product-HPC-15-2020-1362,SUSE-SLE-Product-SLES-15-2020-1362,SUSE-SLE-Product-SLES_SAP-15-2020-1362 SKIP SUSE-RU-2020:1368-1 as SUSE-SLE-Module-Containers-12-2020-1368 is not security or has no CVEs. patches: SUSE-2020-1368,SUSE-SLE-Module-Containers-12-2020-1368 SKIP SUSE-RU-2020:1369-1 as SUSE-Storage-6-2020-1369 is not security or has no CVEs. patches: SUSE-2020-1369,SUSE-Storage-6-2020-1369 SKIP SUSE-RU-2020:1370-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1370 is not security or has no CVEs. patches: SUSE-2020-1370,SUSE-SLE-Module-Basesystem-15-SP1-2020-1370 SKIP SUSE-RU-2020:1371-1 as SUSE-SLE-SDK-12-SP5-2020-1371 is not security or has no CVEs. patches: SUSE-2020-1371,SUSE-SLE-SDK-12-SP4-2020-1371,SUSE-SLE-SDK-12-SP5-2020-1371 SKIP SUSE-RU-2020:1372-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1372 is not security or has no CVEs. patches: SUSE-2020-1372,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1372 SKIP SUSE-RU-2020:1373-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1373 is not security or has no CVEs. patches: SUSE-2020-1373,SUSE-SLE-Module-Basesystem-15-SP1-2020-1373 SKIP SUSE-RU-2020:1374-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1374 is not security or has no CVEs. patches: SUSE-2020-1374,SUSE-SLE-INSTALLER-15-2020-1374,SUSE-SLE-Product-SLES-15-2020-1374,SUSE-SLE-Product-SLES_SAP-15-2020-1374 SKIP SUSE-RU-2020:1375-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-1375 is not security or has no CVEs. patches: SUSE-2020-1375,SUSE-SLE-SERVER-12-SP4-2020-1375,SUSE-SLE-SERVER-INSTALLER-12-SP4-2020-1375 SKIP SUSE-RU-2020:1376-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-1376 is not security or has no CVEs. patches: SUSE-2020-1376,SUSE-SLE-SERVER-12-SP5-2020-1376,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-1376 SKIP SUSE-RU-2020:1377-1 as SUSE-SLE-WE-12-SP5-2020-1377 is not security or has no CVEs. patches: SUSE-2020-1377,SUSE-SLE-SDK-12-SP4-2020-1377,SUSE-SLE-SDK-12-SP5-2020-1377,SUSE-SLE-SERVER-12-SP4-2020-1377,SUSE-SLE-SERVER-12-SP5-2020-1377,SUSE-SLE-WE-12-SP4-2020-1377,SUSE-SLE-WE-12-SP5-2020-1377 SKIP SUSE-RU-2020:1378-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1378 is not security or has no CVEs. patches: SUSE-2020-1378,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1378 SKIP SUSE-RU-2020:1386-1 as SUSE-SLE-SDK-12-SP5-2020-1386 is not security or has no CVEs. patches: SUSE-2020-1386,SUSE-SLE-HA-12-SP3-2020-1386,SUSE-SLE-HA-12-SP4-2020-1386,SUSE-SLE-HA-12-SP5-2020-1386,SUSE-SLE-SDK-12-SP4-2020-1386,SUSE-SLE-SDK-12-SP5-2020-1386 SKIP SUSE-RU-2020:1387-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-1387 is not security or has no CVEs. patches: SUSE-2020-1387,SUSE-OpenStack-Cloud-7-2020-1387,SUSE-SLE-SAP-12-SP2-2020-1387,SUSE-SLE-SAP-INSTALLER-12-SP2-2020-1387,SUSE-SLE-SERVER-12-SP2-2020-1387,SUSE-SLE-SERVER-12-SP2-BCL-2020-1387 SKIP SUSE-RU-2020:1389-1 as SUSE-SLE-Module-Live-Patching-15-SP1-2020-1388 is not security or has no CVEs. patches: SUSE-2020-1389,SUSE-SLE-Live-Patching-12-2020-1389,SUSE-SLE-Live-Patching-12-SP3-2020-1389,SUSE-SLE-Live-Patching-12-SP4-2020-1389,SUSE-SLE-Live-Patching-12-SP5-2020-1389,SUSE-SLE-Module-Live-Patching-15-2020-1388,SUSE-SLE-Module-Live-Patching-15-SP1-2020-1388 SKIP SUSE-RU-2020:1390-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1390 is not security or has no CVEs. patches: SUSE-2020-1390,SUSE-SLE-INSTALLER-15-SP1-2020-1390,SUSE-SLE-Module-Basesystem-15-SP1-2020-1390 SKIP SUSE-RU-2020:1391-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1391 is not security or has no CVEs. patches: SUSE-2020-1391,SUSE-SLE-INSTALLER-15-SP1-2020-1391,SUSE-SLE-Module-Basesystem-15-SP1-2020-1391,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1391 SKIP SUSE-RU-2020:1394-1 as SUSE-SLE-Product-WE-15-SP1-2020-1394 is not security or has no CVEs. patches: SUSE-2020-1394,SUSE-SLE-Product-WE-15-SP1-2020-1394 SKIP SUSE-RU-2020:1397-1 as SUSE-SLE-Module-HPC-15-SP1-2020-1397 is not security or has no CVEs. patches: SUSE-2020-1397,SUSE-SLE-Module-HPC-15-SP1-2020-1397 SKIP SUSE-RU-2020:1400-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1400 is not security or has no CVEs. patches: SUSE-2020-1400,SUSE-SLE-Module-Basesystem-15-SP1-2020-1400,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1400 SKIP SUSE-RU-2020:1401-1 as SUSE-SLE-Module-HPC-15-SP1-2020-1401 is not security or has no CVEs. patches: SUSE-2020-1401,SUSE-SLE-Module-HPC-15-SP1-2020-1401 SKIP SUSE-RU-2020:1402-1 as SUSE-SLE-Module-HPC-15-SP1-2020-1402 is not security or has no CVEs. patches: SUSE-2020-1402,SUSE-SLE-Module-HPC-15-SP1-2020-1402 SKIP SUSE-RU-2020:1403-1 as SUSE-SLE-SERVER-12-SP5-2020-1403 is not security or has no CVEs. patches: SUSE-2020-1403,SUSE-SLE-SERVER-12-SP4-2020-1403,SUSE-SLE-SERVER-12-SP5-2020-1403 SKIP SUSE-RU-2020:1404-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1404 is not security or has no CVEs. patches: SUSE-2020-1404,SUSE-SLE-Module-Basesystem-15-SP1-2020-1404,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1404 SKIP SUSE-RU-2020:1405-1 as SUSE-SLE-Module-Public-Cloud-15-2020-1405 is not security or has no CVEs. patches: SUSE-2020-1405,SUSE-SLE-Module-Public-Cloud-15-2020-1405 SKIP SUSE-RU-2020:1406-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1406 is not security or has no CVEs. patches: SUSE-2020-1406,SUSE-SLE-Module-Public-Cloud-12-2020-1406 SKIP SUSE-RU-2020:1407-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1407 is not security or has no CVEs. patches: SUSE-2020-1407,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1407 SKIP SUSE-RU-2020:1408-1 as SUSE-SLE-SERVER-12-SP5-2020-1408 is not security or has no CVEs. patches: SUSE-2020-1408,SUSE-SLE-SDK-12-SP5-2020-1408,SUSE-SLE-SERVER-12-SP5-2020-1408 SKIP SUSE-RU-2020:1411-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1411 is not security or has no CVEs. patches: SUSE-2020-1411,SUSE-SLE-Module-Basesystem-15-SP1-2020-1411,SUSE-SLE-Module-Python2-15-SP1-2020-1411 SKIP SUSE-RU-2020:1413-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1413 is not security or has no CVEs. patches: SUSE-2020-1413,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1413 SKIP SUSE-RU-2020:1415-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1415 is not security or has no CVEs. patches: SUSE-2020-1415,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1415 SKIP SUSE-RU-2020:1416-1 as SUSE-SLE-SDK-12-SP5-2020-1416 is not security or has no CVEs. patches: SUSE-2020-1416,SUSE-SLE-HA-12-SP3-2020-1416,SUSE-SLE-HA-12-SP4-2020-1416,SUSE-SLE-HA-12-SP5-2020-1416,SUSE-SLE-SDK-12-SP4-2020-1416,SUSE-SLE-SDK-12-SP5-2020-1416 SKIP SUSE-RU-2020:1421-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1421 is not security or has no CVEs. patches: SUSE-2020-1421,SUSE-SLE-Module-Basesystem-15-SP1-2020-1421 SKIP SUSE-RU-2020:1422-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1422 is not security or has no CVEs. patches: SUSE-2020-1422,SUSE-SLE-Product-HPC-15-2020-1422,SUSE-SLE-Product-SLES-15-2020-1422,SUSE-SLE-Product-SLES_SAP-15-2020-1422 SKIP SUSE-RU-2020:1426-1 as SUSE-Storage-6-2020-1426 is not security or has no CVEs. patches: SUSE-2020-1426,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1426,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1426,SUSE-Storage-6-2020-1426 ERROR: notice SUSE-RU-2020:14269-1 has no valid patches out of: slessp4-firefox-gcc8-14269 SKIP SUSE-RU-2020:1427-1 as SUSE-SLE-Module-Containers-15-SP1-2020-1427 is not security or has no CVEs. patches: SUSE-2020-1427,SUSE-SLE-Module-Containers-15-SP1-2020-1427 SKIP SUSE-RU-2020:14272-1 as slessp4-firefox-libstdc-20200122-14272 is not security or has no CVEs. patches: slessp4-firefox-libstdc-20200122-14272 ERROR: notice SUSE-RU-2020:14273-1 has no valid patches out of: slesctsp3-client-tools-beta-202001-14273,slesctsp4-client-tools-beta-202001-14273 ERROR: notice SUSE-RU-2020:14276-1 has no valid patches out of: slesctsp3-salt-beta-202001-14276,slesctsp4-salt-beta-202001-14276 ERROR: notice SUSE-RU-2020:14278-1 has no valid patches out of: suse-ubu184ct-salt-beta-202001-14278 ERROR: notice SUSE-RU-2020:14279-1 has no valid patches out of: suse-ubu164ct-salt-beta-202001-14279 SKIP SUSE-RU-2020:1428-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1428 is not security or has no CVEs. patches: SUSE-2020-1428,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1428,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1428 SKIP SUSE-RU-2020:14282-1 as slessp4-openssl-certs-14282 is not security or has no CVEs. patches: sleposp3-openssl-certs-14282,slessp4-openssl-certs-14282 SKIP SUSE-RU-2020:1429-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1429 is not security or has no CVEs. patches: SUSE-2020-1429,SUSE-SLE-Module-Basesystem-15-SP1-2020-1429,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1429 SKIP SUSE-RU-2020:14293-1 as sleposp3-POS_Image3-14293 is not security or has no CVEs. patches: sleposp3-POS_Image3-14293 SKIP SUSE-RU-2020:14299-1 as slesctsp4-client-tools-beta-202002-14299 is not security or has no CVEs. patches: slesctsp3-client-tools-beta-202002-14299,slesctsp4-client-tools-beta-202002-14299 ERROR: notice SUSE-RU-2020:14300-1 has no valid patches out of: suse-ubu164ct-client-tools-beta-202002-14300 ERROR: notice SUSE-RU-2020:14302-1 has no valid patches out of: suse-ubu184ct-client-tools-beta-202002-14302 SKIP SUSE-RU-2020:14308-1 as slessp4-aide-14308 is not security or has no CVEs. patches: sleposp3-aide-14308,slessp4-aide-14308 SKIP SUSE-RU-2020:14310-1 as slessp4-s390-tools-14310 is not security or has no CVEs. patches: slessp4-s390-tools-14310 ERROR: notice SUSE-RU-2020:14319-1 has no valid patches out of: suse-ubu164ct-salt-202003-14319 ERROR: notice SUSE-RU-2020:14320-1 has no valid patches out of: suse-ubu184ct-salt-202003-14320 SKIP SUSE-RU-2020:14321-1 as slesctsp4-client-tools-202003-14321 is not security or has no CVEs. patches: slesctsp3-client-tools-202003-14321,slesctsp4-client-tools-202003-14321 SKIP SUSE-RU-2020:14322-1 as slesctsp4-salt-202003-14322 is not security or has no CVEs. patches: slesctsp3-salt-202003-14322,slesctsp4-salt-202003-14322 SKIP SUSE-RU-2020:14324-1 as slessp4-suseRegister-14324 is not security or has no CVEs. patches: slessp4-suseRegister-14324 SKIP SUSE-RU-2020:14325-1 as sleposp3-suseRegister-14325 is not security or has no CVEs. patches: sleposp3-suseRegister-14325 ERROR: notice SUSE-RU-2020:14330-1 has no valid patches out of: slesctsp3-salt-beta-202003-14330,slesctsp4-salt-beta-202003-14330 ERROR: notice SUSE-RU-2020:14333-1 has no valid patches out of: slesctsp3-client-tools-beta-202003-14333,slesctsp4-client-tools-beta-202003-14333 ERROR: notice SUSE-RU-2020:14345-1 has no valid patches out of: slesctsp3-client-tools-beta-202004-14345,slesctsp4-client-tools-beta-202004-14345 ERROR: notice SUSE-RU-2020:14346-1 has no valid patches out of: suse-ubu164ct-client-tools-beta-202004-14346 ERROR: notice SUSE-RU-2020:14347-1 has no valid patches out of: suse-ubu184ct-client-tools-beta-202004-14347 SKIP SUSE-RU-2020:14361-1 as slesctsp4-client-tools-202004-14361 is not security or has no CVEs. patches: slesctsp3-client-tools-202004-14361,slesctsp4-client-tools-202004-14361 ERROR: notice SUSE-RU-2020:14363-1 has no valid patches out of: suse-ubu164ct-salt-202005-14363 ERROR: notice SUSE-RU-2020:14364-1 has no valid patches out of: suse-ubu184ct-salt-202005-14364 SKIP SUSE-RU-2020:14367-1 as slessp4-timezone-14367 is not security or has no CVEs. patches: sleposp3-timezone-14367,slessp4-timezone-14367 SKIP SUSE-RU-2020:14370-1 as slessp4-sudo-14370 is not security or has no CVEs. patches: sleposp3-sudo-14370,slessp4-sudo-14370 SKIP SUSE-RU-2020:14371-1 as slessp4-pam-config-14371 is not security or has no CVEs. patches: slessp4-pam-config-14371 SKIP SUSE-RU-2020:14376-1 as slessp4-firefox-helper-libs-14376 is not security or has no CVEs. patches: slessp4-firefox-helper-libs-14376 SKIP SUSE-RU-2020:14401-1 as pubclsp3-google-compute-engine-14401 is not security or has no CVEs. patches: pubclsp3-google-compute-engine-14401 ERROR: notice SUSE-RU-2020:14406-1 has no valid patches out of: slesctsp3-client-tools-beta-202006-14406,slesctsp4-client-tools-beta-202006-14406 SKIP SUSE-RU-2020:14410-1 as slessp4-openssl-certs-14410 is not security or has no CVEs. patches: sleposp3-openssl-certs-14410,slessp4-openssl-certs-14410 SKIP SUSE-RU-2020:14425-1 as slessp4-microcode_ctl-14425 is not security or has no CVEs. patches: sleposp3-microcode_ctl-14425,slessp4-microcode_ctl-14425 SKIP SUSE-RU-2020:14428-1 as slesctsp4-client-tools-202006-14428 is not security or has no CVEs. patches: slesctsp3-client-tools-202006-14428,slesctsp4-client-tools-202006-14428 SKIP SUSE-RU-2020:14443-1 as slessp4-mozilla-nss-14443 is not security or has no CVEs. patches: sleposp3-mozilla-nss-14443,slessp4-mozilla-nss-14443 SKIP SUSE-RU-2020:14446-1 as slessp4-pesign-obs-integration-14446 is not security or has no CVEs. patches: sleposp3-pesign-obs-integration-14446,slessp4-pesign-obs-integration-14446 SKIP SUSE-RU-2020:14450-1 as slehasp4-drbd-14450 is not security or has no CVEs. patches: slehasp4-drbd-14450 SKIP SUSE-RU-2020:14452-1 as slessp4-grub2-14452 is not security or has no CVEs. patches: slessp4-grub2-14452 SKIP SUSE-RU-2020:14457-1 as slessp4-emacs-14457 is not security or has no CVEs. patches: sleposp3-emacs-14457,slessp4-emacs-14457 SKIP SUSE-RU-2020:14458-1 as slessp4-MozillaFirefox-branding-SLED-14458 is not security or has no CVEs. patches: slessp4-MozillaFirefox-branding-SLED-14458 SKIP SUSE-RU-2020:14465-1 as slessp4-kdump-14465 is not security or has no CVEs. patches: slessp4-kdump-14465 ERROR: notice SUSE-RU-2020:14469-1 has no valid patches out of: suse-ubu164ct-client-tools-202008-14469 ERROR: notice SUSE-RU-2020:14470-1 has no valid patches out of: suse-ubu184ct-client-tools-202008-14470 ERROR: notice SUSE-RU-2020:14471-1 has no valid patches out of: suse-ubu204ct-client-tools-202008-14471 SKIP SUSE-RU-2020:14474-1 as slesctsp4-client-tools-202008-14474 is not security or has no CVEs. patches: slesctsp3-client-tools-202008-14474,slesctsp4-client-tools-202008-14474 SKIP SUSE-RU-2020:14478-1 as slessp4-mozilla-nss-14478 is not security or has no CVEs. patches: sleposp3-mozilla-nss-14478,slessp4-mozilla-nss-14478 SKIP SUSE-RU-2020:14483-1 as slessp4-oracleasm-14483 is not security or has no CVEs. patches: slessp4-oracleasm-14483 SKIP SUSE-RU-2020:14485-1 as slessp4-openssl-certs-14485 is not security or has no CVEs. patches: sleposp3-openssl-certs-14485,slessp4-openssl-certs-14485 ERROR: notice SUSE-RU-2020:14487-1 has no valid patches out of: suse-ubu184ct-SUSE-Manager-202009-14487 SKIP SUSE-RU-2020:14506-1 as slesctsp4-client-tools-202009-14506 is not security or has no CVEs. patches: slesctsp3-client-tools-202009-14506,slesctsp4-client-tools-202009-14506 ERROR: notice SUSE-RU-2020:14507-1 has no valid patches out of: suse-ubu164ct-client-tools-202009-14507 ERROR: notice SUSE-RU-2020:14508-1 has no valid patches out of: suse-ubu184ct-client-tools-202009-14508 ERROR: notice SUSE-RU-2020:14509-1 has no valid patches out of: suse-ubu204ct-client-tools-202009-14509 SKIP SUSE-RU-2020:14520-1 as slessp4-MozillaFirefox-14520 is not security or has no CVEs. patches: slessp4-MozillaFirefox-14520 SKIP SUSE-RU-2020:14529-1 as slessp4-openssl-certs-14529 is not security or has no CVEs. patches: sleposp3-openssl-certs-14529,slessp4-openssl-certs-14529 ERROR: notice SUSE-RU-2020:14536-1 has no valid patches out of: suse-ubu184ct-client-tools-202010-14536 SKIP SUSE-RU-2020:14543-1 as slessp4-openCryptoki-14543 is not security or has no CVEs. patches: slessp4-openCryptoki-14543 SKIP SUSE-RU-2020:14555-1 as slessp4-microcode_ctl-14555 is not security or has no CVEs. patches: sleposp3-microcode_ctl-14555,slessp4-microcode_ctl-14555 SKIP SUSE-RU-2020:14556-1 as sleposp3-bash-14556 is not security or has no CVEs. patches: sleposp3-bash-14556 SKIP SUSE-RU-2020:14565-1 as slesctsp4-client-tools-202011-14565 is not security or has no CVEs. patches: slesctsp3-client-tools-202011-14565,slesctsp4-client-tools-202011-14565 SKIP SUSE-RU-2020:14568-1 as slessp4-bash-14568 is not security or has no CVEs. patches: slessp4-bash-14568 SKIP SUSE-RU-2020:14577-1 as slessp4-geolite2legacy-14577 is not security or has no CVEs. patches: slessp4-geolite2legacy-14577 SKIP SUSE-RU-2020:1483-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1483 is not security or has no CVEs. patches: SUSE-2020-1483,SUSE-SLE-Module-Basesystem-15-SP1-2020-1483 SKIP SUSE-RU-2020:1484-1 as SUSE-Storage-5-2020-1484 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1484,SUSE-2020-1484,SUSE-OpenStack-Cloud-8-2020-1484,SUSE-OpenStack-Cloud-Crowbar-8-2020-1484,SUSE-SLE-SAP-12-SP3-2020-1484,SUSE-SLE-SDK-12-SP4-2020-1484,SUSE-SLE-SDK-12-SP5-2020-1484,SUSE-SLE-SERVER-12-SP3-2020-1484,SUSE-SLE-SERVER-12-SP3-BCL-2020-1484,SUSE-SLE-SERVER-12-SP4-2020-1484,SUSE-SLE-SERVER-12-SP5-2020-1484,SUSE-Storage-5-2020-1484 SKIP SUSE-RU-2020:1487-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1487 is not security or has no CVEs. patches: SUSE-2020-1487,SUSE-SLE-Module-Public-Cloud-15-2020-1487,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1487 SKIP SUSE-RU-2020:1488-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1488 is not security or has no CVEs. patches: SUSE-2020-1488,SUSE-SLE-Module-Public-Cloud-12-2020-1488 SKIP SUSE-RU-2020:1489-1 as SUSE-Storage-5-2020-1489 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1489,SUSE-2020-1489,SUSE-OpenStack-Cloud-7-2020-1489,SUSE-OpenStack-Cloud-8-2020-1489,SUSE-OpenStack-Cloud-Crowbar-8-2020-1489,SUSE-SLE-SAP-12-SP1-2020-1489,SUSE-SLE-SAP-12-SP2-2020-1489,SUSE-SLE-SAP-12-SP3-2020-1489,SUSE-SLE-SERVER-12-SP1-2020-1489,SUSE-SLE-SERVER-12-SP2-2020-1489,SUSE-SLE-SERVER-12-SP2-BCL-2020-1489,SUSE-SLE-SERVER-12-SP3-2020-1489,SUSE-SLE-SERVER-12-SP3-BCL-2020-1489,SUSE-SLE-SERVER-12-SP4-2020-1489,SUSE-SLE-SERVER-12-SP5-2020-1489,SUSE-Storage-5-2020-1489 SKIP SUSE-RU-2020:1490-1 as SUSE-SLE-SERVER-12-SP5-2020-1490 is not security or has no CVEs. patches: SUSE-2020-1490,SUSE-SLE-SDK-12-SP4-2020-1490,SUSE-SLE-SDK-12-SP5-2020-1490,SUSE-SLE-SERVER-12-SP4-2020-1490,SUSE-SLE-SERVER-12-SP5-2020-1490 SKIP SUSE-RU-2020:1491-1 as SUSE-SLE-SERVER-12-SP5-2020-1491 is not security or has no CVEs. patches: SUSE-2020-1491,SUSE-SLE-SERVER-12-SP4-2020-1491,SUSE-SLE-SERVER-12-SP5-2020-1491 SKIP SUSE-RU-2020:1492-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1492 is not security or has no CVEs. patches: SUSE-2020-1492,SUSE-SLE-Module-Basesystem-15-SP1-2020-1492 SKIP SUSE-RU-2020:1494-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1494 is not security or has no CVEs. patches: SUSE-2020-1494,SUSE-SLE-Module-Basesystem-15-SP1-2020-1494 SKIP SUSE-RU-2020:1495-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1495 is not security or has no CVEs. patches: SUSE-2020-1495,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1495 SKIP SUSE-RU-2020:1496-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1496 is not security or has no CVEs. patches: SUSE-2020-1496,SUSE-SLE-Module-Basesystem-15-SP1-2020-1496,SUSE-SLE-Module-Python2-15-SP1-2020-1496 SKIP SUSE-RU-2020:1503-1 as SUSE-SLE-SERVER-12-SP5-2020-1503 is not security or has no CVEs. patches: SUSE-2020-1503,SUSE-SLE-SDK-12-SP4-2020-1503,SUSE-SLE-SDK-12-SP5-2020-1503,SUSE-SLE-SERVER-12-SP4-2020-1503,SUSE-SLE-SERVER-12-SP5-2020-1503 SKIP SUSE-RU-2020:1504-1 as SUSE-SLE-SERVER-12-SP5-2020-1504 is not security or has no CVEs. patches: SUSE-2020-1504,SUSE-SLE-SERVER-12-SP4-2020-1504,SUSE-SLE-SERVER-12-SP5-2020-1504 SKIP SUSE-RU-2020:1506-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1506 is not security or has no CVEs. patches: SUSE-2020-1506,SUSE-SLE-Module-Basesystem-15-SP1-2020-1506,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1506 SKIP SUSE-RU-2020:1507-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1507 is not security or has no CVEs. patches: SUSE-2020-1507,SUSE-SLE-Module-Basesystem-15-SP1-2020-1507 SKIP SUSE-RU-2020:1508-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1508 is not security or has no CVEs. patches: SUSE-2020-1508,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1508 SKIP SUSE-RU-2020:1509-1 as SUSE-SLE-SERVER-12-SP5-2020-1509 is not security or has no CVEs. patches: SUSE-2020-1509,SUSE-SLE-SERVER-12-SP4-2020-1509,SUSE-SLE-SERVER-12-SP5-2020-1509 SKIP SUSE-RU-2020:1510-1 as SUSE-SLE-HA-12-SP4-2020-1510 is not security or has no CVEs. patches: SUSE-2020-1510,SUSE-SLE-HA-12-SP4-2020-1510 SKIP SUSE-RU-2020:1512-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1512 is not security or has no CVEs. patches: SUSE-2020-1512,SUSE-SLE-Module-Basesystem-15-SP1-2020-1512 SKIP SUSE-RU-2020:1517-1 as SUSE-SLE-SDK-12-SP5-2020-1517 is not security or has no CVEs. patches: SUSE-2020-1517,SUSE-SLE-SDK-12-SP4-2020-1517,SUSE-SLE-SDK-12-SP5-2020-1517 SKIP SUSE-RU-2020:1518-1 as SUSE-SLE-SERVER-12-SP5-2020-1518 is not security or has no CVEs. patches: SUSE-2020-1518,SUSE-SLE-SDK-12-SP4-2020-1518,SUSE-SLE-SDK-12-SP5-2020-1518,SUSE-SLE-SERVER-12-SP4-2020-1518,SUSE-SLE-SERVER-12-SP5-2020-1518 SKIP SUSE-RU-2020:1520-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1520 is not security or has no CVEs. patches: SUSE-2020-1520,SUSE-SLE-Module-Basesystem-15-SP1-2020-1520 SKIP SUSE-RU-2020:1520-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1520 is not security or has no CVEs. patches: SUSE-2020-1520,SUSE-SLE-Module-Basesystem-15-SP2-2020-1520 SKIP SUSE-RU-2020:1521-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1521 is not security or has no CVEs. patches: SUSE-2020-1521,SUSE-SLE-Module-Basesystem-15-SP1-2020-1521,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1521 SKIP SUSE-RU-2020:1529-1 as SUSE-Storage-5-2020-1529 is not security or has no CVEs. patches: SUSE-2020-1529,SUSE-Storage-5-2020-1529 SKIP SUSE-RU-2020:1536-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2020-1536 is not security or has no CVEs. patches: SUSE-2020-1536,SUSE-SLE-Module-Adv-Systems-Management-12-2020-1536 SKIP SUSE-RU-2020:1539-1 as SUSE-Storage-6-2020-1539 is not security or has no CVEs. patches: SUSE-2020-1539,SUSE-Storage-6-2020-1539 SKIP SUSE-RU-2020:1540-1 as SUSE-Storage-6-2020-1540 is not security or has no CVEs. patches: SUSE-2020-1540,SUSE-Storage-6-2020-1540 SKIP SUSE-RU-2020:1541-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1541 is not security or has no CVEs. patches: SUSE-2020-1541,SUSE-SLE-Module-Basesystem-15-SP1-2020-1541 SKIP SUSE-RU-2020:1541-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1541 is not security or has no CVEs. patches: SUSE-2020-1541,SUSE-SLE-Module-Basesystem-15-SP2-2020-1541 SKIP SUSE-RU-2020:1542-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1542 is not security or has no CVEs. patches: SUSE-2020-1542,SUSE-SLE-Module-Basesystem-15-SP1-2020-1542,SUSE-SLE-Module-Basesystem-15-SP2-2020-1542,SUSE-SLE-Product-HPC-15-2020-1542,SUSE-SLE-Product-SLES-15-2020-1542,SUSE-SLE-Product-SLES_SAP-15-2020-1542 SKIP SUSE-RU-2020:1547-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1547 is not security or has no CVEs. patches: SUSE-2020-1547,SUSE-SLE-Module-Basesystem-15-SP1-2020-1547 SKIP SUSE-RU-2020:1547-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1547 is not security or has no CVEs. patches: SUSE-2020-1547,SUSE-SLE-Module-Basesystem-15-SP2-2020-1547 SKIP SUSE-RU-2020:1548-1 as SUSE-Storage-5-2020-1548 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1548,SUSE-2020-1548,SUSE-OpenStack-Cloud-7-2020-1548,SUSE-OpenStack-Cloud-8-2020-1548,SUSE-OpenStack-Cloud-Crowbar-8-2020-1548,SUSE-SLE-SAP-12-SP2-2020-1548,SUSE-SLE-SAP-12-SP3-2020-1548,SUSE-SLE-SDK-12-SP4-2020-1548,SUSE-SLE-SERVER-12-SP2-2020-1548,SUSE-SLE-SERVER-12-SP2-BCL-2020-1548,SUSE-SLE-SERVER-12-SP3-2020-1548,SUSE-SLE-SERVER-12-SP3-BCL-2020-1548,SUSE-SLE-SERVER-12-SP4-2020-1548,SUSE-SLE-SERVER-12-SP5-2020-1548,SUSE-SLE-WE-12-SP4-2020-1548,SUSE-SLE-WE-12-SP5-2020-1548,SUSE-Storage-5-2020-1548 SKIP SUSE-RU-2020:1558-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1558 is not security or has no CVEs. patches: SUSE-2020-1558,SUSE-SLE-Module-Basesystem-15-SP1-2020-1558 SKIP SUSE-RU-2020:1558-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1558 is not security or has no CVEs. patches: SUSE-2020-1558,SUSE-SLE-Module-Basesystem-15-SP2-2020-1558 SKIP SUSE-RU-2020:1559-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1559 is not security or has no CVEs. patches: SUSE-2020-1559,SUSE-SLE-Module-Basesystem-15-SP1-2020-1559 SKIP SUSE-RU-2020:1560-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1560 is not security or has no CVEs. patches: SUSE-2020-1560,SUSE-SLE-Module-Basesystem-15-SP1-2020-1560,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1560,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1560 SKIP SUSE-RU-2020:1561-1 as SUSE-SLE-SERVER-12-SP5-2020-1561 is not security or has no CVEs. patches: SUSE-2020-1561,SUSE-SLE-HA-12-SP4-2020-1561,SUSE-SLE-HA-12-SP5-2020-1561,SUSE-SLE-SDK-12-SP4-2020-1561,SUSE-SLE-SDK-12-SP5-2020-1561,SUSE-SLE-SERVER-12-SP4-2020-1561,SUSE-SLE-SERVER-12-SP5-2020-1561 SKIP SUSE-RU-2020:1562-1 as SUSE-SLE-Product-HA-15-SP1-2020-1562 is not security or has no CVEs. patches: SUSE-2020-1562,SUSE-SLE-Module-Basesystem-15-SP1-2020-1562,SUSE-SLE-Product-HA-15-SP1-2020-1562 SKIP SUSE-RU-2020:1567-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1567 is not security or has no CVEs. patches: SUSE-2020-1567,SUSE-SLE-Module-Python2-15-SP1-2020-1567 SKIP SUSE-RU-2020:1567-2 as SUSE-SLE-Module-Python2-15-SP2-2020-1567 is not security or has no CVEs. patches: SUSE-2020-1567,SUSE-SLE-Module-Python2-15-SP2-2020-1567 SKIP SUSE-RU-2020:1579-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1579 is not security or has no CVEs. patches: SUSE-2020-1579,SUSE-SLE-Module-Basesystem-15-SP1-2020-1579,SUSE-SLE-Module-Python2-15-SP1-2020-1579,SUSE-SLE-Product-HPC-15-2020-1579,SUSE-SLE-Product-SLES-15-2020-1579,SUSE-SLE-Product-SLES_SAP-15-2020-1579 SKIP SUSE-RU-2020:1592-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1592 is not security or has no CVEs. patches: SUSE-2020-1592,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1592 SKIP SUSE-RU-2020:1593-1 as SUSE-Storage-6-2020-1593 is not security or has no CVEs. patches: SUSE-2020-1593,SUSE-SLE-Module-Basesystem-15-SP1-2020-1593,SUSE-Storage-6-2020-1593 SKIP SUSE-RU-2020:1594-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1594 is not security or has no CVEs. patches: SUSE-2020-1594,SUSE-SLE-Module-Basesystem-15-SP1-2020-1594 SKIP SUSE-RU-2020:1598-1 as SUSE-SLE-SERVER-12-SP5-2020-1598 is not security or has no CVEs. patches: SUSE-2020-1598,SUSE-SLE-SDK-12-SP4-2020-1598,SUSE-SLE-SDK-12-SP5-2020-1598,SUSE-SLE-SERVER-12-SP4-2020-1598,SUSE-SLE-SERVER-12-SP5-2020-1598 SKIP SUSE-RU-2020:1611-1 as SUSE-SLE-Product-WE-15-SP1-2020-1611 is not security or has no CVEs. patches: SUSE-2020-1611,SUSE-SLE-INSTALLER-15-2020-1611,SUSE-SLE-Module-Basesystem-15-SP1-2020-1611,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1611,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1611,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1611,SUSE-SLE-Product-HPC-15-2020-1611,SUSE-SLE-Product-SLES-15-2020-1611,SUSE-SLE-Product-SLES_SAP-15-2020-1611,SUSE-SLE-Product-WE-15-SP1-2020-1611 SKIP SUSE-RU-2020:1614-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1614 is not security or has no CVEs. patches: SUSE-2020-1614,SUSE-SLE-Module-Basesystem-15-SP1-2020-1614 SKIP SUSE-RU-2020:1615-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1615 is not security or has no CVEs. patches: SUSE-2020-1615,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1615 SKIP SUSE-RU-2020:1616-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1616 is not security or has no CVEs. patches: SUSE-2020-1616,SUSE-SLE-Module-SAP-Applications-15-2020-1616,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-1616 SKIP SUSE-RU-2020:1616-2 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-1616 is not security or has no CVEs. patches: SUSE-2020-1616,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-1616 SKIP SUSE-RU-2020:1620-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1620 is not security or has no CVEs. patches: SUSE-2020-1620,SUSE-SLE-Module-Basesystem-15-SP1-2020-1620 SKIP SUSE-RU-2020:1628-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1628 is not security or has no CVEs. patches: SUSE-2020-1628,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1628 SKIP SUSE-RU-2020:1629-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1629 is not security or has no CVEs. patches: SUSE-2020-1629,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1629 SKIP SUSE-RU-2020:1629-2 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1629 is not security or has no CVEs. patches: SUSE-2020-1629,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1629 SKIP SUSE-RU-2020:1631-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1631 is not security or has no CVEs. patches: SUSE-2020-1631,SUSE-SLE-Module-Basesystem-15-SP1-2020-1631,SUSE-SLE-Module-Basesystem-15-SP2-2020-1631,SUSE-SLE-Product-HPC-15-2020-1631,SUSE-SLE-Product-SLES-15-2020-1631,SUSE-SLE-Product-SLES_SAP-15-2020-1631 SKIP SUSE-RU-2020:1635-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1635 is not security or has no CVEs. patches: SUSE-2020-1635,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1635 SKIP SUSE-RU-2020:1636-1 as SUSE-SLE-SERVER-12-SP5-2020-1636 is not security or has no CVEs. patches: SUSE-2020-1636,SUSE-SLE-SERVER-12-SP5-2020-1636 SKIP SUSE-RU-2020:1637-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1637 is not security or has no CVEs. patches: SUSE-2020-1637,SUSE-SLE-Module-Basesystem-15-SP1-2020-1637 SKIP SUSE-RU-2020:1638-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1638 is not security or has no CVEs. patches: SUSE-2020-1638,SUSE-SLE-Module-Basesystem-15-SP1-2020-1638 SKIP SUSE-RU-2020:1639-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1639 is not security or has no CVEs. patches: SUSE-2020-1639,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1639 SKIP SUSE-RU-2020:1639-2 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1639 is not security or has no CVEs. patches: SUSE-2020-1639,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1639 SKIP SUSE-RU-2020:1640-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1640 is not security or has no CVEs. patches: SUSE-2020-1640,SUSE-SLE-Product-HPC-15-2020-1640,SUSE-SLE-Product-SLES-15-2020-1640,SUSE-SLE-Product-SLES_SAP-15-2020-1640 SKIP SUSE-RU-2020:1641-1 as SUSE-SLE-SAP-12-SP5-2020-1641 is not security or has no CVEs. patches: SUSE-2020-1641,SUSE-SLE-SAP-12-SP2-2020-1641,SUSE-SLE-SAP-12-SP3-2020-1641,SUSE-SLE-SAP-12-SP4-2020-1641,SUSE-SLE-SAP-12-SP5-2020-1641 SKIP SUSE-RU-2020:1643-1 as SUSE-SUSE-Manager-Server-3.2-2020-1643 is not security or has no CVEs. patches: SUSE-2020-1643,SUSE-SUSE-Manager-Server-3.2-2020-1643 SKIP SUSE-RU-2020:1644-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1644 is not security or has no CVEs. patches: SUSE-2020-1644,SUSE-SLE-Module-Basesystem-15-SP1-2020-1644 SKIP SUSE-RU-2020:1644-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1644 is not security or has no CVEs. patches: SUSE-2020-1644,SUSE-SLE-Module-Basesystem-15-SP2-2020-1644 SKIP SUSE-RU-2020:1678-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1678 is not security or has no CVEs. patches: SUSE-2020-1678,SUSE-SLE-Module-Public-Cloud-12-2020-1678 SKIP SUSE-RU-2020:1679-1 as SUSE-SLE-Module-Public-Cloud-15-2020-1679 is not security or has no CVEs. patches: SUSE-2020-1679,SUSE-SLE-Module-Public-Cloud-15-2020-1679 SKIP SUSE-RU-2020:1680-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1680 is not security or has no CVEs. patches: SUSE-2020-1680,SUSE-SLE-Module-Public-Cloud-12-2020-1680 SKIP SUSE-RU-2020:1688-1 as SUSE-SLE-SERVER-12-SP5-2020-1688 is not security or has no CVEs. patches: SUSE-2020-1688,SUSE-SLE-SERVER-12-SP5-2020-1688 SKIP SUSE-RU-2020:1689-1 as SUSE-Storage-5-2020-1689 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1689,SUSE-2020-1689,SUSE-OpenStack-Cloud-8-2020-1689,SUSE-OpenStack-Cloud-Crowbar-8-2020-1689,SUSE-SLE-SAP-12-SP3-2020-1689,SUSE-SLE-SERVER-12-SP3-2020-1689,SUSE-SLE-SERVER-12-SP3-BCL-2020-1689,SUSE-Storage-5-2020-1689 SKIP SUSE-RU-2020:1690-1 as SUSE-SLE-SERVER-12-SP5-2020-1690 is not security or has no CVEs. patches: SUSE-2020-1690,SUSE-SLE-SERVER-12-SP4-2020-1690,SUSE-SLE-SERVER-12-SP5-2020-1690 SKIP SUSE-RU-2020:1692-1 as SUSE-SLE-SERVER-12-SP5-2020-1692 is not security or has no CVEs. patches: SUSE-2020-1692,SUSE-SLE-SDK-12-SP4-2020-1692,SUSE-SLE-SDK-12-SP5-2020-1692,SUSE-SLE-SERVER-12-SP4-2020-1692,SUSE-SLE-SERVER-12-SP5-2020-1692 SKIP SUSE-RU-2020:1696-1 as SUSE-SLE-Module-Web-Scripting-12-2020-1696 is not security or has no CVEs. patches: SUSE-2020-1696,SUSE-OpenStack-Cloud-7-2020-1696,SUSE-OpenStack-Cloud-Crowbar-8-2020-1696,SUSE-OpenStack-Cloud-Crowbar-9-2020-1696,SUSE-SLE-Module-Web-Scripting-12-2020-1696 SKIP SUSE-RU-2020:1700-1 as SUSE-Storage-5-2020-1700 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1700,SUSE-2020-1700,SUSE-OpenStack-Cloud-7-2020-1700,SUSE-OpenStack-Cloud-8-2020-1700,SUSE-OpenStack-Cloud-Crowbar-8-2020-1700,SUSE-SLE-SAP-12-SP2-2020-1700,SUSE-SLE-SAP-12-SP3-2020-1700,SUSE-SLE-SERVER-12-SP2-2020-1700,SUSE-SLE-SERVER-12-SP2-BCL-2020-1700,SUSE-SLE-SERVER-12-SP3-2020-1700,SUSE-SLE-SERVER-12-SP3-BCL-2020-1700,SUSE-SLE-SERVER-12-SP4-2020-1700,SUSE-Storage-5-2020-1700 SKIP SUSE-RU-2020:1701-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1701 is not security or has no CVEs. patches: SUSE-2020-1701,SUSE-SLE-Module-Basesystem-15-SP1-2020-1701 SKIP SUSE-RU-2020:1702-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1702 is not security or has no CVEs. patches: SUSE-2020-1702,SUSE-SLE-Product-HPC-15-2020-1702,SUSE-SLE-Product-SLES_SAP-15-2020-1702 SKIP SUSE-RU-2020:1703-1 as SUSE-SLE-SERVER-12-SP5-2020-1703 is not security or has no CVEs. patches: SUSE-2020-1703,SUSE-SLE-SERVER-12-SP5-2020-1703 SKIP SUSE-RU-2020:1704-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1704 is not security or has no CVEs. patches: SUSE-2020-1704,SUSE-SLE-Module-Basesystem-15-SP1-2020-1704 SKIP SUSE-RU-2020:1704-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1704 is not security or has no CVEs. patches: SUSE-2020-1704,SUSE-SLE-Module-Basesystem-15-SP2-2020-1704 SKIP SUSE-RU-2020:1706-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1706 is not security or has no CVEs. patches: SUSE-2020-1706,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1706,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1706 SKIP SUSE-RU-2020:1707-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1707 is not security or has no CVEs. patches: SUSE-2020-1707,SUSE-SLE-Module-Basesystem-15-SP1-2020-1707 SKIP SUSE-RU-2020:1707-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1707 is not security or has no CVEs. patches: SUSE-2020-1707,SUSE-SLE-Module-Basesystem-15-SP2-2020-1707 SKIP SUSE-RU-2020:1708-1 as SUSE-SLE-SERVER-12-SP5-2020-1708 is not security or has no CVEs. patches: SUSE-2020-1708,SUSE-SLE-SERVER-12-SP4-2020-1708,SUSE-SLE-SERVER-12-SP5-2020-1708 SKIP SUSE-RU-2020:1716-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-1716 is not security or has no CVEs. patches: SUSE-2020-1716,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2020-1716,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2020-1716,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-1716 SKIP SUSE-RU-2020:1726-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1726 is not security or has no CVEs. patches: SUSE-2020-1726,SUSE-SLE-Module-Basesystem-15-SP1-2020-1726,SUSE-SLE-Module-Python2-15-SP1-2020-1726,SUSE-SLE-Product-HPC-15-2020-1726,SUSE-SLE-Product-SLES-15-2020-1726,SUSE-SLE-Product-SLES_SAP-15-2020-1726 SKIP SUSE-RU-2020:1726-2 as SUSE-SLE-Module-Python2-15-SP2-2020-1726 is not security or has no CVEs. patches: SUSE-2020-1726,SUSE-SLE-Module-Basesystem-15-SP2-2020-1726,SUSE-SLE-Module-Python2-15-SP2-2020-1726 SKIP SUSE-RU-2020:1727-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1727 is not security or has no CVEs. patches: SUSE-2020-1727,SUSE-SLE-Module-Public-Cloud-15-2020-1727,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1727,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1727 SKIP SUSE-RU-2020:1728-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1728 is not security or has no CVEs. patches: SUSE-2020-1728,SUSE-SLE-Module-Public-Cloud-12-2020-1728 SKIP SUSE-RU-2020:1737-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1737 is not security or has no CVEs. patches: SUSE-2020-1737,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-1737,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-1737,SUSE-SLE-Product-HPC-15-2020-1737,SUSE-SLE-Product-SLES-15-2020-1737,SUSE-SLE-Product-SLES_SAP-15-2020-1737 SKIP SUSE-RU-2020:1738-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1738 is not security or has no CVEs. patches: SUSE-2020-1738,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-1738,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-1738,SUSE-SLE-Product-HPC-15-2020-1738,SUSE-SLE-Product-SLES-15-2020-1738,SUSE-SLE-Product-SLES_SAP-15-2020-1738 SKIP SUSE-RU-2020:1740-1 as SUSE-SLE-Product-WE-15-SP1-2020-1740 is not security or has no CVEs. patches: SUSE-2020-1740,SUSE-SLE-Product-WE-15-SP1-2020-1740 SKIP SUSE-RU-2020:1741-1 as SUSE-SLE-Module-Web-Scripting-12-2020-1741 is not security or has no CVEs. patches: SUSE-2020-1741,SUSE-SLE-Module-Web-Scripting-12-2020-1741 SKIP SUSE-RU-2020:1745-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1745 is not security or has no CVEs. patches: SUSE-2020-1745,SUSE-SLE-Module-Basesystem-15-SP1-2020-1745 SKIP SUSE-RU-2020:1759-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1759 is not security or has no CVEs. patches: SUSE-2020-1759,SUSE-SLE-Module-Basesystem-15-SP1-2020-1759,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1759 SKIP SUSE-RU-2020:1759-2 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1759 is not security or has no CVEs. patches: SUSE-2020-1759,SUSE-SLE-Module-Basesystem-15-SP2-2020-1759,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1759 SKIP SUSE-RU-2020:1760-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1760 is not security or has no CVEs. patches: SUSE-2020-1760,SUSE-SLE-INSTALLER-15-SP1-2020-1760,SUSE-SLE-Module-Basesystem-15-SP1-2020-1760 SKIP SUSE-RU-2020:1760-2 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1760 is not security or has no CVEs. patches: SUSE-2020-1760,SUSE-SLE-Module-Basesystem-15-SP2-2020-1760 SKIP SUSE-RU-2020:1761-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1761 is not security or has no CVEs. patches: SUSE-2020-1761,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1761 SKIP SUSE-RU-2020:1762-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1762 is not security or has no CVEs. patches: SUSE-2020-1762,SUSE-SLE-INSTALLER-15-SP1-2020-1762,SUSE-SLE-Module-Basesystem-15-SP1-2020-1762 SKIP SUSE-RU-2020:1763-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1763 is not security or has no CVEs. patches: SUSE-2020-1763,SUSE-SLE-Product-HPC-15-2020-1763,SUSE-SLE-Product-SLES-15-2020-1763,SUSE-SLE-Product-SLES_SAP-15-2020-1763 SKIP SUSE-RU-2020:1785-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1785 is not security or has no CVEs. patches: SUSE-2020-1785,SUSE-SLE-Module-Basesystem-15-SP1-2020-1785,SUSE-SLE-Module-Basesystem-15-SP2-2020-1785 SKIP SUSE-RU-2020:1786-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-1786 is not security or has no CVEs. patches: SUSE-2020-1786,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1786 SKIP SUSE-RU-2020:1795-1 as SUSE-SLE-Product-HA-15-SP2-2020-1795 is not security or has no CVEs. patches: SUSE-2020-1795,SUSE-SLE-Module-Basesystem-15-SP2-2020-1795,SUSE-SLE-Product-HA-15-SP2-2020-1795 SKIP SUSE-RU-2020:1801-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1801 is not security or has no CVEs. patches: SUSE-2020-1801,SUSE-SLE-Module-Basesystem-15-SP1-2020-1801,SUSE-SLE-Module-Basesystem-15-SP2-2020-1801,SUSE-SLE-Product-HPC-15-2020-1801,SUSE-SLE-Product-SLES-15-2020-1801,SUSE-SLE-Product-SLES_SAP-15-2020-1801 SKIP SUSE-RU-2020:1802-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1802 is not security or has no CVEs. patches: SUSE-2020-1802,SUSE-SLE-Module-Basesystem-15-SP2-2020-1802 SKIP SUSE-RU-2020:1804-1 as SUSE-SLE-SERVER-12-SP5-2020-1804 is not security or has no CVEs. patches: SUSE-2020-1804,SUSE-SLE-Module-Adv-Systems-Management-12-2020-1804,SUSE-SLE-Module-Web-Scripting-12-2020-1804,SUSE-SLE-SDK-12-SP4-2020-1804,SUSE-SLE-SDK-12-SP5-2020-1804,SUSE-SLE-SERVER-12-SP4-2020-1804,SUSE-SLE-SERVER-12-SP5-2020-1804 SKIP SUSE-RU-2020:1808-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1808 is not security or has no CVEs. patches: SUSE-2020-1808,SUSE-SLE-Module-Basesystem-15-SP1-2020-1808,SUSE-SLE-Module-Basesystem-15-SP2-2020-1808,SUSE-SLE-Product-HPC-15-2020-1808,SUSE-SLE-Product-SLES-15-2020-1808,SUSE-SLE-Product-SLES_SAP-15-2020-1808 SKIP SUSE-RU-2020:1809-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1809 is not security or has no CVEs. patches: SUSE-2020-1809,SUSE-SLE-Module-Basesystem-15-SP1-2020-1809,SUSE-SLE-Module-Basesystem-15-SP2-2020-1809 SKIP SUSE-RU-2020:1811-1 as SUSE-SLE-INSTALLER-15-SP2-2020-1811 is not security or has no CVEs. patches: SUSE-2020-1811,SUSE-SLE-INSTALLER-15-SP2-2020-1811 SKIP SUSE-RU-2020:1812-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1812 is not security or has no CVEs. patches: SUSE-2020-1812,SUSE-SLE-Module-Basesystem-15-SP1-2020-1812,SUSE-SLE-Module-Basesystem-15-SP2-2020-1812 SKIP SUSE-RU-2020:1813-1 as SUSE-SLE-SERVER-12-SP5-2020-1813 is not security or has no CVEs. patches: SUSE-2020-1813,SUSE-SLE-SERVER-12-SP5-2020-1813 SKIP SUSE-RU-2020:1814-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-1814 is not security or has no CVEs. patches: SUSE-2020-1814,SUSE-OpenStack-Cloud-9-2020-1814,SUSE-OpenStack-Cloud-Crowbar-9-2020-1814,SUSE-SLE-SAP-12-SP4-2020-1814,SUSE-SLE-SERVER-12-SP4-2020-1814,SUSE-SLE-SERVER-12-SP4-LTSS-2020-1814 SKIP SUSE-RU-2020:1815-1 as SUSE-Storage-5-2020-1815 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1815,SUSE-2020-1815,SUSE-OpenStack-Cloud-8-2020-1815,SUSE-OpenStack-Cloud-Crowbar-8-2020-1815,SUSE-SLE-SAP-12-SP3-2020-1815,SUSE-SLE-SERVER-12-SP3-2020-1815,SUSE-SLE-SERVER-12-SP3-BCL-2020-1815,SUSE-Storage-5-2020-1815 SKIP SUSE-RU-2020:1816-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1816 is not security or has no CVEs. patches: SUSE-2020-1816,SUSE-SLE-Module-Basesystem-15-SP1-2020-1816,SUSE-SLE-Module-Basesystem-15-SP2-2020-1816,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1816,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1816 SKIP SUSE-RU-2020:1816-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1816 is not security or has no CVEs. patches: SUSE-2020-1816,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1816 SKIP SUSE-RU-2020:1820-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1820 is not security or has no CVEs. patches: SUSE-2020-1820,SUSE-SLE-Module-Basesystem-15-SP1-2020-1820 SKIP SUSE-RU-2020:1821-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1821 is not security or has no CVEs. patches: SUSE-2020-1821,SUSE-SLE-Module-Basesystem-15-SP2-2020-1821 SKIP SUSE-RU-2020:1824-1 as SUSE-SLE-Product-HA-15-2020-1824 is not security or has no CVEs. patches: SUSE-2020-1824,SUSE-SLE-Product-HA-15-2020-1824 SKIP SUSE-RU-2020:1825-1 as SUSE-SLE-Product-HA-15-SP1-2020-1825 is not security or has no CVEs. patches: SUSE-2020-1825,SUSE-SLE-Product-HA-15-SP1-2020-1825 SKIP SUSE-RU-2020:1826-1 as SUSE-SLE-Product-HA-15-SP2-2020-1826 is not security or has no CVEs. patches: SUSE-2020-1826,SUSE-SLE-Product-HA-15-SP2-2020-1826 SKIP SUSE-RU-2020:1827-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1827 is not security or has no CVEs. patches: SUSE-2020-1827,SUSE-SLE-INSTALLER-15-SP2-2020-1827,SUSE-SLE-Module-Basesystem-15-SP2-2020-1827 SKIP SUSE-RU-2020:1829-1 as SUSE-SLE-Module-Containers-15-SP2-2020-1829 is not security or has no CVEs. patches: SUSE-2020-1829,SUSE-SLE-Module-Containers-15-SP2-2020-1829 SKIP SUSE-RU-2020:1830-1 as SUSE-SLE-Module-Containers-15-SP1-2020-1830 is not security or has no CVEs. patches: SUSE-2020-1830,SUSE-SLE-Module-Containers-15-SP1-2020-1830 SKIP SUSE-RU-2020:1831-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1831 is not security or has no CVEs. patches: SUSE-2020-1831,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1831 SKIP SUSE-RU-2020:1832-1 as SUSE-SUSE-Manager-Server-3.2-2020-1832 is not security or has no CVEs. patches: SUSE-2020-1832,SUSE-SUSE-Manager-Server-3.2-2020-1832 SKIP SUSE-RU-2020:1837-1 as SUSE-SLE-SERVER-12-SP5-2020-1837 is not security or has no CVEs. patches: SUSE-2020-1837,SUSE-SLE-SERVER-12-SP4-2020-1837,SUSE-SLE-SERVER-12-SP5-2020-1837 SKIP SUSE-RU-2020:1840-1 as SUSE-SLE-Module-Legacy-15-SP2-2020-1840 is not security or has no CVEs. patches: SUSE-2020-1840,SUSE-SLE-Module-Legacy-15-SP1-2020-1840,SUSE-SLE-Module-Legacy-15-SP2-2020-1840 SKIP SUSE-RU-2020:1844-1 as SUSE-SLE-HA-12-SP5-2020-1844 is not security or has no CVEs. patches: SUSE-2020-1844,SUSE-SLE-HA-12-SP4-2020-1844,SUSE-SLE-HA-12-SP5-2020-1844 SKIP SUSE-RU-2020:1845-1 as SUSE-SLE-HA-12-SP3-2020-1845 is not security or has no CVEs. patches: SUSE-2020-1845,SUSE-SLE-HA-12-SP3-2020-1845 SKIP SUSE-RU-2020:1846-1 as SUSE-SLE-SERVER-12-SP5-2020-1846 is not security or has no CVEs. patches: SUSE-2020-1846,SUSE-OpenStack-Cloud-9-2020-1846,SUSE-OpenStack-Cloud-Crowbar-9-2020-1846,SUSE-SLE-SAP-12-SP4-2020-1846,SUSE-SLE-SERVER-12-SP4-LTSS-2020-1846,SUSE-SLE-SERVER-12-SP5-2020-1846 SKIP SUSE-RU-2020:1848-1 as SUSE-SLE-HA-12-SP5-2020-1848 is not security or has no CVEs. patches: SUSE-2020-1848,SUSE-SLE-HA-12-SP4-2020-1848,SUSE-SLE-HA-12-SP5-2020-1848 SKIP SUSE-RU-2020:1849-1 as SUSE-SLE-HA-12-SP3-2020-1849 is not security or has no CVEs. patches: SUSE-2020-1849,SUSE-SLE-HA-12-SP3-2020-1849 SKIP SUSE-RU-2020:1852-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1852 is not security or has no CVEs. patches: SUSE-2020-1852,SUSE-SLE-Module-Basesystem-15-SP1-2020-1852,SUSE-SLE-Module-Basesystem-15-SP2-2020-1852,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1852 SKIP SUSE-RU-2020:1861-1 as SUSE-OpenStack-Cloud-Crowbar-8-2020-1861 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1861,SUSE-2020-1861,SUSE-OpenStack-Cloud-8-2020-1861,SUSE-OpenStack-Cloud-Crowbar-8-2020-1861 SKIP SUSE-RU-2020:1862-1 as SUSE-Storage-6-2020-1862 is not security or has no CVEs. patches: SUSE-2020-1862,SUSE-Storage-6-2020-1862 SKIP SUSE-RU-2020:1863-1 as SUSE-SLE-Module-Public-Cloud-15-2020-1863 is not security or has no CVEs. patches: SUSE-2020-1863,SUSE-SLE-Module-Public-Cloud-15-2020-1863 SKIP SUSE-RU-2020:1869-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1869 is not security or has no CVEs. patches: SUSE-2020-1869,SUSE-SLE-INSTALLER-15-2020-1869,SUSE-SLE-Module-Basesystem-15-SP1-2020-1869,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1869,SUSE-SLE-Product-HPC-15-2020-1869,SUSE-SLE-Product-SLES-15-2020-1869,SUSE-SLE-Product-SLES_SAP-15-2020-1869 SKIP SUSE-RU-2020:1870-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1870 is not security or has no CVEs. patches: SUSE-2020-1870,SUSE-SLE-Module-Basesystem-15-SP2-2020-1870 SKIP SUSE-RU-2020:1871-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1871 is not security or has no CVEs. patches: SUSE-2020-1871,SUSE-SLE-Module-Basesystem-15-SP1-2020-1871,SUSE-SLE-Module-Basesystem-15-SP2-2020-1871,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1871,SUSE-SLE-Module-Development-Tools-15-SP2-2020-1871,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1871,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1871 SKIP SUSE-RU-2020:1872-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-1872 is not security or has no CVEs. patches: SUSE-2020-1872,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2020-1872,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2020-1872,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-1872 SKIP SUSE-RU-2020:1881-1 as SUSE-SLE-SERVER-12-SP5-2020-1881 is not security or has no CVEs. patches: SUSE-2020-1881,SUSE-SLE-SAP-12-SP5-2020-1881,SUSE-SLE-SERVER-12-SP5-2020-1881 SKIP SUSE-RU-2020:1882-1 as SUSE-SLE-Product-HA-15-2020-1882 is not security or has no CVEs. patches: SUSE-2020-1882,SUSE-SLE-Product-HA-15-2020-1882 SKIP SUSE-RU-2020:1883-1 as SUSE-SLE-Product-HA-15-SP1-2020-1883 is not security or has no CVEs. patches: SUSE-2020-1883,SUSE-SLE-Product-HA-15-SP1-2020-1883 SKIP SUSE-RU-2020:1885-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1885 is not security or has no CVEs. patches: SUSE-2020-1885,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1885 SKIP SUSE-RU-2020:1890-1 as SUSE-SLE-HA-12-SP5-2020-1890 is not security or has no CVEs. patches: SUSE-2020-1890,SUSE-SLE-HA-12-SP4-2020-1890,SUSE-SLE-HA-12-SP5-2020-1890 SKIP SUSE-RU-2020:1893-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1893 is not security or has no CVEs. patches: SUSE-2020-1893,SUSE-SLE-Module-Public-Cloud-12-2020-1893 SKIP SUSE-RU-2020:1895-1 as SUSE-SLE-RT-12-SP4-2020-1895 is not security or has no CVEs. patches: SUSE-2020-1895,SUSE-SLE-HA-12-SP4-2020-1895,SUSE-SLE-RT-12-SP4-2020-1895 SKIP SUSE-RU-2020:1896-1 as SUSE-SLE-RT-12-SP5-2020-1896 is not security or has no CVEs. patches: SUSE-2020-1896,SUSE-SLE-HA-12-SP5-2020-1896,SUSE-SLE-RT-12-SP5-2020-1896 SKIP SUSE-RU-2020:1903-1 as SUSE-SLE-Product-WE-15-SP2-2020-1903 is not security or has no CVEs. patches: SUSE-2020-1903,SUSE-SLE-Product-WE-15-SP2-2020-1903 SKIP SUSE-RU-2020:1904-1 as SUSE-SLE-Product-WE-15-SP1-2020-1904 is not security or has no CVEs. patches: SUSE-2020-1904,SUSE-SLE-Product-WE-15-SP1-2020-1904 SKIP SUSE-RU-2020:1905-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1905 is not security or has no CVEs. patches: SUSE-2020-1905,SUSE-SLE-Module-Basesystem-15-SP1-2020-1905,SUSE-SLE-Module-Basesystem-15-SP2-2020-1905 SKIP SUSE-RU-2020:1906-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-1906 is not security or has no CVEs. patches: SUSE-2020-1906,SUSE-SLE-Module-Development-Tools-15-SP2-2020-1906 SKIP SUSE-RU-2020:1907-1 as SUSE-SLE-Product-HPC-15-2020-1907 is not security or has no CVEs. patches: SUSE-2020-1907,SUSE-SLE-Module-HPC-15-SP1-2020-1907,SUSE-SLE-Module-HPC-15-SP2-2020-1907,SUSE-SLE-Product-HPC-15-2020-1907 SKIP SUSE-RU-2020:1908-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1908 is not security or has no CVEs. patches: SUSE-2020-1908,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1908,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1908 SKIP SUSE-RU-2020:1909-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1909 is not security or has no CVEs. patches: SUSE-2020-1909,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1909,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1909 SKIP SUSE-RU-2020:1910-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1910 is not security or has no CVEs. patches: SUSE-2020-1910,SUSE-SLE-Module-Basesystem-15-SP2-2020-1910,SUSE-SLE-Module-Python2-15-SP2-2020-1910,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1910 SKIP SUSE-RU-2020:1916-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1916 is not security or has no CVEs. patches: SUSE-2020-1916,SUSE-SLE-Module-Basesystem-15-SP2-2020-1916,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1916 SKIP SUSE-RU-2020:1917-1 as SUSE-SLE-SERVER-12-SP5-2020-1917 is not security or has no CVEs. patches: SUSE-2020-1917,SUSE-SLE-SERVER-12-SP5-2020-1917 SKIP SUSE-RU-2020:1923-1 as SUSE-Storage-6-2020-1923 is not security or has no CVEs. patches: SUSE-2020-1923,SUSE-SLE-Module-Basesystem-15-SP1-2020-1923,SUSE-Storage-6-2020-1923 SKIP SUSE-RU-2020:1924-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1924 is not security or has no CVEs. patches: SUSE-2020-1924,SUSE-SLE-Module-Basesystem-15-SP1-2020-1924,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1924 SKIP SUSE-RU-2020:1926-1 as SUSE-SLE-SERVER-12-SP5-2020-1926 is not security or has no CVEs. patches: SUSE-2020-1926,SUSE-SLE-SERVER-12-SP5-2020-1926 SKIP SUSE-RU-2020:1927-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-1927 is not security or has no CVEs. patches: SUSE-2020-1927,SUSE-SLE-Module-RT-15-SP1-2020-1927,SUSE-SLE-Module-Server-Applications-15-SP1-2020-1927 SKIP SUSE-RU-2020:1928-1 as SUSE-SLE-Product-HA-15-2020-1928 is not security or has no CVEs. patches: SUSE-2020-1928,SUSE-SLE-Product-HA-15-2020-1928 SKIP SUSE-RU-2020:1929-1 as SUSE-SLE-Module-Python2-15-SP1-2020-1929 is not security or has no CVEs. patches: SUSE-2020-1929,SUSE-SLE-Module-Basesystem-15-SP1-2020-1929,SUSE-SLE-Module-HPC-15-SP1-2020-1929,SUSE-SLE-Module-Python2-15-SP1-2020-1929 SKIP SUSE-RU-2020:1938-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-1938 is not security or has no CVEs. patches: SUSE-2020-1938,SUSE-SLE-Module-Basesystem-15-SP2-2020-1938,SUSE-SLE-Module-Development-Tools-15-SP2-2020-1938 SKIP SUSE-RU-2020:1941-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1941 is not security or has no CVEs. patches: SUSE-2020-1941,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1941 SKIP SUSE-RU-2020:1942-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1942 is not security or has no CVEs. patches: SUSE-2020-1942,SUSE-SLE-Product-HPC-15-2020-1942,SUSE-SLE-Product-SLES-15-2020-1942,SUSE-SLE-Product-SLES_SAP-15-2020-1942 SKIP SUSE-RU-2020:1945-1 as SUSE-SLE-SDK-12-SP5-2020-1945 is not security or has no CVEs. patches: SUSE-2020-1945,SUSE-SLE-HA-12-SP5-2020-1945,SUSE-SLE-SDK-12-SP5-2020-1945 SKIP SUSE-RU-2020:1949-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1949 is not security or has no CVEs. patches: SUSE-2020-1949,SUSE-SLE-Module-Basesystem-15-SP1-2020-1949 SKIP SUSE-RU-2020:1950-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1950 is not security or has no CVEs. patches: SUSE-2020-1950,SUSE-SLE-Module-Basesystem-15-SP2-2020-1950 SKIP SUSE-RU-2020:1951-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1951 is not security or has no CVEs. patches: SUSE-2020-1951,SUSE-SLE-Module-Basesystem-15-SP1-2020-1951,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-1951 SKIP SUSE-RU-2020:1952-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1952 is not security or has no CVEs. patches: SUSE-2020-1952,SUSE-SLE-Module-Basesystem-15-SP1-2020-1952 SKIP SUSE-RU-2020:1953-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1953 is not security or has no CVEs. patches: SUSE-2020-1953,SUSE-SLE-Module-Basesystem-15-SP1-2020-1953,SUSE-SLE-Module-Basesystem-15-SP2-2020-1953 SKIP SUSE-RU-2020:1954-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1954 is not security or has no CVEs. patches: SUSE-2020-1954,SUSE-SLE-Module-Basesystem-15-SP2-2020-1954 SKIP SUSE-RU-2020:1955-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1955 is not security or has no CVEs. patches: SUSE-2020-1955,SUSE-SLE-Module-Development-Tools-15-SP1-2020-1955,SUSE-SLE-Module-Development-Tools-15-SP2-2020-1955,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1955,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1955 SKIP SUSE-RU-2020:1961-1 as SUSE-SLE-Product-WE-15-SP2-2020-1961 is not security or has no CVEs. patches: SUSE-2020-1961,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-1961,SUSE-SLE-Product-WE-15-SP2-2020-1961 SKIP SUSE-RU-2020:1964-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-1964 is not security or has no CVEs. patches: SUSE-2020-1964,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-1964 SKIP SUSE-RU-2020:1965-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1965 is not security or has no CVEs. patches: SUSE-2020-1965,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-1965,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1965 SKIP SUSE-RU-2020:1975-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1975 is not security or has no CVEs. patches: SUSE-2020-1975,SUSE-SLE-Module-Basesystem-15-SP2-2020-1975,SUSE-SLE-Module-Python2-15-SP2-2020-1975,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1975 SKIP SUSE-RU-2020:1979-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1979 is not security or has no CVEs. patches: SUSE-2020-1979,SUSE-SLE-Module-Basesystem-15-SP1-2020-1979,SUSE-SLE-Module-Basesystem-15-SP2-2020-1979,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-1979,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1979 SKIP SUSE-RU-2020:1980-1 as SUSE-SLE-Product-SLES_SAP-15-2020-1980 is not security or has no CVEs. patches: SUSE-2020-1980,SUSE-SLE-Product-HPC-15-2020-1980,SUSE-SLE-Product-SLES-15-2020-1980,SUSE-SLE-Product-SLES_SAP-15-2020-1980 SKIP SUSE-RU-2020:1981-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-1981 is not security or has no CVEs. patches: SUSE-2020-1981,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-1981,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-1981,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-1981 SKIP SUSE-RU-2020:1982-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1982 is not security or has no CVEs. patches: SUSE-2020-1982,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-1982 SKIP SUSE-RU-2020:1986-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-1986 is not security or has no CVEs. patches: SUSE-2020-1986,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-1986,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-1986,SUSE-SLE-Module-Public-Cloud-15-2020-1986,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-1986,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-1986,SUSE-SLE-Module-Server-Applications-15-SP2-2020-1986 SKIP SUSE-RU-2020:1987-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-1987 is not security or has no CVEs. patches: SUSE-2020-1987,SUSE-SLE-INSTALLER-15-SP2-2020-1987,SUSE-SLE-Module-Basesystem-15-SP2-2020-1987,SUSE-SLE-Module-Development-Tools-15-SP2-2020-1987 SKIP SUSE-RU-2020:1988-1 as SUSE-SLE-Module-Public-Cloud-12-2020-1988 is not security or has no CVEs. patches: SUSE-2020-1988,SUSE-SLE-Module-Public-Cloud-12-2020-1988 SKIP SUSE-RU-2020:1989-1 as SUSE-SLE-Product-SLES-15-SP2-2020-1989 is not security or has no CVEs. patches: SUSE-2020-1989,SUSE-SLE-Product-SLES-15-SP2-2020-1989 SKIP SUSE-RU-2020:1993-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1993 is not security or has no CVEs. patches: SUSE-2020-1993,SUSE-SLE-Module-Basesystem-15-SP2-2020-1993 SKIP SUSE-RU-2020:1994-1 as SUSE-SLE-SERVER-12-SP5-2020-1994 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-1994,SUSE-2020-1994,SUSE-OpenStack-Cloud-7-2020-1994,SUSE-OpenStack-Cloud-8-2020-1994,SUSE-OpenStack-Cloud-9-2020-1994,SUSE-OpenStack-Cloud-Crowbar-8-2020-1994,SUSE-OpenStack-Cloud-Crowbar-9-2020-1994,SUSE-SLE-SAP-12-SP2-2020-1994,SUSE-SLE-SAP-12-SP3-2020-1994,SUSE-SLE-SAP-12-SP4-2020-1994,SUSE-SLE-SDK-12-SP5-2020-1994,SUSE-SLE-SERVER-12-SP2-2020-1994,SUSE-SLE-SERVER-12-SP2-BCL-2020-1994,SUSE-SLE-SERVER-12-SP3-2020-1994,SUSE-SLE-SERVER-12-SP3-BCL-2020-1994,SUSE-SLE-SERVER-12-SP4-LTSS-2020-1994,SUSE-SLE-SERVER-12-SP5-2020-1994 SKIP SUSE-RU-2020:1995-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1995 is not security or has no CVEs. patches: SUSE-2020-1995,SUSE-SLE-Module-Basesystem-15-SP1-2020-1995,SUSE-SLE-Module-Basesystem-15-SP2-2020-1995 SKIP SUSE-RU-2020:1996-1 as SUSE-SLE-SERVER-12-SP5-2020-1996 is not security or has no CVEs. patches: SUSE-2020-1996,SUSE-SLE-SAP-12-SP5-2020-1996,SUSE-SLE-SERVER-12-SP5-2020-1996 SKIP SUSE-RU-2020:1997-1 as SUSE-SLE-Product-HA-15-SP2-2020-1997 is not security or has no CVEs. patches: SUSE-2020-1997,SUSE-SLE-Product-HA-15-SP2-2020-1997 SKIP SUSE-RU-2020:1998-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-1998 is not security or has no CVEs. patches: SUSE-2020-1998,SUSE-SLE-Module-Basesystem-15-SP1-2020-1998,SUSE-SLE-Module-Basesystem-15-SP2-2020-1998 SKIP SUSE-RU-2020:1999-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-1999 is not security or has no CVEs. patches: SUSE-2020-1999,SUSE-SLE-Module-Basesystem-15-SP1-2020-1999 SKIP SUSE-RU-2020:2000-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2000 is not security or has no CVEs. patches: SUSE-2020-2000,SUSE-SLE-Module-Basesystem-15-SP1-2020-2000,SUSE-SLE-Module-Basesystem-15-SP2-2020-2000 SKIP SUSE-RU-2020:2002-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2020-2002 is not security or has no CVEs. patches: SUSE-2020-2002,SUSE-SLE-Live-Patching-12-2020-2001,SUSE-SLE-Live-Patching-12-SP3-2020-2001,SUSE-SLE-Live-Patching-12-SP4-2020-2001,SUSE-SLE-Live-Patching-12-SP5-2020-2001,SUSE-SLE-Module-Live-Patching-15-2020-2002,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2002,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2002 SKIP SUSE-RU-2020:2006-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2006 is not security or has no CVEs. patches: SUSE-2020-2006,SUSE-SLE-Module-Basesystem-15-SP2-2020-2006,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2006,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2006 SKIP SUSE-RU-2020:2012-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2012 is not security or has no CVEs. patches: SUSE-2020-2012,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2012 SKIP SUSE-RU-2020:2017-1 as SUSE-SLE-SAP-12-SP2-2020-2017 is not security or has no CVEs. patches: SUSE-2020-2017,SUSE-SLE-SAP-12-SP2-2020-2017 SKIP SUSE-RU-2020:2018-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2018 is not security or has no CVEs. patches: SUSE-2020-2018,SUSE-SLE-Module-Basesystem-15-SP2-2020-2018,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2018 SKIP SUSE-RU-2020:2019-1 as SUSE-SLE-Product-HA-15-SP1-2020-2019 is not security or has no CVEs. patches: SUSE-2020-2019,SUSE-SLE-Product-HA-15-SP1-2020-2019 SKIP SUSE-RU-2020:2020-1 as SUSE-SLE-SAP-12-SP5-2020-2020 is not security or has no CVEs. patches: SUSE-2020-2020,SUSE-SLE-SAP-12-SP3-2020-2020,SUSE-SLE-SAP-12-SP4-2020-2020,SUSE-SLE-SAP-12-SP5-2020-2020 SKIP SUSE-RU-2020:2021-1 as SUSE-SLE-Product-HA-15-2020-2021 is not security or has no CVEs. patches: SUSE-2020-2021,SUSE-SLE-Product-HA-15-2020-2021 SKIP SUSE-RU-2020:2022-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2022 is not security or has no CVEs. patches: SUSE-2020-2022,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2022 SKIP SUSE-RU-2020:2023-1 as SUSE-SLE-Module-Web-Scripting-12-2020-2023 is not security or has no CVEs. patches: SUSE-2020-2023,SUSE-SLE-Module-Web-Scripting-12-2020-2023 SKIP SUSE-RU-2020:2024-1 as SUSE-SLE-HA-12-SP2-2020-2024 is not security or has no CVEs. patches: SUSE-2020-2024,SUSE-SLE-HA-12-SP2-2020-2024 SKIP SUSE-RU-2020:2033-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2033 is not security or has no CVEs. patches: SUSE-2020-2033,SUSE-SLE-Module-Basesystem-15-SP2-2020-2033 SKIP SUSE-RU-2020:2034-1 as SUSE-SLE-Product-HA-15-SP1-2020-2034 is not security or has no CVEs. patches: SUSE-2020-2034,SUSE-SLE-Product-HA-15-SP1-2020-2034 SKIP SUSE-RU-2020:2035-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2020-2035 is not security or has no CVEs. patches: SUSE-2020-2035,SUSE-SLE-Module-Adv-Systems-Management-12-2020-2035 SKIP SUSE-RU-2020:2038-1 as SUSE-SLE-HA-12-SP5-2020-2038 is not security or has no CVEs. patches: SUSE-2020-2038,SUSE-SLE-HA-12-SP4-2020-2038,SUSE-SLE-HA-12-SP5-2020-2038 SKIP SUSE-RU-2020:2039-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2039 is not security or has no CVEs. patches: SUSE-2020-2039,SUSE-SLE-Module-Basesystem-15-SP2-2020-2039 SKIP SUSE-RU-2020:2040-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2040 is not security or has no CVEs. patches: SUSE-2020-2040,SUSE-SLE-Module-Basesystem-15-SP1-2020-2040,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2040,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2040 SKIP SUSE-RU-2020:2042-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2042 is not security or has no CVEs. patches: SUSE-2020-2042,SUSE-SLE-Module-SAP-Applications-15-2020-2042,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2042,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2042 SKIP SUSE-RU-2020:2043-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2043 is not security or has no CVEs. patches: SUSE-2020-2043,SUSE-SLE-Module-Basesystem-15-SP2-2020-2043 SKIP SUSE-RU-2020:2044-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2044 is not security or has no CVEs. patches: SUSE-2020-2044,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2044 SKIP SUSE-RU-2020:2050-1 as SUSE-SLE-HA-12-SP5-2020-2050 is not security or has no CVEs. patches: SUSE-2020-2050,SUSE-SLE-HA-12-SP4-2020-2050,SUSE-SLE-HA-12-SP5-2020-2050 SKIP SUSE-RU-2020:2051-1 as SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2051 is not security or has no CVEs. patches: SUSE-2020-2051,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2051 SKIP SUSE-RU-2020:2058-1 as SUSE-Storage-5-2020-2058 is not security or has no CVEs. patches: SUSE-2020-2058,SUSE-Storage-5-2020-2058 SKIP SUSE-RU-2020:2059-1 as SUSE-SLE-SERVER-12-SP5-2020-2059 is not security or has no CVEs. patches: SUSE-2020-2059,SUSE-SLE-SERVER-12-SP5-2020-2059 SKIP SUSE-RU-2020:2061-1 as SUSE-SLE-Product-HA-15-SP2-2020-2061 is not security or has no CVEs. patches: SUSE-2020-2061,SUSE-SLE-Product-HA-15-SP2-2020-2061 SKIP SUSE-RU-2020:2062-1 as SUSE-SLE-Product-HA-15-SP1-2020-2062 is not security or has no CVEs. patches: SUSE-2020-2062,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2062,SUSE-SLE-Product-HA-15-SP1-2020-2062 SKIP SUSE-RU-2020:2063-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2063 is not security or has no CVEs. patches: SUSE-2020-2063,SUSE-SLE-Module-Basesystem-15-SP2-2020-2063 SKIP SUSE-RU-2020:2064-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2064 is not security or has no CVEs. patches: SUSE-2020-2064,SUSE-SLE-Module-Basesystem-15-SP1-2020-2064 SKIP SUSE-RU-2020:2070-1 as SUSE-SLE-Product-HA-15-2020-2070 is not security or has no CVEs. patches: SUSE-2020-2070,SUSE-SLE-Product-HA-15-2020-2070 SKIP SUSE-RU-2020:2071-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2071 is not security or has no CVEs. patches: SUSE-2020-2071,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2071,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2071,SUSE-SLE-Product-HPC-15-2020-2071,SUSE-SLE-Product-SLES-15-2020-2071,SUSE-SLE-Product-SLES_SAP-15-2020-2071 SKIP SUSE-RU-2020:2080-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2080 is not security or has no CVEs. patches: SUSE-2020-2080,SUSE-SLE-Module-Basesystem-15-SP1-2020-2080,SUSE-SLE-Module-Basesystem-15-SP2-2020-2080,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2080,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2080,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2080,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2080,SUSE-SLE-Product-HPC-15-2020-2080,SUSE-SLE-Product-SLES-15-2020-2080,SUSE-SLE-Product-SLES_SAP-15-2020-2080 SKIP SUSE-RU-2020:2081-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2081 is not security or has no CVEs. patches: SUSE-2020-2081,SUSE-SLE-Module-Public-Cloud-12-2020-2081 SKIP SUSE-RU-2020:2082-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2082 is not security or has no CVEs. patches: SUSE-2020-2082,SUSE-SLE-Module-Public-Cloud-15-2020-2082,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2082,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2082 SKIP SUSE-RU-2020:2083-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2083 is not security or has no CVEs. patches: SUSE-2020-2083,SUSE-SLE-Module-Basesystem-15-SP1-2020-2083,SUSE-SLE-Module-Basesystem-15-SP2-2020-2083 SKIP SUSE-RU-2020:2084-1 as SUSE-SLE-SERVER-12-SP5-2020-2084 is not security or has no CVEs. patches: SUSE-2020-2084,SUSE-SLE-SERVER-12-SP5-2020-2084 SKIP SUSE-RU-2020:2085-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2085 is not security or has no CVEs. patches: SUSE-2020-2085,SUSE-SLE-Module-Basesystem-15-SP1-2020-2085,SUSE-SLE-Module-Basesystem-15-SP2-2020-2085 SKIP SUSE-RU-2020:2088-1 as SUSE-SLE-Product-HPC-15-2020-2088 is not security or has no CVEs. patches: SUSE-2020-2088,SUSE-SLE-Product-HPC-15-2020-2088 SKIP SUSE-RU-2020:2089-1 as SUSE-SLE-Module-HPC-15-SP2-2020-2089 is not security or has no CVEs. patches: SUSE-2020-2089,SUSE-SLE-Module-HPC-15-SP2-2020-2089 SKIP SUSE-RU-2020:2090-1 as SUSE-SLE-Module-HPC-15-SP1-2020-2090 is not security or has no CVEs. patches: SUSE-2020-2090,SUSE-SLE-Module-HPC-15-SP1-2020-2090 SKIP SUSE-RU-2020:2091-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2091 is not security or has no CVEs. patches: SUSE-2020-2091,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2091,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2091 SKIP SUSE-RU-2020:2092-1 as SUSE-SLE-SERVER-12-SP5-2020-2092 is not security or has no CVEs. patches: SUSE-2020-2092,SUSE-SLE-SDK-12-SP5-2020-2092,SUSE-SLE-SERVER-12-SP5-2020-2092 SKIP SUSE-RU-2020:2093-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2093 is not security or has no CVEs. patches: SUSE-2020-2093,SUSE-SLE-Module-Basesystem-15-SP1-2020-2093 SKIP SUSE-RU-2020:2094-1 as SUSE-SLE-Product-HA-15-SP2-2020-2094 is not security or has no CVEs. patches: SUSE-2020-2094,SUSE-SLE-Product-HA-15-SP2-2020-2094 SKIP SUSE-RU-2020:2096-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2096 is not security or has no CVEs. patches: SUSE-2020-2096,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2096 SKIP SUSE-RU-2020:2098-1 as SUSE-SLE-Product-SLES-15-SP2-2020-2098 is not security or has no CVEs. patches: SUSE-2020-2098,SUSE-SLE-INSTALLER-15-SP2-2020-2098,SUSE-SLE-Product-SLES-15-SP2-2020-2098 SKIP SUSE-RU-2020:2099-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2099 is not security or has no CVEs. patches: SUSE-2020-2099,SUSE-SLE-INSTALLER-15-SP1-2020-2099,SUSE-SLE-Module-Basesystem-15-SP1-2020-2099,SUSE-SLE-Module-Basesystem-15-SP2-2020-2099 SKIP SUSE-RU-2020:2111-1 as SUSE-SLE-Product-WE-15-SP2-2020-2111 is not security or has no CVEs. patches: SUSE-2020-2111,SUSE-SLE-Product-WE-15-SP2-2020-2111 SKIP SUSE-RU-2020:2113-1 as SUSE-SLE-Product-HA-15-SP2-2020-2113 is not security or has no CVEs. patches: SUSE-2020-2113,SUSE-SLE-Product-HA-15-SP1-2020-2113,SUSE-SLE-Product-HA-15-SP2-2020-2113 SKIP SUSE-RU-2020:2114-1 as SUSE-Storage-5-2020-2114 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2114,SUSE-2020-2114,SUSE-OpenStack-Cloud-7-2020-2114,SUSE-OpenStack-Cloud-8-2020-2114,SUSE-OpenStack-Cloud-9-2020-2114,SUSE-OpenStack-Cloud-Crowbar-8-2020-2114,SUSE-OpenStack-Cloud-Crowbar-9-2020-2114,SUSE-SLE-SAP-12-SP2-2020-2114,SUSE-SLE-SAP-12-SP3-2020-2114,SUSE-SLE-SAP-12-SP4-2020-2114,SUSE-SLE-SDK-12-SP5-2020-2114,SUSE-SLE-SERVER-12-SP2-2020-2114,SUSE-SLE-SERVER-12-SP2-BCL-2020-2114,SUSE-SLE-SERVER-12-SP3-2020-2114,SUSE-SLE-SERVER-12-SP3-BCL-2020-2114,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2114,SUSE-SLE-SERVER-12-SP5-2020-2114,SUSE-Storage-5-2020-2114 SKIP SUSE-RU-2020:2115-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2115 is not security or has no CVEs. patches: SUSE-2020-2115,SUSE-SLE-Module-Basesystem-15-SP1-2020-2115,SUSE-SLE-Module-Basesystem-15-SP2-2020-2115,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2115,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2115 SKIP SUSE-RU-2020:2124-1 as SUSE-SLE-Product-HA-15-SP1-2020-2124 is not security or has no CVEs. patches: SUSE-2020-2124,SUSE-SLE-Module-Basesystem-15-SP1-2020-2124,SUSE-SLE-Product-HA-15-SP1-2020-2124 SKIP SUSE-RU-2020:2125-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2125 is not security or has no CVEs. patches: SUSE-2020-2125,SUSE-SLE-Module-Public-Cloud-12-2020-2125 SKIP SUSE-RU-2020:2126-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2126 is not security or has no CVEs. patches: SUSE-2020-2126,SUSE-SLE-Module-Containers-15-SP1-2020-2126,SUSE-SLE-Module-Containers-15-SP2-2020-2126,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2126,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2126 SKIP SUSE-RU-2020:2127-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2127 is not security or has no CVEs. patches: SUSE-2020-2127,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2127,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2127 SKIP SUSE-RU-2020:2128-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2128 is not security or has no CVEs. patches: SUSE-2020-2128,SUSE-SLE-Module-Basesystem-15-SP1-2020-2128,SUSE-SLE-Module-Basesystem-15-SP2-2020-2128,SUSE-SLE-Module-SAP-Applications-15-2020-2128,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2128 SKIP SUSE-RU-2020:2130-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2130 is not security or has no CVEs. patches: SUSE-2020-2130,SUSE-SLE-Module-Public-Cloud-15-2020-2130,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2130,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2130 SKIP SUSE-RU-2020:2131-1 as SUSE-Storage-5-2020-2131 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2131,SUSE-2020-2131,SUSE-OpenStack-Cloud-8-2020-2131,SUSE-OpenStack-Cloud-9-2020-2131,SUSE-OpenStack-Cloud-Crowbar-8-2020-2131,SUSE-OpenStack-Cloud-Crowbar-9-2020-2131,SUSE-SLE-SAP-12-SP3-2020-2131,SUSE-SLE-SAP-12-SP4-2020-2131,SUSE-SLE-SERVER-12-SP3-2020-2131,SUSE-SLE-SERVER-12-SP3-BCL-2020-2131,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2131,SUSE-SLE-SERVER-12-SP5-2020-2131,SUSE-Storage-5-2020-2131 SKIP SUSE-RU-2020:2132-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2132 is not security or has no CVEs. patches: SUSE-2020-2132,SUSE-SLE-Module-Public-Cloud-12-2020-2132 SKIP SUSE-RU-2020:2136-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-2136 is not security or has no CVEs. patches: SUSE-2020-2136,SUSE-SLE-SERVER-12-SP5-2020-2136,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-2136 SKIP SUSE-RU-2020:2137-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2137 is not security or has no CVEs. patches: SUSE-2020-2137,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2137 SKIP SUSE-RU-2020:2138-1 as SUSE-Storage-5-2020-2138 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2138,SUSE-2020-2138,SUSE-OpenStack-Cloud-8-2020-2138,SUSE-OpenStack-Cloud-Crowbar-8-2020-2138,SUSE-SLE-SAP-12-SP3-2020-2138,SUSE-SLE-SERVER-12-SP3-2020-2138,SUSE-SLE-SERVER-12-SP3-BCL-2020-2138,SUSE-Storage-5-2020-2138 SKIP SUSE-RU-2020:2139-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2139 is not security or has no CVEs. patches: SUSE-2020-2139,SUSE-SLE-INSTALLER-15-SP2-2020-2139,SUSE-SLE-Module-Basesystem-15-SP2-2020-2139,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2139 SKIP SUSE-RU-2020:2145-1 as SUSE-SLE-SERVER-12-SP5-2020-2145 is not security or has no CVEs. patches: SUSE-2020-2145,SUSE-SLE-SERVER-12-SP5-2020-2145 SKIP SUSE-RU-2020:2146-1 as SUSE-SLE-Product-WE-15-SP2-2020-2146 is not security or has no CVEs. patches: SUSE-2020-2146,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2146,SUSE-SLE-Product-WE-15-SP2-2020-2146 SKIP SUSE-RU-2020:2148-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2148 is not security or has no CVEs. patches: SUSE-2020-2148,SUSE-SLE-Module-Basesystem-15-SP2-2020-2148 SKIP SUSE-RU-2020:2150-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2150 is not security or has no CVEs. patches: SUSE-2020-2150,SUSE-SLE-Module-RT-15-SP2-2020-2150,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2150 SKIP SUSE-RU-2020:2153-1 as SUSE-SUSE-Manager-Server-3.2-2020-2153 is not security or has no CVEs. patches: SUSE-2020-2153,SUSE-SUSE-Manager-Server-3.2-2020-2153 SKIP SUSE-RU-2020:2154-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-2154 is not security or has no CVEs. patches: SUSE-2020-2154,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-2154,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-2154,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-2154 SKIP SUSE-RU-2020:2155-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2155 is not security or has no CVEs. patches: SUSE-2020-2155,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-2155,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2155 SKIP SUSE-RU-2020:2162-1 as SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2162 is not security or has no CVEs. patches: SUSE-2020-2162,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2162,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2162 SKIP SUSE-RU-2020:2163-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2163 is not security or has no CVEs. patches: SUSE-2020-2163,SUSE-SLE-Module-SAP-Applications-15-2020-2163,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2163 SKIP SUSE-RU-2020:2164-1 as SUSE-SLE-WE-12-SP5-2020-2164 is not security or has no CVEs. patches: SUSE-2020-2164,SUSE-SLE-HA-12-SP5-2020-2164,SUSE-SLE-SDK-12-SP5-2020-2164,SUSE-SLE-SERVER-12-SP5-2020-2164,SUSE-SLE-WE-12-SP5-2020-2164 SKIP SUSE-RU-2020:2165-1 as SUSE-SLE-Product-WE-15-SP1-2020-2165 is not security or has no CVEs. patches: SUSE-2020-2165,SUSE-SLE-Live-Patching-12-SP5-2020-2164,SUSE-SLE-Module-Basesystem-15-SP1-2020-2165,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2165,SUSE-SLE-Module-Legacy-15-SP1-2020-2165,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2165,SUSE-SLE-Product-HA-15-SP1-2020-2165,SUSE-SLE-Product-WE-15-SP1-2020-2165 SKIP SUSE-RU-2020:2174-1 as SUSE-SLE-Module-Public-Cloud-15-2020-2174 is not security or has no CVEs. patches: SUSE-2020-2174,SUSE-SLE-Module-Public-Cloud-15-2020-2174 SKIP SUSE-RU-2020:2175-1 as SUSE-SLE-HA-12-SP3-2020-2175 is not security or has no CVEs. patches: SUSE-2020-2175,SUSE-SLE-HA-12-SP3-2020-2175 SKIP SUSE-RU-2020:2176-1 as SUSE-SLE-HA-12-SP2-2020-2176 is not security or has no CVEs. patches: SUSE-2020-2176,SUSE-SLE-HA-12-SP2-2020-2176 SKIP SUSE-RU-2020:2177-1 as SUSE-SLE-HA-12-SP5-2020-2177 is not security or has no CVEs. patches: SUSE-2020-2177,SUSE-SLE-HA-12-SP5-2020-2177 SKIP SUSE-RU-2020:2178-1 as SUSE-SLE-HA-12-SP4-2020-2178 is not security or has no CVEs. patches: SUSE-2020-2178,SUSE-SLE-HA-12-SP4-2020-2178 SKIP SUSE-RU-2020:2182-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2182 is not security or has no CVEs. patches: SUSE-2020-2182,SUSE-SLE-Module-Basesystem-15-SP1-2020-2182,SUSE-SLE-Module-Basesystem-15-SP2-2020-2182 SKIP SUSE-RU-2020:2183-1 as SUSE-SLE-Module-RT-15-SP1-2020-2183 is not security or has no CVEs. patches: SUSE-2020-2183,SUSE-SLE-Module-Basesystem-15-SP1-2020-2183,SUSE-SLE-Module-Basesystem-15-SP2-2020-2183,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2183,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2183,SUSE-SLE-Module-RT-15-SP1-2020-2183 SKIP SUSE-RU-2020:2184-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2184 is not security or has no CVEs. patches: SUSE-2020-2184,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2184 SKIP SUSE-RU-2020:2185-1 as SUSE-SLE-Product-HA-15-2020-2185 is not security or has no CVEs. patches: SUSE-2020-2185,SUSE-SLE-Product-HA-15-2020-2185 SKIP SUSE-RU-2020:2186-1 as SUSE-SLE-Product-HA-15-SP1-2020-2186 is not security or has no CVEs. patches: SUSE-2020-2186,SUSE-SLE-Product-HA-15-SP1-2020-2186 SKIP SUSE-RU-2020:2187-1 as SUSE-SLE-Product-HA-15-SP2-2020-2187 is not security or has no CVEs. patches: SUSE-2020-2187,SUSE-SLE-Product-HA-15-SP2-2020-2187 SKIP SUSE-RU-2020:2188-1 as SUSE-SLE-SERVER-12-SP5-2020-2188 is not security or has no CVEs. patches: SUSE-2020-2188,SUSE-SLE-SERVER-12-SP5-2020-2188 SKIP SUSE-RU-2020:2189-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2189 is not security or has no CVEs. patches: SUSE-2020-2189,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2189,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2189 SKIP SUSE-RU-2020:2190-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2190 is not security or has no CVEs. patches: SUSE-2020-2190,SUSE-SLE-Module-Public-Cloud-12-2020-2190 SKIP SUSE-RU-2020:2191-1 as SUSE-SLE-Product-HA-15-SP2-2020-2191 is not security or has no CVEs. patches: SUSE-2020-2191,SUSE-SLE-Product-HA-15-SP2-2020-2191 SKIP SUSE-RU-2020:2192-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2192 is not security or has no CVEs. patches: SUSE-2020-2192,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2192 SKIP SUSE-RU-2020:2205-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2205 is not security or has no CVEs. patches: SUSE-2020-2205,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-2205,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2205 SKIP SUSE-RU-2020:2206-1 as SUSE-SLE-SERVER-12-SP5-2020-2206 is not security or has no CVEs. patches: SUSE-2020-2206,SUSE-SLE-SAP-12-SP3-2020-2206,SUSE-SLE-SAP-12-SP4-2020-2206,SUSE-SLE-SAP-12-SP5-2020-2206,SUSE-SLE-SERVER-12-SP5-2020-2206 SKIP SUSE-RU-2020:2208-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2208 is not security or has no CVEs. patches: SUSE-2020-2208,SUSE-SLE-Module-Basesystem-15-SP1-2020-2208,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2208,SUSE-SLE-Product-HPC-15-2020-2208,SUSE-SLE-Product-SLES-15-2020-2208,SUSE-SLE-Product-SLES_SAP-15-2020-2208 SKIP SUSE-RU-2020:2209-1 as SUSE-SLE-SAP-12-SP5-2020-2209 is not security or has no CVEs. patches: SUSE-2020-2209,SUSE-SLE-SAP-12-SP3-2020-2209,SUSE-SLE-SAP-12-SP4-2020-2209,SUSE-SLE-SAP-12-SP5-2020-2209 SKIP SUSE-RU-2020:2210-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2210 is not security or has no CVEs. patches: SUSE-2020-2210,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2210,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2210 SKIP SUSE-RU-2020:2211-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2211 is not security or has no CVEs. patches: SUSE-2020-2211,SUSE-SLE-Module-Basesystem-15-SP1-2020-2211 SKIP SUSE-RU-2020:2212-1 as SUSE-SLE-SERVER-12-SP5-2020-2212 is not security or has no CVEs. patches: SUSE-2020-2212,SUSE-SLE-SERVER-12-SP5-2020-2212 SKIP SUSE-RU-2020:2214-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2214 is not security or has no CVEs. patches: SUSE-2020-2214,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2214,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2214 SKIP SUSE-RU-2020:2218-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2218 is not security or has no CVEs. patches: SUSE-2020-2218,SUSE-SLE-Module-Public-Cloud-12-2020-2218 SKIP SUSE-RU-2020:2219-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2219 is not security or has no CVEs. patches: SUSE-2020-2219,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2219,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2219 SKIP SUSE-RU-2020:2220-1 as SUSE-SLE-Product-HA-15-SP2-2020-2220 is not security or has no CVEs. patches: SUSE-2020-2220,SUSE-SLE-Product-HA-15-2020-2220,SUSE-SLE-Product-HA-15-SP1-2020-2220,SUSE-SLE-Product-HA-15-SP2-2020-2220 SKIP SUSE-RU-2020:2221-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2221 is not security or has no CVEs. patches: SUSE-2020-2221,SUSE-SLE-Product-HPC-15-2020-2221,SUSE-SLE-Product-SLES-15-2020-2221,SUSE-SLE-Product-SLES_SAP-15-2020-2221 SKIP SUSE-RU-2020:2222-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2222 is not security or has no CVEs. patches: SUSE-2020-2222,SUSE-SLE-Module-Basesystem-15-SP1-2020-2222 SKIP SUSE-RU-2020:2223-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2223 is not security or has no CVEs. patches: SUSE-2020-2223,SUSE-SLE-Product-HPC-15-2020-2223,SUSE-SLE-Product-SLES-15-2020-2223,SUSE-SLE-Product-SLES_SAP-15-2020-2223 SKIP SUSE-RU-2020:2224-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2224 is not security or has no CVEs. patches: SUSE-2020-2224,SUSE-SLE-Module-Basesystem-15-SP1-2020-2224,SUSE-SLE-Module-Basesystem-15-SP2-2020-2224,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2224,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2224 SKIP SUSE-RU-2020:2226-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2226 is not security or has no CVEs. patches: SUSE-2020-2226,SUSE-SLE-Product-HPC-15-2020-2226,SUSE-SLE-Product-SLES-15-2020-2226,SUSE-SLE-Product-SLES_SAP-15-2020-2226 SKIP SUSE-RU-2020:2227-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2227 is not security or has no CVEs. patches: SUSE-2020-2227,SUSE-SLE-Module-Basesystem-15-SP2-2020-2227 SKIP SUSE-RU-2020:2228-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-2228 is not security or has no CVEs. patches: SUSE-2020-2228,SUSE-OpenStack-Cloud-9-2020-2228,SUSE-OpenStack-Cloud-Crowbar-9-2020-2228,SUSE-SLE-SAP-12-SP4-2020-2228,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2228 SKIP SUSE-RU-2020:2229-1 as SUSE-SLE-WE-12-SP5-2020-2229 is not security or has no CVEs. patches: SUSE-2020-2229,SUSE-SLE-SDK-12-SP5-2020-2229,SUSE-SLE-SERVER-12-SP5-2020-2229,SUSE-SLE-WE-12-SP5-2020-2229 SKIP SUSE-RU-2020:2230-1 as SUSE-SLE-SERVER-12-SP5-2020-2230 is not security or has no CVEs. patches: SUSE-2020-2230,SUSE-SLE-SDK-12-SP5-2020-2230,SUSE-SLE-SERVER-12-SP5-2020-2230 SKIP SUSE-RU-2020:2231-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2231 is not security or has no CVEs. patches: SUSE-2020-2231,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2231,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2231 SKIP SUSE-RU-2020:2236-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2236 is not security or has no CVEs. patches: SUSE-2020-2236,SUSE-SLE-Module-Basesystem-15-SP2-2020-2236 SKIP SUSE-RU-2020:2243-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2243 is not security or has no CVEs. patches: SUSE-2020-2243,SUSE-SLE-Product-HPC-15-2020-2243,SUSE-SLE-Product-SLES-15-2020-2243,SUSE-SLE-Product-SLES_SAP-15-2020-2243 SKIP SUSE-RU-2020:2244-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2244 is not security or has no CVEs. patches: SUSE-2020-2244,SUSE-SLE-Module-Basesystem-15-SP2-2020-2244,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2244 SKIP SUSE-RU-2020:2245-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2245 is not security or has no CVEs. patches: SUSE-2020-2245,SUSE-SLE-Module-Basesystem-15-SP1-2020-2245,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2245 SKIP SUSE-RU-2020:2247-1 as SUSE-SLE-SERVER-12-SP5-2020-2247 is not security or has no CVEs. patches: SUSE-2020-2247,SUSE-OpenStack-Cloud-9-2020-2247,SUSE-OpenStack-Cloud-Crowbar-9-2020-2247,SUSE-SLE-SAP-12-SP4-2020-2247,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2247,SUSE-SLE-SERVER-12-SP5-2020-2247 SKIP SUSE-RU-2020:2249-1 as SUSE-Storage-5-2020-2249 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2249,SUSE-2020-2249,SUSE-OpenStack-Cloud-8-2020-2249,SUSE-OpenStack-Cloud-Crowbar-8-2020-2249,SUSE-SLE-SAP-12-SP3-2020-2249,SUSE-SLE-SERVER-12-SP3-2020-2249,SUSE-SLE-SERVER-12-SP3-BCL-2020-2249,SUSE-Storage-5-2020-2249 SKIP SUSE-RU-2020:2250-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-2250 is not security or has no CVEs. patches: SUSE-2020-2250,SUSE-OpenStack-Cloud-7-2020-2250,SUSE-SLE-SAP-12-SP2-2020-2250,SUSE-SLE-SERVER-12-SP2-2020-2250,SUSE-SLE-SERVER-12-SP2-BCL-2020-2250 SKIP SUSE-RU-2020:2252-1 as SUSE-SLE-Product-HA-15-SP2-2020-2252 is not security or has no CVEs. patches: SUSE-2020-2252,SUSE-SLE-Product-HA-15-SP2-2020-2252 SKIP SUSE-RU-2020:2253-1 as SUSE-SLE-SAP-12-SP5-2020-2253 is not security or has no CVEs. patches: SUSE-2020-2253,SUSE-SLE-SAP-12-SP3-2020-2253,SUSE-SLE-SAP-12-SP4-2020-2253,SUSE-SLE-SAP-12-SP5-2020-2253 SKIP SUSE-RU-2020:2254-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2254 is not security or has no CVEs. patches: SUSE-2020-2254,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2254 SKIP SUSE-RU-2020:2255-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2255 is not security or has no CVEs. patches: SUSE-2020-2255,SUSE-SLE-Module-SAP-Applications-15-2020-2255,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2255 SKIP SUSE-RU-2020:2256-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2256 is not security or has no CVEs. patches: SUSE-2020-2256,SUSE-SLE-Module-Basesystem-15-SP1-2020-2256,SUSE-SLE-Module-Basesystem-15-SP2-2020-2256 SKIP SUSE-RU-2020:2261-1 as SUSE-SLE-SERVER-12-SP5-2020-2261 is not security or has no CVEs. patches: SUSE-2020-2261,SUSE-SLE-SDK-12-SP5-2020-2261,SUSE-SLE-SERVER-12-SP5-2020-2261 SKIP SUSE-RU-2020:2262-1 as SUSE-SLE-Module-RT-15-SP1-2020-2262 is not security or has no CVEs. patches: SUSE-2020-2262,SUSE-SLE-Module-RT-15-SP1-2020-2262,SUSE-SLE-Module-RT-15-SP2-2020-2262 SKIP SUSE-RU-2020:2273-1 as SUSE-Storage-5-2020-2273 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2273,SUSE-2020-2273,SUSE-OpenStack-Cloud-7-2020-2273,SUSE-OpenStack-Cloud-8-2020-2273,SUSE-OpenStack-Cloud-Crowbar-8-2020-2273,SUSE-SLE-SAP-12-SP2-2020-2273,SUSE-SLE-SAP-12-SP3-2020-2273,SUSE-SLE-SERVER-12-SP2-2020-2273,SUSE-SLE-SERVER-12-SP2-BCL-2020-2273,SUSE-SLE-SERVER-12-SP3-2020-2273,SUSE-SLE-SERVER-12-SP3-BCL-2020-2273,SUSE-Storage-5-2020-2273 SKIP SUSE-RU-2020:2278-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2278 is not security or has no CVEs. patches: SUSE-2020-2278,SUSE-SLE-Module-Basesystem-15-SP1-2020-2278,SUSE-SLE-Module-Basesystem-15-SP2-2020-2278,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2278,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2278 SKIP SUSE-RU-2020:2279-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2279 is not security or has no CVEs. patches: SUSE-2020-2279,SUSE-SLE-INSTALLER-15-2020-2279,SUSE-SLE-Product-HPC-15-2020-2279,SUSE-SLE-Product-SLES-15-2020-2279,SUSE-SLE-Product-SLES_SAP-15-2020-2279 SKIP SUSE-RU-2020:2280-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2280 is not security or has no CVEs. patches: SUSE-2020-2280,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2280,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2280 SKIP SUSE-RU-2020:2281-1 as SUSE-Storage-6-2020-2281 is not security or has no CVEs. patches: SUSE-2020-2281,SUSE-SLE-Module-Legacy-15-SP1-2020-2281,SUSE-SLE-Module-Legacy-15-SP2-2020-2281,SUSE-Storage-6-2020-2281 SKIP SUSE-RU-2020:2282-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2282 is not security or has no CVEs. patches: SUSE-2020-2282,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2282 SKIP SUSE-RU-2020:2284-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2284 is not security or has no CVEs. patches: SUSE-2020-2284,SUSE-SLE-Module-Basesystem-15-SP1-2020-2284,SUSE-SLE-Product-HPC-15-2020-2284,SUSE-SLE-Product-SLES-15-2020-2284,SUSE-SLE-Product-SLES_SAP-15-2020-2284 SKIP SUSE-RU-2020:2285-1 as SUSE-Storage-5-2020-2285 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2285,SUSE-2020-2285,SUSE-OpenStack-Cloud-7-2020-2285,SUSE-OpenStack-Cloud-8-2020-2285,SUSE-OpenStack-Cloud-9-2020-2285,SUSE-OpenStack-Cloud-Crowbar-8-2020-2285,SUSE-OpenStack-Cloud-Crowbar-9-2020-2285,SUSE-SLE-SAP-12-SP2-2020-2285,SUSE-SLE-SAP-12-SP3-2020-2285,SUSE-SLE-SAP-12-SP4-2020-2285,SUSE-SLE-SERVER-12-SP2-2020-2285,SUSE-SLE-SERVER-12-SP2-BCL-2020-2285,SUSE-SLE-SERVER-12-SP3-2020-2285,SUSE-SLE-SERVER-12-SP3-BCL-2020-2285,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2285,SUSE-SLE-SERVER-12-SP5-2020-2285,SUSE-Storage-5-2020-2285 SKIP SUSE-RU-2020:2287-1 as SUSE-SLE-SERVER-12-SP5-2020-2287 is not security or has no CVEs. patches: SUSE-2020-2287,SUSE-SLE-SERVER-12-SP5-2020-2287 SKIP SUSE-RU-2020:2289-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2289 is not security or has no CVEs. patches: SUSE-2020-2289,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2289,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2289 SKIP SUSE-RU-2020:2290-1 as SUSE-SLE-SERVER-12-SP5-2020-2290 is not security or has no CVEs. patches: SUSE-2020-2290,SUSE-SLE-SERVER-12-SP5-2020-2290 SKIP SUSE-RU-2020:2294-1 as SUSE-Storage-5-2020-2294 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2294,SUSE-2020-2294,SUSE-OpenStack-Cloud-7-2020-2294,SUSE-OpenStack-Cloud-8-2020-2294,SUSE-OpenStack-Cloud-9-2020-2294,SUSE-OpenStack-Cloud-Crowbar-8-2020-2294,SUSE-OpenStack-Cloud-Crowbar-9-2020-2294,SUSE-SLE-SAP-12-SP2-2020-2294,SUSE-SLE-SAP-12-SP3-2020-2294,SUSE-SLE-SAP-12-SP4-2020-2294,SUSE-SLE-SDK-12-SP5-2020-2294,SUSE-SLE-SERVER-12-SP2-2020-2294,SUSE-SLE-SERVER-12-SP2-BCL-2020-2294,SUSE-SLE-SERVER-12-SP3-2020-2294,SUSE-SLE-SERVER-12-SP3-BCL-2020-2294,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2294,SUSE-SLE-SERVER-12-SP5-2020-2294,SUSE-Storage-5-2020-2294 SKIP SUSE-RU-2020:2298-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2298 is not security or has no CVEs. patches: SUSE-2020-2298,SUSE-SLE-Module-Basesystem-15-SP2-2020-2298 SKIP SUSE-RU-2020:2299-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2299 is not security or has no CVEs. patches: SUSE-2020-2299,SUSE-SLE-Module-Basesystem-15-SP2-2020-2299 SKIP SUSE-RU-2020:2300-1 as SUSE-SLE-SERVER-12-SP5-2020-2300 is not security or has no CVEs. patches: SUSE-2020-2300,SUSE-SLE-SERVER-12-SP5-2020-2300 SKIP SUSE-RU-2020:2301-1 as SUSE-SLE-SERVER-12-SP5-2020-2301 is not security or has no CVEs. patches: SUSE-2020-2301,SUSE-SLE-SDK-12-SP5-2020-2301,SUSE-SLE-SERVER-12-SP5-2020-2301 SKIP SUSE-RU-2020:2302-1 as SUSE-SLE-Product-WE-15-SP2-2020-2302 is not security or has no CVEs. patches: SUSE-2020-2302,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2302,SUSE-SLE-Product-WE-15-SP2-2020-2302 SKIP SUSE-RU-2020:2313-1 as SUSE-SLE-Module-Public-Cloud-15-2020-2313 is not security or has no CVEs. patches: SUSE-2020-2313,SUSE-SLE-Module-Public-Cloud-15-2020-2313 SKIP SUSE-RU-2020:2314-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2314 is not security or has no CVEs. patches: SUSE-2020-2314,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2314,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2314 SKIP SUSE-RU-2020:2315-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2315 is not security or has no CVEs. patches: SUSE-2020-2315,SUSE-SLE-Module-Public-Cloud-12-2020-2315 SKIP SUSE-RU-2020:2316-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2316 is not security or has no CVEs. patches: SUSE-2020-2316,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2316,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2316 SKIP SUSE-RU-2020:2317-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2317 is not security or has no CVEs. patches: SUSE-2020-2317,SUSE-SLE-Module-Public-Cloud-12-2020-2317 SKIP SUSE-RU-2020:2318-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2318 is not security or has no CVEs. patches: SUSE-2020-2318,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2318,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2318 SKIP SUSE-RU-2020:2319-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2319 is not security or has no CVEs. patches: SUSE-2020-2319,SUSE-SLE-Module-Public-Cloud-12-2020-2319 SKIP SUSE-RU-2020:2320-1 as SUSE-Storage-5-2020-2320 is not security or has no CVEs. patches: SUSE-2020-2320,SUSE-SLE-SERVER-12-SP5-2020-2320,SUSE-SLE-WE-12-SP5-2020-2320,SUSE-Storage-5-2020-2320 SKIP SUSE-RU-2020:2321-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2321 is not security or has no CVEs. patches: SUSE-2020-2321,SUSE-SLE-Module-Basesystem-15-SP1-2020-2321,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2321,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2321 SKIP SUSE-RU-2020:2328-1 as SUSE-SLE-SERVER-12-SP5-2020-2328 is not security or has no CVEs. patches: SUSE-2020-2328,SUSE-SLE-SDK-12-SP5-2020-2328,SUSE-SLE-SERVER-12-SP5-2020-2328 SKIP SUSE-RU-2020:2329-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2329 is not security or has no CVEs. patches: SUSE-2020-2329,SUSE-SLE-Module-Basesystem-15-SP2-2020-2329 SKIP SUSE-RU-2020:2330-1 as SUSE-SLE-Module-RT-15-SP1-2020-2330 is not security or has no CVEs. patches: SUSE-2020-2330,SUSE-SLE-Module-RT-15-SP1-2020-2330,SUSE-SLE-Module-RT-15-SP2-2020-2330 SKIP SUSE-RU-2020:2332-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2332 is not security or has no CVEs. patches: SUSE-2020-2332,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2332 SKIP SUSE-RU-2020:2333-1 as SUSE-SLE-Product-SLED-15-SP2-2020-2333 is not security or has no CVEs. patches: SUSE-2020-2333,SUSE-SLE-Product-SLED-15-SP2-2020-2333 SKIP SUSE-RU-2020:2334-1 as SUSE-SLE-Product-WE-15-SP2-2020-2334 is not security or has no CVEs. patches: SUSE-2020-2334,SUSE-SLE-Module-Basesystem-15-SP2-2020-2334,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2334,SUSE-SLE-Product-WE-15-SP2-2020-2334 SKIP SUSE-RU-2020:2335-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2335 is not security or has no CVEs. patches: SUSE-2020-2335,SUSE-SLE-Module-Basesystem-15-SP2-2020-2335,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2335 SKIP SUSE-RU-2020:2337-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2337 is not security or has no CVEs. patches: SUSE-2020-2337,SUSE-SLE-Module-Basesystem-15-SP1-2020-2337,SUSE-SLE-Product-HPC-15-2020-2337,SUSE-SLE-Product-SLES-15-2020-2337,SUSE-SLE-Product-SLES_SAP-15-2020-2337 SKIP SUSE-RU-2020:2338-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2338 is not security or has no CVEs. patches: SUSE-2020-2338,SUSE-SLE-Module-Public-Cloud-15-2020-2338,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2338,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2338 SKIP SUSE-RU-2020:2339-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2339 is not security or has no CVEs. patches: SUSE-2020-2339,SUSE-SLE-Module-Public-Cloud-12-2020-2339 SKIP SUSE-RU-2020:2340-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2340 is not security or has no CVEs. patches: SUSE-2020-2340,SUSE-SLE-Module-Basesystem-15-SP1-2020-2340,SUSE-SLE-Module-HPC-15-SP1-2020-2340,SUSE-SLE-Module-Legacy-15-SP1-2020-2340,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2340 SKIP SUSE-RU-2020:2341-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2341 is not security or has no CVEs. patches: SUSE-2020-2341,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2341,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2341 SKIP SUSE-RU-2020:2342-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2342 is not security or has no CVEs. patches: SUSE-2020-2342,SUSE-SLE-Module-Public-Cloud-12-2020-2342 SKIP SUSE-RU-2020:2347-1 as SUSE-SLE-SERVER-12-SP5-2020-2347 is not security or has no CVEs. patches: SUSE-2020-2347,SUSE-OpenStack-Cloud-9-2020-2347,SUSE-OpenStack-Cloud-Crowbar-9-2020-2347,SUSE-SLE-SAP-12-SP4-2020-2347,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2347,SUSE-SLE-SERVER-12-SP5-2020-2347 SKIP SUSE-RU-2020:2348-1 as SUSE-Storage-5-2020-2348 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2348,SUSE-2020-2348,SUSE-OpenStack-Cloud-7-2020-2348,SUSE-OpenStack-Cloud-8-2020-2348,SUSE-OpenStack-Cloud-Crowbar-8-2020-2348,SUSE-SLE-SAP-12-SP2-2020-2348,SUSE-SLE-SAP-12-SP3-2020-2348,SUSE-SLE-SERVER-12-SP2-2020-2348,SUSE-SLE-SERVER-12-SP2-BCL-2020-2348,SUSE-SLE-SERVER-12-SP3-2020-2348,SUSE-SLE-SERVER-12-SP3-BCL-2020-2348,SUSE-Storage-5-2020-2348 SKIP SUSE-RU-2020:2349-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2349 is not security or has no CVEs. patches: SUSE-2020-2349,SUSE-SLE-Module-Basesystem-15-SP2-2020-2349 SKIP SUSE-RU-2020:2350-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2350 is not security or has no CVEs. patches: SUSE-2020-2350,SUSE-SLE-Module-Basesystem-15-SP1-2020-2350,SUSE-SLE-Product-HPC-15-2020-2350,SUSE-SLE-Product-SLES_SAP-15-2020-2350 SKIP SUSE-RU-2020:2351-1 as SUSE-SLE-Product-WE-15-SP2-2020-2351 is not security or has no CVEs. patches: SUSE-2020-2351,SUSE-SLE-Product-WE-15-SP2-2020-2351 SKIP SUSE-RU-2020:2352-1 as SUSE-Storage-6-2020-2352 is not security or has no CVEs. patches: SUSE-2020-2352,SUSE-SLE-Module-Basesystem-15-SP1-2020-2352,SUSE-SLE-Module-Python2-15-SP1-2020-2352,SUSE-SLE-Product-HA-15-SP1-2020-2352,SUSE-Storage-6-2020-2352 SKIP SUSE-RU-2020:2353-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2353 is not security or has no CVEs. patches: SUSE-2020-2353,SUSE-SLE-Module-Basesystem-15-SP2-2020-2353,SUSE-SLE-Module-HPC-15-SP2-2020-2353,SUSE-SLE-Module-Legacy-15-SP2-2020-2353,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2353 SKIP SUSE-RU-2020:2354-1 as SUSE-SLE-Module-HPC-15-SP2-2020-2354 is not security or has no CVEs. patches: SUSE-2020-2354,SUSE-SLE-Module-HPC-15-SP2-2020-2354 SKIP SUSE-RU-2020:2368-1 as SUSE-SLE-Manager-Tools-12-2020-2368 is not security or has no CVEs. patches: SUSE-2020-2368,SUSE-SLE-Manager-Tools-12-2020-2368 SKIP SUSE-RU-2020:2369-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2369 is not security or has no CVEs. patches: SUSE-2020-2369,SUSE-SLE-Module-Basesystem-15-SP1-2020-2369,SUSE-SLE-Module-Python2-15-SP1-2020-2369,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2369 SKIP SUSE-RU-2020:2370-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2370 is not security or has no CVEs. patches: SUSE-2020-2370,SUSE-SLE-Module-Basesystem-15-SP2-2020-2370,SUSE-SLE-Module-Python2-15-SP2-2020-2370,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2370 SKIP SUSE-RU-2020:2371-1 as SUSE-SUSE-Manager-Server-3.2-2020-2371 is not security or has no CVEs. patches: SUSE-2020-2371,SUSE-SLE-Manager-Tools-12-2020-2371,SUSE-SLE-Module-Adv-Systems-Management-12-2020-2371,SUSE-SLE-POS-12-SP2-2020-2371,SUSE-SUSE-Manager-Proxy-3.2-2020-2371,SUSE-SUSE-Manager-Server-3.2-2020-2371 SKIP SUSE-RU-2020:2372-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2372 is not security or has no CVEs. patches: SUSE-2020-2372,SUSE-SLE-Product-HPC-15-2020-2372,SUSE-SLE-Product-SLES-15-2020-2372,SUSE-SLE-Product-SLES_SAP-15-2020-2372 SKIP SUSE-RU-2020:2373-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2373 is not security or has no CVEs. patches: SUSE-2020-2373,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2373 SKIP SUSE-RU-2020:2374-1 as SUSE-SLE-Manager-Tools-15-2020-2374 is not security or has no CVEs. patches: SUSE-2020-2374,SUSE-SLE-Manager-Tools-15-2020-2374 SKIP SUSE-RU-2020:2375-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-2375 is not security or has no CVEs. patches: SUSE-2020-2375,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2020-2375,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2020-2375,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-2375 SKIP SUSE-RU-2020:2376-1 as SUSE-Storage-6-2020-2376 is not security or has no CVEs. patches: SUSE-2020-2376,SUSE-SLE-Module-Basesystem-15-SP1-2020-2376,SUSE-Storage-6-2020-2376 SKIP SUSE-RU-2020:2377-1 as SUSE-Storage-5-2020-2377 is not security or has no CVEs. patches: SUSE-2020-2377,SUSE-SLE-SDK-12-SP5-2020-2377,SUSE-SLE-SERVER-12-SP5-2020-2377,SUSE-Storage-5-2020-2377 SKIP SUSE-RU-2020:2378-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2378 is not security or has no CVEs. patches: SUSE-2020-2378,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2378,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2378 SKIP SUSE-RU-2020:2379-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2379 is not security or has no CVEs. patches: SUSE-2020-2379,SUSE-SLE-Module-Public-Cloud-12-2020-2379 SKIP SUSE-RU-2020:2380-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2380 is not security or has no CVEs. patches: SUSE-2020-2380,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2380,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2380 SKIP SUSE-RU-2020:2384-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2384 is not security or has no CVEs. patches: SUSE-2020-2384,SUSE-SLE-Module-Basesystem-15-SP1-2020-2384,SUSE-SLE-Module-Basesystem-15-SP2-2020-2384 SKIP SUSE-RU-2020:2385-1 as SUSE-SLE-HA-12-SP5-2020-2385 is not security or has no CVEs. patches: SUSE-2020-2385,SUSE-SLE-HA-12-SP4-2020-2385,SUSE-SLE-HA-12-SP5-2020-2385 SKIP SUSE-RU-2020:2386-1 as SUSE-SLE-Product-HA-15-SP2-2020-2386 is not security or has no CVEs. patches: SUSE-2020-2386,SUSE-SLE-Module-Basesystem-15-SP2-2020-2386,SUSE-SLE-Module-Python2-15-SP2-2020-2386,SUSE-SLE-Product-HA-15-SP2-2020-2386 SKIP SUSE-RU-2020:2387-1 as SUSE-SLE-Module-HPC-15-SP1-2020-2387 is not security or has no CVEs. patches: SUSE-2020-2387,SUSE-SLE-Module-HPC-15-SP1-2020-2387 SKIP SUSE-RU-2020:2388-1 as SUSE-SLE-WE-12-SP5-2020-2388 is not security or has no CVEs. patches: SUSE-2020-2388,SUSE-SLE-SDK-12-SP5-2020-2388,SUSE-SLE-SERVER-12-SP5-2020-2388,SUSE-SLE-WE-12-SP5-2020-2388 SKIP SUSE-RU-2020:2389-1 as SUSE-SLE-Product-HA-15-SP2-2020-2389 is not security or has no CVEs. patches: SUSE-2020-2389,SUSE-SLE-Product-HA-15-SP2-2020-2389 SKIP SUSE-RU-2020:2393-1 as SUSE-SLE-SERVER-12-SP5-2020-2393 is not security or has no CVEs. patches: SUSE-2020-2393,SUSE-SLE-SAP-12-SP4-2020-2393,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2393,SUSE-SLE-SERVER-12-SP5-2020-2393 SKIP SUSE-RU-2020:2394-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2020-2394 is not security or has no CVEs. patches: SUSE-2020-2394,SUSE-SLE-Live-Patching-12-2020-2395,SUSE-SLE-Live-Patching-12-SP3-2020-2395,SUSE-SLE-Live-Patching-12-SP4-2020-2395,SUSE-SLE-Live-Patching-12-SP5-2020-2395,SUSE-SLE-Module-Live-Patching-15-2020-2394,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2394,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2394 SKIP SUSE-RU-2020:2396-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2396 is not security or has no CVEs. patches: SUSE-2020-2396,SUSE-SLE-Module-Basesystem-15-SP2-2020-2396 SKIP SUSE-RU-2020:2410-1 as SUSE-SLE-SERVER-12-SP5-2020-2410 is not security or has no CVEs. patches: SUSE-2020-2410,SUSE-SLE-SDK-12-SP5-2020-2410,SUSE-SLE-SERVER-12-SP5-2020-2410 SKIP SUSE-RU-2020:2411-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2411 is not security or has no CVEs. patches: SUSE-2020-2411,SUSE-SLE-INSTALLER-15-SP1-2020-2411,SUSE-SLE-Module-Basesystem-15-SP1-2020-2411,SUSE-SLE-Module-Basesystem-15-SP2-2020-2411 SKIP SUSE-RU-2020:2412-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2412 is not security or has no CVEs. patches: SUSE-2020-2412,SUSE-SLE-Module-Basesystem-15-SP1-2020-2412,SUSE-SLE-Module-Basesystem-15-SP2-2020-2412 SKIP SUSE-RU-2020:2413-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2413 is not security or has no CVEs. patches: SUSE-2020-2413,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2413 SKIP SUSE-RU-2020:2414-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2414 is not security or has no CVEs. patches: SUSE-2020-2414,SUSE-SLE-Module-Public-Cloud-12-2020-2414 SKIP SUSE-RU-2020:2415-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2415 is not security or has no CVEs. patches: SUSE-2020-2415,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2415,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2415 SKIP SUSE-RU-2020:2416-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2416 is not security or has no CVEs. patches: SUSE-2020-2416,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2416,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2416 SKIP SUSE-RU-2020:2418-1 as SUSE-Storage-5-2020-2418 is not security or has no CVEs. patches: SUSE-2020-2418,SUSE-Storage-5-2020-2418 SKIP SUSE-RU-2020:2419-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2419 is not security or has no CVEs. patches: SUSE-2020-2419,SUSE-SLE-INSTALLER-15-SP2-2020-2419,SUSE-SLE-Module-Basesystem-15-SP2-2020-2419,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2419 SKIP SUSE-RU-2020:2420-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2420 is not security or has no CVEs. patches: SUSE-2020-2420,SUSE-SLE-Module-Basesystem-15-SP1-2020-2420,SUSE-SLE-Module-Basesystem-15-SP2-2020-2420,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2420,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2420 SKIP SUSE-RU-2020:2421-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2421 is not security or has no CVEs. patches: SUSE-2020-2421,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2421 SKIP SUSE-RU-2020:2422-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2422 is not security or has no CVEs. patches: SUSE-2020-2422,SUSE-SLE-Product-HPC-15-2020-2422,SUSE-SLE-Product-SLES-15-2020-2422,SUSE-SLE-Product-SLES_SAP-15-2020-2422 SKIP SUSE-RU-2020:2423-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2423 is not security or has no CVEs. patches: SUSE-2020-2423,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2423 SKIP SUSE-RU-2020:2424-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2424 is not security or has no CVEs. patches: SUSE-2020-2424,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2424 SKIP SUSE-RU-2020:2425-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2425 is not security or has no CVEs. patches: SUSE-2020-2425,SUSE-SLE-Module-Basesystem-15-SP1-2020-2425,SUSE-SLE-Module-Basesystem-15-SP2-2020-2425 SKIP SUSE-RU-2020:2426-1 as SUSE-SLE-SERVER-12-SP5-2020-2426 is not security or has no CVEs. patches: SUSE-2020-2426,SUSE-SLE-SERVER-12-SP5-2020-2426 SKIP SUSE-RU-2020:2427-1 as SUSE-Storage-5-2020-2427 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2427,SUSE-2020-2427,SUSE-OpenStack-Cloud-7-2020-2427,SUSE-OpenStack-Cloud-8-2020-2427,SUSE-OpenStack-Cloud-9-2020-2427,SUSE-OpenStack-Cloud-Crowbar-8-2020-2427,SUSE-OpenStack-Cloud-Crowbar-9-2020-2427,SUSE-SLE-SAP-12-SP2-2020-2427,SUSE-SLE-SAP-12-SP3-2020-2427,SUSE-SLE-SAP-12-SP4-2020-2427,SUSE-SLE-SDK-12-SP5-2020-2427,SUSE-SLE-SERVER-12-SP2-2020-2427,SUSE-SLE-SERVER-12-SP2-BCL-2020-2427,SUSE-SLE-SERVER-12-SP3-2020-2427,SUSE-SLE-SERVER-12-SP3-BCL-2020-2427,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2427,SUSE-SLE-SERVER-12-SP5-2020-2427,SUSE-Storage-5-2020-2427 SKIP SUSE-RU-2020:2428-1 as SUSE-Storage-5-2020-2428 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2428,SUSE-2020-2428,SUSE-OpenStack-Cloud-7-2020-2428,SUSE-OpenStack-Cloud-8-2020-2428,SUSE-OpenStack-Cloud-9-2020-2428,SUSE-OpenStack-Cloud-Crowbar-8-2020-2428,SUSE-OpenStack-Cloud-Crowbar-9-2020-2428,SUSE-SLE-SAP-12-SP2-2020-2428,SUSE-SLE-SAP-12-SP3-2020-2428,SUSE-SLE-SAP-12-SP4-2020-2428,SUSE-SLE-SERVER-12-SP2-2020-2428,SUSE-SLE-SERVER-12-SP2-BCL-2020-2428,SUSE-SLE-SERVER-12-SP3-2020-2428,SUSE-SLE-SERVER-12-SP3-BCL-2020-2428,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2428,SUSE-SLE-SERVER-12-SP5-2020-2428,SUSE-Storage-5-2020-2428 SKIP SUSE-RU-2020:2429-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2429 is not security or has no CVEs. patches: SUSE-2020-2429,SUSE-SLE-Module-RT-15-SP1-2020-2429,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2429 SKIP SUSE-RU-2020:2430-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2430 is not security or has no CVEs. patches: SUSE-2020-2430,SUSE-SLE-Product-HPC-15-2020-2430,SUSE-SLE-Product-SLES-15-2020-2430,SUSE-SLE-Product-SLES_SAP-15-2020-2430 SKIP SUSE-RU-2020:2431-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-2431 is not security or has no CVEs. patches: SUSE-2020-2431,SUSE-OpenStack-Cloud-9-2020-2431,SUSE-OpenStack-Cloud-Crowbar-9-2020-2431,SUSE-SLE-SAP-12-SP4-2020-2431,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2431 SKIP SUSE-RU-2020:2432-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-2432 is not security or has no CVEs. patches: SUSE-2020-2432,SUSE-OpenStack-Cloud-7-2020-2432,SUSE-SLE-SAP-12-SP2-2020-2432,SUSE-SLE-SERVER-12-SP2-2020-2432,SUSE-SLE-SERVER-12-SP2-BCL-2020-2432 SKIP SUSE-RU-2020:2435-1 as SUSE-SLE-RT-12-SP5-2020-2435 is not security or has no CVEs. patches: SUSE-2020-2435,SUSE-SLE-RT-12-SP5-2020-2435 SKIP SUSE-RU-2020:2436-1 as SUSE-SLE-RT-12-SP4-2020-2436 is not security or has no CVEs. patches: SUSE-2020-2436,SUSE-SLE-RT-12-SP4-2020-2436 SKIP SUSE-RU-2020:2437-1 as SUSE-SLE-RT-12-SP5-2020-2437 is not security or has no CVEs. patches: SUSE-2020-2437,SUSE-SLE-RT-12-SP5-2020-2437 SKIP SUSE-RU-2020:2438-1 as SUSE-SLE-RT-12-SP4-2020-2438 is not security or has no CVEs. patches: SUSE-2020-2438,SUSE-SLE-RT-12-SP4-2020-2438 SKIP SUSE-RU-2020:2439-1 as SUSE-Storage-5-2020-2439 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2439,SUSE-2020-2439,SUSE-OpenStack-Cloud-7-2020-2439,SUSE-OpenStack-Cloud-8-2020-2439,SUSE-OpenStack-Cloud-9-2020-2439,SUSE-OpenStack-Cloud-Crowbar-8-2020-2439,SUSE-OpenStack-Cloud-Crowbar-9-2020-2439,SUSE-SLE-SAP-12-SP2-2020-2439,SUSE-SLE-SAP-12-SP3-2020-2439,SUSE-SLE-SAP-12-SP4-2020-2439,SUSE-SLE-SDK-12-SP5-2020-2439,SUSE-SLE-SERVER-12-SP2-2020-2439,SUSE-SLE-SERVER-12-SP2-BCL-2020-2439,SUSE-SLE-SERVER-12-SP3-2020-2439,SUSE-SLE-SERVER-12-SP3-BCL-2020-2439,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2439,SUSE-SLE-SERVER-12-SP5-2020-2439,SUSE-SLE-WE-12-SP5-2020-2439,SUSE-Storage-5-2020-2439 SKIP SUSE-RU-2020:2440-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2440 is not security or has no CVEs. patches: SUSE-2020-2440,SUSE-SLE-Module-Basesystem-15-SP1-2020-2440,SUSE-SLE-Module-Basesystem-15-SP2-2020-2440,SUSE-SLE-Product-HPC-15-2020-2440,SUSE-SLE-Product-SLES-15-2020-2440,SUSE-SLE-Product-SLES_SAP-15-2020-2440 SKIP SUSE-RU-2020:2441-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2441 is not security or has no CVEs. patches: SUSE-2020-2441,SUSE-SLE-Module-Basesystem-15-SP1-2020-2441,SUSE-SLE-Module-Basesystem-15-SP2-2020-2441,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2441,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2441,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2441,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2441 SKIP SUSE-RU-2020:2447-1 as SUSE-SLE-Product-HA-15-SP1-2020-2447 is not security or has no CVEs. patches: SUSE-2020-2447,SUSE-SLE-Product-HA-15-SP1-2020-2447 SKIP SUSE-RU-2020:2448-1 as SUSE-SLE-Module-Transactional-Server-15-SP2-2020-2448 is not security or has no CVEs. patches: SUSE-2020-2448,SUSE-SLE-Module-Transactional-Server-15-SP2-2020-2448 SKIP SUSE-RU-2020:2451-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2451 is not security or has no CVEs. patches: SUSE-2020-2451,SUSE-SLE-Module-Basesystem-15-SP2-2020-2451 SKIP SUSE-RU-2020:2457-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2457 is not security or has no CVEs. patches: SUSE-2020-2457,SUSE-SLE-Module-Basesystem-15-SP2-2020-2457,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2457 SKIP SUSE-RU-2020:2458-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2458 is not security or has no CVEs. patches: SUSE-2020-2458,SUSE-SLE-Module-Basesystem-15-SP1-2020-2458,SUSE-SLE-Module-Basesystem-15-SP2-2020-2458,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2458,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2458 SKIP SUSE-RU-2020:2459-1 as SUSE-SLE-Product-HA-15-2020-2459 is not security or has no CVEs. patches: SUSE-2020-2459,SUSE-SLE-Product-HA-15-2020-2459 SKIP SUSE-RU-2020:2463-1 as SUSE-SLE-SERVER-12-SP5-2020-2463 is not security or has no CVEs. patches: SUSE-2020-2463,SUSE-SLE-SERVER-12-SP5-2020-2463 SKIP SUSE-RU-2020:2464-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2464 is not security or has no CVEs. patches: SUSE-2020-2464,SUSE-SLE-Module-Basesystem-15-SP1-2020-2464,SUSE-SLE-Module-Basesystem-15-SP2-2020-2464 SKIP SUSE-RU-2020:2465-1 as SUSE-Storage-5-2020-2465 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2465,SUSE-2020-2465,SUSE-OpenStack-Cloud-8-2020-2465,SUSE-OpenStack-Cloud-9-2020-2465,SUSE-OpenStack-Cloud-Crowbar-8-2020-2465,SUSE-OpenStack-Cloud-Crowbar-9-2020-2465,SUSE-SLE-SAP-12-SP3-2020-2465,SUSE-SLE-SAP-12-SP4-2020-2465,SUSE-SLE-SERVER-12-SP3-2020-2465,SUSE-SLE-SERVER-12-SP3-BCL-2020-2465,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2465,SUSE-SLE-SERVER-12-SP5-2020-2465,SUSE-Storage-5-2020-2465 SKIP SUSE-RU-2020:2466-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2466 is not security or has no CVEs. patches: SUSE-2020-2466,SUSE-SLE-Product-HPC-15-2020-2466,SUSE-SLE-Product-SLES-15-2020-2466,SUSE-SLE-Product-SLES_SAP-15-2020-2466 SKIP SUSE-RU-2020:2467-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2467 is not security or has no CVEs. patches: SUSE-2020-2467,SUSE-SLE-Module-Basesystem-15-SP1-2020-2467,SUSE-SLE-Module-Basesystem-15-SP2-2020-2467,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2467,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2467,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2467,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2467 SKIP SUSE-RU-2020:2468-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2468 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2468,SUSE-2020-2468,SUSE-OpenStack-Cloud-8-2020-2468,SUSE-OpenStack-Cloud-Crowbar-8-2020-2468,SUSE-SLE-Module-Public-Cloud-12-2020-2468 SKIP SUSE-RU-2020:2469-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2020-2469 is not security or has no CVEs. patches: SUSE-2020-2469,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-2469 SKIP SUSE-RU-2020:2470-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2470 is not security or has no CVEs. patches: SUSE-2020-2470,SUSE-SLE-Module-Basesystem-15-SP2-2020-2470 SKIP SUSE-RU-2020:2472-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2472 is not security or has no CVEs. patches: SUSE-2020-2472,SUSE-SLE-Module-Basesystem-15-SP1-2020-2472,SUSE-SLE-Module-Basesystem-15-SP2-2020-2472 SKIP SUSE-RU-2020:2473-1 as SUSE-Storage-5-2020-2473 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2473,SUSE-2020-2473,SUSE-OpenStack-Cloud-7-2020-2473,SUSE-OpenStack-Cloud-8-2020-2473,SUSE-OpenStack-Cloud-9-2020-2473,SUSE-OpenStack-Cloud-Crowbar-8-2020-2473,SUSE-OpenStack-Cloud-Crowbar-9-2020-2473,SUSE-SLE-SAP-12-SP2-2020-2473,SUSE-SLE-SAP-12-SP3-2020-2473,SUSE-SLE-SAP-12-SP4-2020-2473,SUSE-SLE-SDK-12-SP5-2020-2473,SUSE-SLE-SERVER-12-SP2-2020-2473,SUSE-SLE-SERVER-12-SP2-BCL-2020-2473,SUSE-SLE-SERVER-12-SP3-2020-2473,SUSE-SLE-SERVER-12-SP3-BCL-2020-2473,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2473,SUSE-SLE-SERVER-12-SP5-2020-2473,SUSE-Storage-5-2020-2473 SKIP SUSE-RU-2020:2479-1 as SUSE-SLE-Product-HA-15-SP2-2020-2479 is not security or has no CVEs. patches: SUSE-2020-2479,SUSE-SLE-Product-HA-15-SP2-2020-2479 SKIP SUSE-RU-2020:2480-1 as SUSE-SLE-SAP-12-SP4-2020-2480 is not security or has no CVEs. patches: SUSE-2020-2480,SUSE-SLE-SAP-12-SP4-2020-2480 SKIP SUSE-RU-2020:2484-1 as SUSE-Storage-5-2020-2484 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2484,SUSE-2020-2484,SUSE-OpenStack-Cloud-7-2020-2484,SUSE-OpenStack-Cloud-8-2020-2484,SUSE-OpenStack-Cloud-9-2020-2484,SUSE-OpenStack-Cloud-Crowbar-8-2020-2484,SUSE-OpenStack-Cloud-Crowbar-9-2020-2484,SUSE-SLE-SAP-12-SP2-2020-2484,SUSE-SLE-SAP-12-SP3-2020-2484,SUSE-SLE-SAP-12-SP4-2020-2484,SUSE-SLE-SDK-12-SP5-2020-2484,SUSE-SLE-SERVER-12-SP2-2020-2484,SUSE-SLE-SERVER-12-SP2-BCL-2020-2484,SUSE-SLE-SERVER-12-SP3-2020-2484,SUSE-SLE-SERVER-12-SP3-BCL-2020-2484,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2484,SUSE-SLE-SERVER-12-SP5-2020-2484,SUSE-Storage-5-2020-2484 SKIP SUSE-RU-2020:2488-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-2488 is not security or has no CVEs. patches: SUSE-2020-2488,SUSE-OpenStack-Cloud-7-2020-2488,SUSE-SLE-SAP-12-SP2-2020-2488,SUSE-SLE-SERVER-12-SP2-2020-2488,SUSE-SLE-SERVER-12-SP2-BCL-2020-2488 SKIP SUSE-RU-2020:2489-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2489 is not security or has no CVEs. patches: SUSE-2020-2489,SUSE-SLE-Module-Basesystem-15-SP1-2020-2489,SUSE-SLE-Module-Basesystem-15-SP2-2020-2489 SKIP SUSE-RU-2020:2490-1 as SUSE-SLE-Module-Transactional-Server-15-SP1-2020-2490 is not security or has no CVEs. patches: SUSE-2020-2490,SUSE-SLE-Module-Transactional-Server-15-SP1-2020-2490 SKIP SUSE-RU-2020:2538-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-2538 is not security or has no CVEs. patches: SUSE-2020-2538,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-2538,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-2538 SKIP SUSE-RU-2020:2539-1 as SUSE-SLE-Manager-Tools-15-2020-2539 is not security or has no CVEs. patches: SUSE-2020-2539,SUSE-SLE-Manager-Tools-15-2020-2539 SKIP SUSE-RU-2020:2542-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2542 is not security or has no CVEs. patches: SUSE-2020-2542,SUSE-SLE-Product-HPC-15-2020-2542,SUSE-SLE-Product-SLES-15-2020-2542,SUSE-SLE-Product-SLES_SAP-15-2020-2542 SKIP SUSE-RU-2020:2543-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2543 is not security or has no CVEs. patches: SUSE-2020-2543,SUSE-SLE-INSTALLER-15-SP1-2020-2543,SUSE-SLE-Module-Basesystem-15-SP1-2020-2543 SKIP SUSE-RU-2020:2545-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2545 is not security or has no CVEs. patches: SUSE-2020-2545,SUSE-SLE-INSTALLER-15-SP1-2020-2545,SUSE-SLE-Module-Basesystem-15-SP1-2020-2545 SKIP SUSE-RU-2020:2546-1 as SUSE-SLE-SERVER-12-SP5-2020-2546 is not security or has no CVEs. patches: SUSE-2020-2546,SUSE-SLE-SERVER-12-SP5-2020-2546 SKIP SUSE-RU-2020:2547-1 as SUSE-SLE-SERVER-12-SP5-2020-2547 is not security or has no CVEs. patches: SUSE-2020-2547,SUSE-SLE-SDK-12-SP5-2020-2547,SUSE-SLE-SERVER-12-SP5-2020-2547 SKIP SUSE-RU-2020:2548-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-2548 is not security or has no CVEs. patches: SUSE-2020-2548,SUSE-OpenStack-Cloud-7-2020-2548,SUSE-SLE-SAP-12-SP2-2020-2548,SUSE-SLE-SERVER-12-SP2-2020-2548,SUSE-SLE-SERVER-12-SP2-BCL-2020-2548 SKIP SUSE-RU-2020:2549-1 as SUSE-SLE-Module-Python2-15-SP2-2020-2549 is not security or has no CVEs. patches: SUSE-2020-2549,SUSE-SLE-Manager-Tools-15-2020-2549,SUSE-SLE-Module-Basesystem-15-SP2-2020-2549,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2549,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2549,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2549,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2549,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2549,SUSE-SLE-Module-Python2-15-SP2-2020-2549 SKIP SUSE-RU-2020:2554-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2554 is not security or has no CVEs. patches: SUSE-2020-2554,SUSE-SLE-INSTALLER-15-SP2-2020-2554,SUSE-SLE-Module-Basesystem-15-SP2-2020-2554 SKIP SUSE-RU-2020:2555-1 as SUSE-SLE-SERVER-12-SP5-2020-2555 is not security or has no CVEs. patches: SUSE-2020-2555,SUSE-SLE-SDK-12-SP5-2020-2555,SUSE-SLE-SERVER-12-SP5-2020-2555 SKIP SUSE-RU-2020:2556-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2556 is not security or has no CVEs. patches: SUSE-2020-2556,SUSE-SLE-Module-Public-Cloud-15-2020-2556,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2556,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2556 SKIP SUSE-RU-2020:2557-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2557 is not security or has no CVEs. patches: SUSE-2020-2557,SUSE-SLE-Module-Public-Cloud-12-2020-2557 SKIP SUSE-RU-2020:2558-1 as SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2558 is not security or has no CVEs. patches: SUSE-2020-2558,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2558 SKIP SUSE-RU-2020:2559-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2559 is not security or has no CVEs. patches: SUSE-2020-2559,SUSE-SLE-Module-Basesystem-15-SP2-2020-2559 SKIP SUSE-RU-2020:2560-1 as SUSE-SLE-WE-12-SP5-2020-2560 is not security or has no CVEs. patches: SUSE-2020-2560,SUSE-SLE-WE-12-SP5-2020-2560 SKIP SUSE-RU-2020:2571-1 as SUSE-SLE-Product-HA-15-SP1-2020-2571 is not security or has no CVEs. patches: SUSE-2020-2571,SUSE-SLE-Product-HA-15-SP1-2020-2571 SKIP SUSE-RU-2020:2572-1 as SUSE-SLE-Product-HA-15-2020-2572 is not security or has no CVEs. patches: SUSE-2020-2572,SUSE-SLE-Product-HA-15-2020-2572 SKIP SUSE-RU-2020:2573-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2573 is not security or has no CVEs. patches: SUSE-2020-2573,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2573,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2573 SKIP SUSE-RU-2020:2584-1 as SUSE-SLE-Product-HA-15-SP1-2020-2584 is not security or has no CVEs. patches: SUSE-2020-2584,SUSE-SLE-Product-HA-15-SP1-2020-2584 SKIP SUSE-RU-2020:2585-1 as SUSE-SLE-Product-HA-15-2020-2585 is not security or has no CVEs. patches: SUSE-2020-2585,SUSE-SLE-Product-HA-15-2020-2585 SKIP SUSE-RU-2020:2586-1 as SUSE-SLE-Product-HA-15-SP2-2020-2586 is not security or has no CVEs. patches: SUSE-2020-2586,SUSE-SLE-Product-HA-15-SP2-2020-2586 SKIP SUSE-RU-2020:2587-1 as SUSE-SLE-SERVER-12-SP5-2020-2587 is not security or has no CVEs. patches: SUSE-2020-2587,SUSE-SLE-SDK-12-SP5-2020-2587,SUSE-SLE-SERVER-12-SP5-2020-2587 SKIP SUSE-RU-2020:2588-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2588 is not security or has no CVEs. patches: SUSE-2020-2588,SUSE-SLE-Module-Basesystem-15-SP2-2020-2588 SKIP SUSE-RU-2020:2589-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2589 is not security or has no CVEs. patches: SUSE-2020-2589,SUSE-SLE-Module-Basesystem-15-SP2-2020-2589 SKIP SUSE-RU-2020:2590-1 as SUSE-SLE-SERVER-12-SP5-2020-2590 is not security or has no CVEs. patches: SUSE-2020-2590,SUSE-SLE-SERVER-12-SP5-2020-2590 SKIP SUSE-RU-2020:2591-1 as SUSE-SLE-Product-HPC-15-SP2-2020-2591 is not security or has no CVEs. patches: SUSE-2020-2591,SUSE-SLE-Module-HPC-15-SP2-2020-2591,SUSE-SLE-Product-HPC-15-SP2-2020-2591 SKIP SUSE-RU-2020:2592-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2592 is not security or has no CVEs. patches: SUSE-2020-2592,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2592 SKIP SUSE-RU-2020:2593-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2593 is not security or has no CVEs. patches: SUSE-2020-2593,SUSE-SLE-Module-Basesystem-15-SP2-2020-2593,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2593 SKIP SUSE-RU-2020:2594-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2594 is not security or has no CVEs. patches: SUSE-2020-2594,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2594,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2594 SKIP SUSE-RU-2020:2595-1 as SUSE-SLE-SERVER-12-SP5-2020-2595 is not security or has no CVEs. patches: SUSE-2020-2595,SUSE-SLE-SERVER-12-SP5-2020-2595 SKIP SUSE-RU-2020:2596-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2596 is not security or has no CVEs. patches: SUSE-2020-2596,SUSE-SLE-Module-Basesystem-15-SP1-2020-2596,SUSE-SLE-Module-Basesystem-15-SP2-2020-2596,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2596,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2596 SKIP SUSE-RU-2020:2597-1 as SUSE-SLE-Module-HPC-15-SP1-2020-2597 is not security or has no CVEs. patches: SUSE-2020-2597,SUSE-SLE-Module-HPC-15-SP1-2020-2597 SKIP SUSE-RU-2020:2613-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2613 is not security or has no CVEs. patches: SUSE-2020-2613,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2613 SKIP SUSE-RU-2020:2616-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2616 is not security or has no CVEs. patches: SUSE-2020-2616,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2616 SKIP SUSE-RU-2020:2617-1 as SUSE-SLE-Module-Public-Cloud-15-2020-2617 is not security or has no CVEs. patches: SUSE-2020-2617,SUSE-SLE-Module-Public-Cloud-15-2020-2617 SKIP SUSE-RU-2020:2621-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-2621 is not security or has no CVEs. patches: SUSE-2020-2621,SUSE-OpenStack-Cloud-9-2020-2621,SUSE-OpenStack-Cloud-Crowbar-9-2020-2621,SUSE-SLE-SAP-12-SP4-2020-2621,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2621 SKIP SUSE-RU-2020:2625-1 as SUSE-SLE-SERVER-12-SP5-2020-2625 is not security or has no CVEs. patches: SUSE-2020-2625,SUSE-SLE-SDK-12-SP5-2020-2625,SUSE-SLE-SERVER-12-SP5-2020-2625 SKIP SUSE-RU-2020:2630-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2630 is not security or has no CVEs. patches: SUSE-2020-2630,SUSE-SLE-Module-Basesystem-15-SP1-2020-2630,SUSE-SLE-Module-Basesystem-15-SP2-2020-2630 SKIP SUSE-RU-2020:2638-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2638 is not security or has no CVEs. patches: SUSE-2020-2638,SUSE-SLE-Module-Basesystem-15-SP1-2020-2638,SUSE-SLE-Module-Basesystem-15-SP2-2020-2638 SKIP SUSE-RU-2020:2639-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2639 is not security or has no CVEs. patches: SUSE-2020-2639,SUSE-SLE-Module-Basesystem-15-SP2-2020-2639 SKIP SUSE-RU-2020:2640-1 as SUSE-SLE-INSTALLER-15-SP2-2020-2640 is not security or has no CVEs. patches: SUSE-2020-2640,SUSE-SLE-INSTALLER-15-SP2-2020-2640 SKIP SUSE-RU-2020:2641-1 as SUSE-SLE-HA-12-SP3-2020-2641 is not security or has no CVEs. patches: SUSE-2020-2641,SUSE-SLE-HA-12-SP3-2020-2641 SKIP SUSE-RU-2020:2642-1 as SUSE-SLE-HA-12-SP5-2020-2642 is not security or has no CVEs. patches: SUSE-2020-2642,SUSE-SLE-HA-12-SP4-2020-2642,SUSE-SLE-HA-12-SP5-2020-2642 SKIP SUSE-RU-2020:2643-1 as SUSE-SLE-Module-HPC-15-SP1-2020-2643 is not security or has no CVEs. patches: SUSE-2020-2643,SUSE-SLE-Module-HPC-15-SP1-2020-2643 SKIP SUSE-RU-2020:2649-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-2649 is not security or has no CVEs. patches: SUSE-2020-2649,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-2649,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-2649,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-2649 SKIP SUSE-RU-2020:2651-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2651 is not security or has no CVEs. patches: SUSE-2020-2651,SUSE-SLE-Module-Basesystem-15-SP1-2020-2651,SUSE-SLE-Module-Basesystem-15-SP2-2020-2651,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2651,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2651 SKIP SUSE-RU-2020:2652-1 as SUSE-SLE-SERVER-12-SP5-2020-2652 is not security or has no CVEs. patches: SUSE-2020-2652,SUSE-SLE-SDK-12-SP5-2020-2652,SUSE-SLE-SERVER-12-SP5-2020-2652 SKIP SUSE-RU-2020:2653-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2653 is not security or has no CVEs. patches: SUSE-2020-2653,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2653 SKIP SUSE-RU-2020:2654-1 as SUSE-SLE-SERVER-12-SP5-2020-2654 is not security or has no CVEs. patches: SUSE-2020-2654,SUSE-SLE-SDK-12-SP5-2020-2654,SUSE-SLE-SERVER-12-SP5-2020-2654 SKIP SUSE-RU-2020:2655-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2655 is not security or has no CVEs. patches: SUSE-2020-2655,SUSE-SLE-Module-Public-Cloud-15-2020-2655,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2655,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2655 SKIP SUSE-RU-2020:2656-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2656 is not security or has no CVEs. patches: SUSE-2020-2656,SUSE-SLE-Module-Public-Cloud-12-2020-2656 SKIP SUSE-RU-2020:2657-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2657 is not security or has no CVEs. patches: SUSE-2020-2657,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2657 SKIP SUSE-RU-2020:2658-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2658 is not security or has no CVEs. patches: SUSE-2020-2658,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2658 SKIP SUSE-RU-2020:2659-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2659 is not security or has no CVEs. patches: SUSE-2020-2659,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2659,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2659 SKIP SUSE-RU-2020:2662-1 as SUSE-SLE-Product-SLES-15-SP1-2020-2662 is not security or has no CVEs. patches: SUSE-2020-2662,SUSE-SLE-INSTALLER-15-SP1-2020-2662,SUSE-SLE-Product-SLES-15-SP1-2020-2662 SKIP SUSE-RU-2020:2663-1 as SUSE-SLE-Product-HA-15-SP1-2020-2663 is not security or has no CVEs. patches: SUSE-2020-2663,SUSE-SLE-Product-HA-15-SP1-2020-2663 SKIP SUSE-RU-2020:2667-1 as SUSE-Storage-6-2020-2667 is not security or has no CVEs. patches: SUSE-2020-2667,SUSE-SLE-Module-Legacy-15-SP1-2020-2667,SUSE-SLE-Module-Legacy-15-SP2-2020-2667,SUSE-Storage-6-2020-2667 SKIP SUSE-RU-2020:2668-1 as SUSE-SLE-Product-WE-15-SP2-2020-2668 is not security or has no CVEs. patches: SUSE-2020-2668,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2668,SUSE-SLE-Product-WE-15-SP2-2020-2668 SKIP SUSE-RU-2020:2670-1 as SUSE-SLE-SERVER-12-SP5-2020-2670 is not security or has no CVEs. patches: SUSE-2020-2670,SUSE-SLE-SERVER-12-SP5-2020-2670 SKIP SUSE-RU-2020:2674-1 as SUSE-SLE-SERVER-12-SP5-2020-2674 is not security or has no CVEs. patches: SUSE-2020-2674,SUSE-SLE-SDK-12-SP5-2020-2674,SUSE-SLE-SERVER-12-SP5-2020-2674 SKIP SUSE-RU-2020:2675-1 as SUSE-SLE-Product-HA-15-2020-2675 is not security or has no CVEs. patches: SUSE-2020-2675,SUSE-SLE-Product-HA-15-2020-2675 SKIP SUSE-RU-2020:2676-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2676 is not security or has no CVEs. patches: SUSE-2020-2676,SUSE-SLE-Module-Basesystem-15-SP1-2020-2676,SUSE-SLE-Module-Basesystem-15-SP2-2020-2676,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2676,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2676 SKIP SUSE-RU-2020:2680-1 as SUSE-SLE-Product-HA-15-2020-2680 is not security or has no CVEs. patches: SUSE-2020-2680,SUSE-SLE-Product-HA-15-2020-2680 SKIP SUSE-RU-2020:2681-1 as SUSE-Storage-5-2020-2681 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2681,SUSE-2020-2681,SUSE-OpenStack-Cloud-8-2020-2681,SUSE-OpenStack-Cloud-Crowbar-8-2020-2681,SUSE-SLE-SAP-12-SP3-2020-2681,SUSE-SLE-SERVER-12-SP3-2020-2681,SUSE-SLE-SERVER-12-SP3-BCL-2020-2681,SUSE-Storage-5-2020-2681 SKIP SUSE-RU-2020:2682-1 as SUSE-SLE-SERVER-12-SP5-2020-2682 is not security or has no CVEs. patches: SUSE-2020-2682,SUSE-SLE-SERVER-12-SP5-2020-2682 SKIP SUSE-RU-2020:2683-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2683 is not security or has no CVEs. patches: SUSE-2020-2683,SUSE-SLE-Module-Basesystem-15-SP2-2020-2683 SKIP SUSE-RU-2020:2684-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2684 is not security or has no CVEs. patches: SUSE-2020-2684,SUSE-SLE-Module-Basesystem-15-SP2-2020-2684,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2684 SKIP SUSE-RU-2020:2685-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2685 is not security or has no CVEs. patches: SUSE-2020-2685,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2685 SKIP SUSE-RU-2020:2692-1 as SUSE-SLE-Product-HA-15-SP2-2020-2692 is not security or has no CVEs. patches: SUSE-2020-2692,SUSE-SLE-Product-HA-15-SP2-2020-2692 SKIP SUSE-RU-2020:2693-1 as SUSE-SLE-Module-Python2-15-SP2-2020-2693 is not security or has no CVEs. patches: SUSE-2020-2693,SUSE-SLE-Module-Basesystem-15-SP2-2020-2693,SUSE-SLE-Module-Python2-15-SP2-2020-2693 SKIP SUSE-RU-2020:2694-1 as SUSE-SLE-SERVER-12-SP5-2020-2694 is not security or has no CVEs. patches: SUSE-2020-2694,SUSE-SLE-SAP-12-SP5-2020-2694,SUSE-SLE-SERVER-12-SP5-2020-2694 SKIP SUSE-RU-2020:2695-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-2695 is not security or has no CVEs. patches: SUSE-2020-2695,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2695,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2695 SKIP SUSE-RU-2020:2696-1 as SUSE-SLE-HA-12-SP5-2020-2696 is not security or has no CVEs. patches: SUSE-2020-2696,SUSE-SLE-HA-12-SP4-2020-2696,SUSE-SLE-HA-12-SP5-2020-2696 SKIP SUSE-RU-2020:2700-1 as SUSE-SLE-Product-HA-15-SP2-2020-2700 is not security or has no CVEs. patches: SUSE-2020-2700,SUSE-SLE-Product-HA-15-SP2-2020-2700 SKIP SUSE-RU-2020:2701-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2701 is not security or has no CVEs. patches: SUSE-2020-2701,SUSE-SLE-Module-Basesystem-15-SP1-2020-2701,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2701 SKIP SUSE-RU-2020:2702-1 as SUSE-SLE-SERVER-12-SP5-2020-2702 is not security or has no CVEs. patches: SUSE-2020-2702,SUSE-SLE-SERVER-12-SP5-2020-2702 SKIP SUSE-RU-2020:2703-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2703 is not security or has no CVEs. patches: SUSE-2020-2703,SUSE-SLE-Module-Basesystem-15-SP2-2020-2703,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2703 SKIP SUSE-RU-2020:2704-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2704 is not security or has no CVEs. patches: SUSE-2020-2704,SUSE-SLE-Module-Basesystem-15-SP1-2020-2704,SUSE-SLE-Module-Basesystem-15-SP2-2020-2704,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2704,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2704 SKIP SUSE-RU-2020:2705-1 as SUSE-SLE-Product-HA-15-2020-2705 is not security or has no CVEs. patches: SUSE-2020-2705,SUSE-SLE-Product-HA-15-2020-2705 SKIP SUSE-RU-2020:2706-1 as SUSE-SLE-Product-WE-15-SP2-2020-2706 is not security or has no CVEs. patches: SUSE-2020-2706,SUSE-SLE-Module-Basesystem-15-SP2-2020-2706,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2706,SUSE-SLE-Product-WE-15-SP2-2020-2706 SKIP SUSE-RU-2020:2707-1 as SUSE-SLE-Module-Public-Cloud-15-2020-2707 is not security or has no CVEs. patches: SUSE-2020-2707,SUSE-SLE-Module-Public-Cloud-15-2020-2707 SKIP SUSE-RU-2020:2708-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2708 is not security or has no CVEs. patches: SUSE-2020-2708,SUSE-SLE-Module-Public-Cloud-12-2020-2708 SKIP SUSE-RU-2020:2709-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2709 is not security or has no CVEs. patches: SUSE-2020-2709,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2709,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2709 SKIP SUSE-RU-2020:2716-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2716 is not security or has no CVEs. patches: SUSE-2020-2716,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2716 SKIP SUSE-RU-2020:2717-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2717 is not security or has no CVEs. patches: SUSE-2020-2717,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2717 SKIP SUSE-RU-2020:2723-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2723 is not security or has no CVEs. patches: SUSE-2020-2723,SUSE-SLE-Module-Basesystem-15-SP1-2020-2723,SUSE-SLE-Module-Basesystem-15-SP2-2020-2723 SKIP SUSE-RU-2020:2732-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2732 is not security or has no CVEs. patches: SUSE-2020-2732,SUSE-SLE-INSTALLER-15-SP2-2020-2732,SUSE-SLE-Module-Basesystem-15-SP2-2020-2732 SKIP SUSE-RU-2020:2735-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2735 is not security or has no CVEs. patches: SUSE-2020-2735,SUSE-SLE-Module-Basesystem-15-SP1-2020-2735,SUSE-SLE-Module-Basesystem-15-SP2-2020-2735 SKIP SUSE-RU-2020:2736-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2736 is not security or has no CVEs. patches: SUSE-2020-2736,SUSE-SLE-Module-Basesystem-15-SP2-2020-2736 SKIP SUSE-RU-2020:2737-1 as SUSE-SLE-Product-WE-15-SP1-2020-2737 is not security or has no CVEs. patches: SUSE-2020-2737,SUSE-SLE-Product-WE-15-SP1-2020-2737 SKIP SUSE-RU-2020:2738-1 as SUSE-OpenStack-Cloud-Crowbar-8-2020-2738 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2738,SUSE-2020-2738,SUSE-OpenStack-Cloud-8-2020-2738,SUSE-OpenStack-Cloud-Crowbar-8-2020-2738 SKIP SUSE-RU-2020:2739-1 as SUSE-SLE-Product-WE-15-SP2-2020-2739 is not security or has no CVEs. patches: SUSE-2020-2739,SUSE-SLE-Product-WE-15-SP2-2020-2739 SKIP SUSE-RU-2020:2745-1 as SUSE-SLE-Product-HA-15-SP2-2020-2745 is not security or has no CVEs. patches: SUSE-2020-2745,SUSE-SLE-Product-HA-15-SP2-2020-2745 SKIP SUSE-RU-2020:2746-1 as SUSE-SLE-Product-HA-15-SP1-2020-2746 is not security or has no CVEs. patches: SUSE-2020-2746,SUSE-SLE-Product-HA-15-SP1-2020-2746 SKIP SUSE-RU-2020:2753-1 as SUSE-SLE-Product-HA-15-SP1-2020-2753 is not security or has no CVEs. patches: SUSE-2020-2753,SUSE-SLE-Product-HA-15-SP1-2020-2753 SKIP SUSE-RU-2020:2754-1 as SUSE-SLE-Product-HA-15-SP1-2020-2754 is not security or has no CVEs. patches: SUSE-2020-2754,SUSE-SLE-Product-HA-15-SP1-2020-2754 SKIP SUSE-RU-2020:2755-1 as SUSE-SLE-HA-12-SP4-2020-2755 is not security or has no CVEs. patches: SUSE-2020-2755,SUSE-SLE-HA-12-SP4-2020-2755 SKIP SUSE-RU-2020:2756-1 as SUSE-SLE-HA-12-SP5-2020-2756 is not security or has no CVEs. patches: SUSE-2020-2756,SUSE-SLE-HA-12-SP5-2020-2756 SKIP SUSE-RU-2020:2757-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2757 is not security or has no CVEs. patches: SUSE-2020-2757,SUSE-SLE-Module-Basesystem-15-SP1-2020-2757,SUSE-SLE-Module-Basesystem-15-SP2-2020-2757 SKIP SUSE-RU-2020:2763-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2763 is not security or has no CVEs. patches: SUSE-2020-2763,SUSE-SLE-Module-Public-Cloud-12-2020-2763 SKIP SUSE-RU-2020:2764-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2764 is not security or has no CVEs. patches: SUSE-2020-2764,SUSE-SLE-Module-Basesystem-15-SP2-2020-2764 SKIP SUSE-RU-2020:2773-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2773 is not security or has no CVEs. patches: SUSE-2020-2773,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2773,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2773 SKIP SUSE-RU-2020:2774-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2774 is not security or has no CVEs. patches: SUSE-2020-2774,SUSE-SLE-Product-HPC-15-2020-2774,SUSE-SLE-Product-SLES-15-2020-2774,SUSE-SLE-Product-SLES_SAP-15-2020-2774 SKIP SUSE-RU-2020:2775-1 as SUSE-SLE-Module-HPC-12-2020-2775 is not security or has no CVEs. patches: SUSE-2020-2775,SUSE-SLE-Module-HPC-12-2020-2775 SKIP SUSE-RU-2020:2778-1 as SUSE-SLE-SERVER-12-SP5-2020-2778 is not security or has no CVEs. patches: SUSE-2020-2778,SUSE-SLE-SERVER-12-SP5-2020-2778 SKIP SUSE-RU-2020:2779-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2779 is not security or has no CVEs. patches: SUSE-2020-2779,SUSE-SLE-Module-Basesystem-15-SP2-2020-2779,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2779 SKIP SUSE-RU-2020:2780-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2780 is not security or has no CVEs. patches: SUSE-2020-2780,SUSE-SLE-Module-Basesystem-15-SP1-2020-2780,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2780 SKIP SUSE-RU-2020:2781-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2781 is not security or has no CVEs. patches: SUSE-2020-2781,SUSE-SLE-Module-Basesystem-15-SP2-2020-2781,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2781,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2781 SKIP SUSE-RU-2020:2782-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2782 is not security or has no CVEs. patches: SUSE-2020-2782,SUSE-SLE-Module-Basesystem-15-SP1-2020-2782,SUSE-SLE-Module-Basesystem-15-SP2-2020-2782 SKIP SUSE-RU-2020:2783-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-2783 is not security or has no CVEs. patches: SUSE-2020-2783,SUSE-OpenStack-Cloud-9-2020-2783,SUSE-OpenStack-Cloud-Crowbar-9-2020-2783,SUSE-SLE-SAP-12-SP4-2020-2783,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2783 SKIP SUSE-RU-2020:2793-1 as SUSE-Storage-5-2020-2793 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2793,SUSE-2020-2793,SUSE-OpenStack-Cloud-7-2020-2793,SUSE-OpenStack-Cloud-8-2020-2793,SUSE-OpenStack-Cloud-Crowbar-8-2020-2793,SUSE-SLE-SAP-12-SP2-2020-2793,SUSE-SLE-SAP-12-SP3-2020-2793,SUSE-SLE-SERVER-12-SP2-2020-2793,SUSE-SLE-SERVER-12-SP2-BCL-2020-2793,SUSE-SLE-SERVER-12-SP3-2020-2793,SUSE-SLE-SERVER-12-SP3-BCL-2020-2793,SUSE-Storage-5-2020-2793 SKIP SUSE-RU-2020:2794-1 as SUSE-SLE-SERVER-12-SP5-2020-2794 is not security or has no CVEs. patches: SUSE-2020-2794,SUSE-SLE-SERVER-12-SP5-2020-2794 SKIP SUSE-RU-2020:2795-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2795 is not security or has no CVEs. patches: SUSE-2020-2795,SUSE-SLE-Module-Basesystem-15-SP1-2020-2795 SKIP SUSE-RU-2020:2796-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2796 is not security or has no CVEs. patches: SUSE-2020-2796,SUSE-SLE-Module-Basesystem-15-SP2-2020-2796 SKIP SUSE-RU-2020:2798-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2798 is not security or has no CVEs. patches: SUSE-2020-2798,SUSE-SLE-Module-SAP-Applications-15-2020-2798,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2798 SKIP SUSE-RU-2020:2799-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2799 is not security or has no CVEs. patches: SUSE-2020-2799,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2799 SKIP SUSE-RU-2020:2801-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2801 is not security or has no CVEs. patches: SUSE-2020-2801,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2801 SKIP SUSE-RU-2020:2802-1 as SUSE-Storage-5-2020-2802 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2802,SUSE-2020-2802,SUSE-OpenStack-Cloud-7-2020-2802,SUSE-OpenStack-Cloud-8-2020-2802,SUSE-OpenStack-Cloud-9-2020-2802,SUSE-OpenStack-Cloud-Crowbar-8-2020-2802,SUSE-OpenStack-Cloud-Crowbar-9-2020-2802,SUSE-SLE-SAP-12-SP2-2020-2802,SUSE-SLE-SAP-12-SP3-2020-2802,SUSE-SLE-SAP-12-SP4-2020-2802,SUSE-SLE-SDK-12-SP5-2020-2802,SUSE-SLE-SERVER-12-SP2-2020-2802,SUSE-SLE-SERVER-12-SP2-BCL-2020-2802,SUSE-SLE-SERVER-12-SP3-2020-2802,SUSE-SLE-SERVER-12-SP3-BCL-2020-2802,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2802,SUSE-SLE-SERVER-12-SP5-2020-2802,SUSE-Storage-5-2020-2802 SKIP SUSE-RU-2020:2803-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2803 is not security or has no CVEs. patches: SUSE-2020-2803,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2803 SKIP SUSE-RU-2020:2804-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2804 is not security or has no CVEs. patches: SUSE-2020-2804,SUSE-SLE-Module-Basesystem-15-SP1-2020-2804,SUSE-SLE-Module-Basesystem-15-SP2-2020-2804,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2804,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2804 SKIP SUSE-RU-2020:2805-1 as SUSE-SLE-Product-HA-15-SP2-2020-2805 is not security or has no CVEs. patches: SUSE-2020-2805,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-2805,SUSE-SLE-Product-HA-15-SP2-2020-2805 SKIP SUSE-RU-2020:2810-1 as SUSE-SLE-SERVER-12-SP5-2020-2810 is not security or has no CVEs. patches: SUSE-2020-2810,SUSE-SLE-HA-12-SP4-2020-2810,SUSE-SLE-HA-12-SP5-2020-2810,SUSE-SLE-SDK-12-SP5-2020-2810,SUSE-SLE-SERVER-12-SP5-2020-2810 SKIP SUSE-RU-2020:2815-1 as SUSE-SLE-HA-12-SP3-2020-2815 is not security or has no CVEs. patches: SUSE-2020-2815,SUSE-SLE-HA-12-SP3-2020-2815 SKIP SUSE-RU-2020:2816-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2816 is not security or has no CVEs. patches: SUSE-2020-2816,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2816 SKIP SUSE-RU-2020:2816-2 as SUSE-SLE-Module-Certifications-15-SP3-2022-2429 is not security or has no CVEs. patches: SUSE-2020-2816,SUSE-SLE-Module-Certifications-15-SP3-2022-2429 SKIP SUSE-RU-2020:2817-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2817 is not security or has no CVEs. patches: SUSE-2020-2817,SUSE-SLE-INSTALLER-15-2020-2817,SUSE-SLE-Product-HPC-15-2020-2817,SUSE-SLE-Product-SLES-15-2020-2817,SUSE-SLE-Product-SLES_SAP-15-2020-2817 SKIP SUSE-RU-2020:2818-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2818 is not security or has no CVEs. patches: SUSE-2020-2818,SUSE-SLE-Module-Basesystem-15-SP1-2020-2818 SKIP SUSE-RU-2020:2819-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2819 is not security or has no CVEs. patches: SUSE-2020-2819,SUSE-SLE-INSTALLER-15-SP2-2020-2819,SUSE-SLE-Module-Basesystem-15-SP2-2020-2819 SKIP SUSE-RU-2020:2820-1 as SUSE-SLE-Product-HA-15-SP2-2020-2820 is not security or has no CVEs. patches: SUSE-2020-2820,SUSE-SLE-Product-HA-15-SP2-2020-2820 SKIP SUSE-RU-2020:2821-1 as SUSE-SLE-Product-HA-15-2020-2821 is not security or has no CVEs. patches: SUSE-2020-2821,SUSE-SLE-Product-HA-15-2020-2821 SKIP SUSE-RU-2020:2824-1 as SUSE-SLE-Product-HA-15-SP1-2020-2824 is not security or has no CVEs. patches: SUSE-2020-2824,SUSE-SLE-Product-HA-15-SP1-2020-2824 SKIP SUSE-RU-2020:2825-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2825 is not security or has no CVEs. patches: SUSE-2020-2825,SUSE-SLE-Module-Basesystem-15-SP1-2020-2825,SUSE-SLE-Module-Basesystem-15-SP2-2020-2825,SUSE-SLE-Product-HPC-15-2020-2825,SUSE-SLE-Product-SLES-15-2020-2825,SUSE-SLE-Product-SLES_SAP-15-2020-2825 SKIP SUSE-RU-2020:2826-1 as SUSE-SLE-Module-Web-Scripting-12-2020-2826 is not security or has no CVEs. patches: SUSE-2020-2826,SUSE-SLE-Module-Web-Scripting-12-2020-2826 SKIP SUSE-RU-2020:2831-1 as SUSE-SLE-SAP-12-SP5-2020-2831 is not security or has no CVEs. patches: SUSE-2020-2831,SUSE-SLE-SAP-12-SP3-2020-2831,SUSE-SLE-SAP-12-SP4-2020-2831,SUSE-SLE-SAP-12-SP5-2020-2831 SKIP SUSE-RU-2020:2832-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-2832 is not security or has no CVEs. patches: SUSE-2020-2832,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-2832 SKIP SUSE-RU-2020:2837-1 as SUSE-SLE-SERVER-12-SP5-2020-2837 is not security or has no CVEs. patches: SUSE-2020-2837,SUSE-SLE-Manager-Tools-12-2020-2837,SUSE-SLE-SERVER-12-SP5-2020-2837 SKIP SUSE-RU-2020:2838-1 as SUSE-SUSE-Manager-Server-3.2-2020-2838 is not security or has no CVEs. patches: SUSE-2020-2838,SUSE-SLE-Manager-Tools-12-2020-2838,SUSE-SLE-Module-Adv-Systems-Management-12-2020-2838,SUSE-SLE-POS-12-SP2-2020-2838,SUSE-SUSE-Manager-Proxy-3.2-2020-2838,SUSE-SUSE-Manager-Server-3.2-2020-2838 SKIP SUSE-RU-2020:2839-1 as SUSE-SLE-Manager-Tools-15-2020-2839 is not security or has no CVEs. patches: SUSE-2020-2839,SUSE-SLE-Manager-Tools-15-2020-2839 SKIP SUSE-RU-2020:2840-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2840 is not security or has no CVEs. patches: SUSE-2020-2840,SUSE-SLE-Product-HPC-15-2020-2840,SUSE-SLE-Product-SLES-15-2020-2840,SUSE-SLE-Product-SLES_SAP-15-2020-2840 SKIP SUSE-RU-2020:2841-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2841 is not security or has no CVEs. patches: SUSE-2020-2841,SUSE-SLE-Product-HPC-15-2020-2841,SUSE-SLE-Product-SLES-15-2020-2841,SUSE-SLE-Product-SLES_SAP-15-2020-2841 SKIP SUSE-RU-2020:2842-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2842 is not security or has no CVEs. patches: SUSE-2020-2842,SUSE-SLE-Module-Basesystem-15-SP1-2020-2842,SUSE-SLE-Module-Basesystem-15-SP2-2020-2842,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-2842,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2842 SKIP SUSE-RU-2020:2843-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-2843 is not security or has no CVEs. patches: SUSE-2020-2843,SUSE-SLE-Module-Basesystem-15-SP1-2020-2843,SUSE-SLE-Module-Python2-15-SP1-2020-2843,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2843 SKIP SUSE-RU-2020:2844-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2844 is not security or has no CVEs. patches: SUSE-2020-2844,SUSE-SLE-Module-Basesystem-15-SP2-2020-2844,SUSE-SLE-Module-Python2-15-SP2-2020-2844,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2844 SKIP SUSE-RU-2020:2848-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-2848 is not security or has no CVEs. patches: SUSE-2020-2848,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2020-2848,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2020-2848,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-2848 SKIP SUSE-RU-2020:2849-1 as SUSE-SLE-Product-HA-15-2020-2849 is not security or has no CVEs. patches: SUSE-2020-2849,SUSE-SLE-Product-HA-15-2020-2849 SKIP SUSE-RU-2020:2850-1 as SUSE-SLE-Product-HA-15-SP2-2020-2850 is not security or has no CVEs. patches: SUSE-2020-2850,SUSE-SLE-Module-Basesystem-15-SP2-2020-2850,SUSE-SLE-Product-HA-15-SP2-2020-2850 SKIP SUSE-RU-2020:2851-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-2851 is not security or has no CVEs. patches: SUSE-2020-2851,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-2851 SKIP SUSE-RU-2020:2852-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2852 is not security or has no CVEs. patches: SUSE-2020-2852,SUSE-SLE-Module-Basesystem-15-SP2-2020-2852 SKIP SUSE-RU-2020:2853-1 as SUSE-SLE-Product-HA-15-SP1-2020-2853 is not security or has no CVEs. patches: SUSE-2020-2853,SUSE-SLE-Product-HA-15-SP1-2020-2853 SKIP SUSE-RU-2020:2854-1 as SUSE-SLE-Product-HA-15-SP2-2020-2854 is not security or has no CVEs. patches: SUSE-2020-2854,SUSE-SLE-Product-HA-15-SP1-2020-2854,SUSE-SLE-Product-HA-15-SP2-2020-2854 SKIP SUSE-RU-2020:2855-1 as SUSE-Storage-6-2020-2855 is not security or has no CVEs. patches: SUSE-2020-2855,SUSE-Storage-6-2020-2855 SKIP SUSE-RU-2020:2859-1 as SUSE-SLE-HA-12-SP3-2020-2859 is not security or has no CVEs. patches: SUSE-2020-2859,SUSE-SLE-HA-12-SP3-2020-2859 SKIP SUSE-RU-2020:2863-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2863 is not security or has no CVEs. patches: SUSE-2020-2863,SUSE-SLE-Module-Basesystem-15-SP1-2020-2863,SUSE-SLE-Module-Basesystem-15-SP2-2020-2863 SKIP SUSE-RU-2020:2865-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2865 is not security or has no CVEs. patches: SUSE-2020-2865,SUSE-SLE-Module-Public-Cloud-12-2020-2865 SKIP SUSE-RU-2020:2866-1 as SUSE-SLE-Module-Public-Cloud-15-2020-2866 is not security or has no CVEs. patches: SUSE-2020-2866,SUSE-SLE-Module-Public-Cloud-15-2020-2866 SKIP SUSE-RU-2020:2867-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2867 is not security or has no CVEs. patches: SUSE-2020-2867,SUSE-SLE-Module-Basesystem-15-SP1-2020-2867 SKIP SUSE-RU-2020:2868-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2868 is not security or has no CVEs. patches: SUSE-2020-2868,SUSE-SLE-INSTALLER-15-SP1-2020-2868,SUSE-SLE-Module-Basesystem-15-SP1-2020-2868 SKIP SUSE-RU-2020:2869-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2869 is not security or has no CVEs. patches: SUSE-2020-2869,SUSE-SLE-Module-Basesystem-15-SP1-2020-2869,SUSE-SLE-Module-Basesystem-15-SP2-2020-2869,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2869,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2869 SKIP SUSE-RU-2020:2885-1 as SUSE-SLE-Product-WE-15-SP2-2020-2885 is not security or has no CVEs. patches: SUSE-2020-2885,SUSE-SLE-Module-Basesystem-15-SP1-2020-2885,SUSE-SLE-Module-Basesystem-15-SP2-2020-2885,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-2885,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-2885,SUSE-SLE-Product-WE-15-SP1-2020-2885,SUSE-SLE-Product-WE-15-SP2-2020-2885 SKIP SUSE-RU-2020:2886-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2886 is not security or has no CVEs. patches: SUSE-2020-2886,SUSE-SLE-Module-Basesystem-15-SP1-2020-2886,SUSE-SLE-Module-Basesystem-15-SP2-2020-2886,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2886,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2886,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2886,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2886 SKIP SUSE-RU-2020:2888-1 as SUSE-SLE-SERVER-12-SP5-2020-2888 is not security or has no CVEs. patches: SUSE-2020-2888,SUSE-SLE-SERVER-12-SP5-2020-2888 SKIP SUSE-RU-2020:2890-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2890 is not security or has no CVEs. patches: SUSE-2020-2890,SUSE-SLE-Module-Basesystem-15-SP2-2020-2890 SKIP SUSE-RU-2020:2892-1 as SUSE-SLE-Module-Toolchain-12-2020-2892 is not security or has no CVEs. patches: SUSE-2020-2892,SUSE-SLE-Module-Toolchain-12-2020-2892 SKIP SUSE-RU-2020:2893-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2893 is not security or has no CVEs. patches: SUSE-2020-2893,SUSE-SLE-Module-Basesystem-15-SP2-2020-2893 SKIP SUSE-RU-2020:2895-1 as SUSE-SLE-Module-Public-Cloud-12-2020-2895 is not security or has no CVEs. patches: SUSE-2020-2895,SUSE-SLE-Module-Public-Cloud-12-2020-2895 SKIP SUSE-RU-2020:2897-1 as SUSE-Storage-5-2020-2897 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2897,SUSE-2020-2897,SUSE-OpenStack-Cloud-7-2020-2897,SUSE-OpenStack-Cloud-8-2020-2897,SUSE-OpenStack-Cloud-9-2020-2897,SUSE-OpenStack-Cloud-Crowbar-8-2020-2897,SUSE-OpenStack-Cloud-Crowbar-9-2020-2897,SUSE-SLE-SAP-12-SP2-2020-2897,SUSE-SLE-SAP-12-SP3-2020-2897,SUSE-SLE-SAP-12-SP4-2020-2897,SUSE-SLE-SERVER-12-SP2-2020-2897,SUSE-SLE-SERVER-12-SP2-BCL-2020-2897,SUSE-SLE-SERVER-12-SP3-2020-2897,SUSE-SLE-SERVER-12-SP3-BCL-2020-2897,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2897,SUSE-SLE-SERVER-12-SP5-2020-2897,SUSE-Storage-5-2020-2897 SKIP SUSE-RU-2020:2902-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2902 is not security or has no CVEs. patches: SUSE-2020-2902,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2902 SKIP SUSE-RU-2020:2903-1 as SUSE-SLE-SERVER-12-SP3-BCL-2020-2903 is not security or has no CVEs. patches: SUSE-2020-2903,SUSE-OpenStack-Cloud-8-2020-2903,SUSE-SLE-SAP-12-SP3-2020-2903,SUSE-SLE-SERVER-12-SP3-2020-2903,SUSE-SLE-SERVER-12-SP3-BCL-2020-2903 SKIP SUSE-RU-2020:2903-2 as SUSE-Storage-5-2020-2903 is not security or has no CVEs. patches: SUSE-2020-2903,SUSE-Storage-5-2020-2903 SKIP SUSE-RU-2020:2909-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2909 is not security or has no CVEs. patches: SUSE-2020-2909,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2909 SKIP SUSE-RU-2020:2910-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2910 is not security or has no CVEs. patches: SUSE-2020-2910,SUSE-SLE-Module-Public-Cloud-15-2020-2910,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2910,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2910 SKIP SUSE-RU-2020:2916-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-2916 is not security or has no CVEs. patches: SUSE-2020-2916,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2916 SKIP SUSE-RU-2020:2917-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2917 is not security or has no CVEs. patches: SUSE-2020-2917,SUSE-SLE-Module-Basesystem-15-SP2-2020-2917 SKIP SUSE-RU-2020:2918-1 as SUSE-Storage-6-2020-2918 is not security or has no CVEs. patches: SUSE-2020-2918,SUSE-Storage-6-2020-2918 SKIP SUSE-RU-2020:2919-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2919 is not security or has no CVEs. patches: SUSE-2020-2919,SUSE-SLE-Module-Basesystem-15-SP1-2020-2919,SUSE-SLE-Module-Basesystem-15-SP2-2020-2919,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2919,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2919 SKIP SUSE-RU-2020:2926-1 as SUSE-SLE-SERVER-12-SP5-2020-2926 is not security or has no CVEs. patches: SUSE-2020-2926,SUSE-SLE-SERVER-12-SP5-2020-2926 SKIP SUSE-RU-2020:2927-1 as SUSE-SLE-SERVER-12-SP5-2020-2927 is not security or has no CVEs. patches: SUSE-2020-2927,SUSE-SLE-SDK-12-SP5-2020-2927,SUSE-SLE-SERVER-12-SP5-2020-2927 SKIP SUSE-RU-2020:2932-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2932 is not security or has no CVEs. patches: SUSE-2020-2932,SUSE-SLE-Module-Basesystem-15-SP2-2020-2932 SKIP SUSE-RU-2020:2933-1 as SUSE-SLE-SERVER-12-SP5-2020-2933 is not security or has no CVEs. patches: SUSE-2020-2933,SUSE-SLE-SDK-12-SP5-2020-2933,SUSE-SLE-SERVER-12-SP5-2020-2933 SKIP SUSE-RU-2020:2934-1 as SUSE-SLE-Product-WE-15-SP2-2020-2934 is not security or has no CVEs. patches: SUSE-2020-2934,SUSE-SLE-Module-Basesystem-15-SP2-2020-2934,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2934,SUSE-SLE-Product-WE-15-SP2-2020-2934 SKIP SUSE-RU-2020:2935-1 as SUSE-SLE-Product-WE-15-SP2-2020-2935 is not security or has no CVEs. patches: SUSE-2020-2935,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2935,SUSE-SLE-Product-WE-15-SP2-2020-2935 SKIP SUSE-RU-2020:2936-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2936 is not security or has no CVEs. patches: SUSE-2020-2936,SUSE-SLE-Module-Basesystem-15-SP2-2020-2936 SKIP SUSE-RU-2020:2937-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2937 is not security or has no CVEs. patches: SUSE-2020-2937,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-2937 SKIP SUSE-RU-2020:2938-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2938 is not security or has no CVEs. patches: SUSE-2020-2938,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-2938 SKIP SUSE-RU-2020:2940-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-2940 is not security or has no CVEs. patches: SUSE-2020-2940,SUSE-SLE-SERVER-12-SP5-2020-2940,SUSE-SLE-SERVER-INSTALLER-12-SP5-2020-2940 SKIP SUSE-RU-2020:2944-1 as SUSE-Storage-5-2020-2944 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-2944,SUSE-2020-2944,SUSE-OpenStack-Cloud-7-2020-2944,SUSE-OpenStack-Cloud-8-2020-2944,SUSE-OpenStack-Cloud-9-2020-2944,SUSE-OpenStack-Cloud-Crowbar-8-2020-2944,SUSE-OpenStack-Cloud-Crowbar-9-2020-2944,SUSE-SLE-SAP-12-SP2-2020-2944,SUSE-SLE-SAP-12-SP3-2020-2944,SUSE-SLE-SAP-12-SP4-2020-2944,SUSE-SLE-SDK-12-SP5-2020-2944,SUSE-SLE-SERVER-12-SP2-2020-2944,SUSE-SLE-SERVER-12-SP2-BCL-2020-2944,SUSE-SLE-SERVER-12-SP3-2020-2944,SUSE-SLE-SERVER-12-SP3-BCL-2020-2944,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2944,SUSE-SLE-SERVER-12-SP5-2020-2944,SUSE-Storage-5-2020-2944 SKIP SUSE-RU-2020:2945-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2945 is not security or has no CVEs. patches: SUSE-2020-2945,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2945,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2945 SKIP SUSE-RU-2020:2948-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2948 is not security or has no CVEs. patches: SUSE-2020-2948,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-2948,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-2948 SKIP SUSE-RU-2020:2949-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-2949 is not security or has no CVEs. patches: SUSE-2020-2949,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-2949,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-2949,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-2949 SKIP SUSE-RU-2020:2950-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2950 is not security or has no CVEs. patches: SUSE-2020-2950,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2950,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2950 SKIP SUSE-RU-2020:2952-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2952 is not security or has no CVEs. patches: SUSE-2020-2952,SUSE-SLE-INSTALLER-15-SP2-2020-2952,SUSE-SLE-Module-Basesystem-15-SP2-2020-2952 SKIP SUSE-RU-2020:2953-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2953 is not security or has no CVEs. patches: SUSE-2020-2953,SUSE-SLE-Module-Basesystem-15-SP1-2020-2953,SUSE-SLE-Module-Basesystem-15-SP2-2020-2953 SKIP SUSE-RU-2020:2955-1 as SUSE-SLE-SERVER-12-SP5-2020-2955 is not security or has no CVEs. patches: SUSE-2020-2955,SUSE-SLE-SDK-12-SP5-2020-2955,SUSE-SLE-SERVER-12-SP5-2020-2955 SKIP SUSE-RU-2020:2956-1 as SUSE-SLE-Product-SLES-15-SP2-2020-2956 is not security or has no CVEs. patches: SUSE-2020-2956,SUSE-SLE-INSTALLER-15-SP2-2020-2956,SUSE-SLE-Product-SLES-15-SP2-2020-2956 SKIP SUSE-RU-2020:2957-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2957 is not security or has no CVEs. patches: SUSE-2020-2957,SUSE-SLE-Module-Basesystem-15-SP2-2020-2957 SKIP SUSE-RU-2020:2958-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2958 is not security or has no CVEs. patches: SUSE-2020-2958,SUSE-SLE-Module-Basesystem-15-SP1-2020-2958,SUSE-SLE-Module-Basesystem-15-SP2-2020-2958 SKIP SUSE-RU-2020:2959-1 as SUSE-SLE-SERVER-12-SP5-2020-2959 is not security or has no CVEs. patches: SUSE-2020-2959,SUSE-SLE-SDK-12-SP5-2020-2959,SUSE-SLE-SERVER-12-SP5-2020-2959 SKIP SUSE-RU-2020:2962-1 as SUSE-SLE-Module-RT-15-SP2-2020-2962 is not security or has no CVEs. patches: SUSE-2020-2962,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2962,SUSE-SLE-Module-RT-15-SP2-2020-2962 SKIP SUSE-RU-2020:2963-1 as SUSE-SLE-Module-RT-15-SP1-2020-2963 is not security or has no CVEs. patches: SUSE-2020-2963,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2963,SUSE-SLE-Module-RT-15-SP1-2020-2963 SKIP SUSE-RU-2020:2964-1 as SUSE-SLE-SERVER-12-SP5-2020-2964 is not security or has no CVEs. patches: SUSE-2020-2964,SUSE-SLE-SERVER-12-SP5-2020-2964 SKIP SUSE-RU-2020:2965-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2965 is not security or has no CVEs. patches: SUSE-2020-2965,SUSE-SLE-Module-Containers-15-SP1-2020-2965,SUSE-SLE-Module-Containers-15-SP2-2020-2965,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2965,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2965 SKIP SUSE-RU-2020:2971-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2971 is not security or has no CVEs. patches: SUSE-2020-2971,SUSE-SLE-Module-Basesystem-15-SP1-2020-2971,SUSE-SLE-Module-Basesystem-15-SP2-2020-2971,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2971 SKIP SUSE-RU-2020:2974-1 as SUSE-SLE-SERVER-12-SP5-2020-2974 is not security or has no CVEs. patches: SUSE-2020-2974,SUSE-SLE-SERVER-12-SP5-2020-2974 SKIP SUSE-RU-2020:2975-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-2975 is not security or has no CVEs. patches: SUSE-2020-2975,SUSE-SLE-Module-Basesystem-15-SP1-2020-2975 SKIP SUSE-RU-2020:2978-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2978 is not security or has no CVEs. patches: SUSE-2020-2978,SUSE-SLE-Product-HPC-15-2020-2978,SUSE-SLE-Product-SLES-15-2020-2978,SUSE-SLE-Product-SLES_SAP-15-2020-2978 SKIP SUSE-RU-2020:2979-1 as SUSE-SLE-Product-SLES_SAP-15-2020-2979 is not security or has no CVEs. patches: SUSE-2020-2979,SUSE-SLE-Module-Basesystem-15-SP1-2020-2979,SUSE-SLE-Module-Basesystem-15-SP2-2020-2979,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2979,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2979,SUSE-SLE-Product-HPC-15-2020-2979,SUSE-SLE-Product-SLES-15-2020-2979,SUSE-SLE-Product-SLES_SAP-15-2020-2979 SKIP SUSE-RU-2020:2982-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-2982 is not security or has no CVEs. patches: SUSE-2020-2982,SUSE-SLE-Module-Basesystem-15-SP1-2020-2982,SUSE-SLE-Module-Basesystem-15-SP2-2020-2982,SUSE-SLE-Module-Server-Applications-15-SP1-2020-2982,SUSE-SLE-Module-Server-Applications-15-SP2-2020-2982 SKIP SUSE-RU-2020:2983-1 as SUSE-SLE-Module-Python2-15-SP2-2020-2983 is not security or has no CVEs. patches: SUSE-2020-2983,SUSE-SLE-Module-Basesystem-15-SP1-2020-2983,SUSE-SLE-Module-Basesystem-15-SP2-2020-2983,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2983,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2983,SUSE-SLE-Module-Python2-15-SP1-2020-2983,SUSE-SLE-Module-Python2-15-SP2-2020-2983 SKIP SUSE-RU-2020:2984-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2984 is not security or has no CVEs. patches: SUSE-2020-2984,SUSE-SLE-Module-SAP-Applications-15-2020-2984,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2984 SKIP SUSE-RU-2020:2985-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2985 is not security or has no CVEs. patches: SUSE-2020-2985,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2985 SKIP SUSE-RU-2020:2986-1 as SUSE-SLE-SAP-12-SP5-2020-2986 is not security or has no CVEs. patches: SUSE-2020-2986,SUSE-SLE-SAP-12-SP3-2020-2986,SUSE-SLE-SAP-12-SP4-2020-2986,SUSE-SLE-SAP-12-SP5-2020-2986 SKIP SUSE-RU-2020:2987-1 as SUSE-SLE-SERVER-12-SP5-2020-2987 is not security or has no CVEs. patches: SUSE-2020-2987,SUSE-SLE-SERVER-12-SP5-2020-2987 SKIP SUSE-RU-2020:2989-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-2989 is not security or has no CVEs. patches: SUSE-2020-2989,SUSE-SLE-Module-Basesystem-15-SP1-2020-2989,SUSE-SLE-Module-Basesystem-15-SP2-2020-2989 SKIP SUSE-RU-2020:2990-1 as SUSE-SLE-SAP-12-SP5-2020-2990 is not security or has no CVEs. patches: SUSE-2020-2990,SUSE-SLE-SAP-12-SP3-2020-2990,SUSE-SLE-SAP-12-SP4-2020-2990,SUSE-SLE-SAP-12-SP5-2020-2990 SKIP SUSE-RU-2020:2991-1 as SUSE-SLE-SAP-12-SP5-2020-2991 is not security or has no CVEs. patches: SUSE-2020-2991,SUSE-SLE-SAP-12-SP3-2020-2991,SUSE-SLE-SAP-12-SP4-2020-2991,SUSE-SLE-SAP-12-SP5-2020-2991 SKIP SUSE-RU-2020:2992-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2992 is not security or has no CVEs. patches: SUSE-2020-2992,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2992 SKIP SUSE-RU-2020:2993-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2993 is not security or has no CVEs. patches: SUSE-2020-2993,SUSE-SLE-Module-SAP-Applications-15-2020-2993,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2993 SKIP SUSE-RU-2020:2994-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2994 is not security or has no CVEs. patches: SUSE-2020-2994,SUSE-SLE-Module-SAP-Applications-15-2020-2994,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-2994,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-2994 SKIP SUSE-RU-2020:3000-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3000 is not security or has no CVEs. patches: SUSE-2020-3000,SUSE-SLE-Module-Basesystem-15-SP2-2020-3000 SKIP SUSE-RU-2020:3001-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3001 is not security or has no CVEs. patches: SUSE-2020-3001,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3001 SKIP SUSE-RU-2020:3004-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3004 is not security or has no CVEs. patches: SUSE-2020-3004,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3004,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3004 SKIP SUSE-RU-2020:3005-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3005 is not security or has no CVEs. patches: SUSE-2020-3005,SUSE-SLE-Module-SAP-Applications-15-2020-3005,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3005 SKIP SUSE-RU-2020:3006-1 as SUSE-SLE-SAP-12-SP5-2020-3006 is not security or has no CVEs. patches: SUSE-2020-3006,SUSE-SLE-SAP-12-SP2-2020-3006,SUSE-SLE-SAP-12-SP3-2020-3006,SUSE-SLE-SAP-12-SP4-2020-3006,SUSE-SLE-SAP-12-SP5-2020-3006 SKIP SUSE-RU-2020:3008-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2020-3007 is not security or has no CVEs. patches: SUSE-2020-3008,SUSE-SLE-Live-Patching-12-2020-3008,SUSE-SLE-Live-Patching-12-SP3-2020-3008,SUSE-SLE-Live-Patching-12-SP4-2020-3008,SUSE-SLE-Live-Patching-12-SP5-2020-3008,SUSE-SLE-Module-Live-Patching-15-2020-3007,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3007,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3007 SKIP SUSE-RU-2020:3009-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3009 is not security or has no CVEs. patches: SUSE-2020-3009,SUSE-SLE-Module-Basesystem-15-SP2-2020-3009 SKIP SUSE-RU-2020:3010-1 as SUSE-SLE-SERVER-12-SP5-2020-3010 is not security or has no CVEs. patches: SUSE-2020-3010,SUSE-SLE-SERVER-12-SP5-2020-3010 SKIP SUSE-RU-2020:3011-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3011 is not security or has no CVEs. patches: SUSE-2020-3011,SUSE-SLE-Module-Basesystem-15-SP1-2020-3011 SKIP SUSE-RU-2020:3012-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3012 is not security or has no CVEs. patches: SUSE-2020-3012,SUSE-SLE-Module-Basesystem-15-SP1-2020-3012,SUSE-SLE-Module-Basesystem-15-SP2-2020-3012,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3012,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3012 SKIP SUSE-RU-2020:3013-1 as SUSE-SLE-Product-HA-15-2020-3013 is not security or has no CVEs. patches: SUSE-2020-3013,SUSE-SLE-Product-HA-15-2020-3013 SKIP SUSE-RU-2020:3015-1 as SUSE-SLE-SERVER-12-SP5-2020-3015 is not security or has no CVEs. patches: SUSE-2020-3015,SUSE-SLE-SDK-12-SP5-2020-3015,SUSE-SLE-SERVER-12-SP5-2020-3015 SKIP SUSE-RU-2020:3018-1 as SUSE-SLE-Product-HA-15-SP1-2020-3018 is not security or has no CVEs. patches: SUSE-2020-3018,SUSE-SLE-Product-HA-15-SP1-2020-3018 SKIP SUSE-RU-2020:3019-1 as SUSE-SLE-Product-HA-15-SP1-2020-3019 is not security or has no CVEs. patches: SUSE-2020-3019,SUSE-SLE-Product-HA-15-SP1-2020-3019 SKIP SUSE-RU-2020:3020-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3020 is not security or has no CVEs. patches: SUSE-2020-3020,SUSE-SLE-Module-SAP-Applications-15-2020-3020,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3020 SKIP SUSE-RU-2020:3025-1 as SUSE-SLE-Product-WE-15-SP2-2020-3025 is not security or has no CVEs. patches: SUSE-2020-3025,SUSE-SLE-Module-Basesystem-15-SP1-2020-3025,SUSE-SLE-Module-Basesystem-15-SP2-2020-3025,SUSE-SLE-Product-WE-15-SP1-2020-3025,SUSE-SLE-Product-WE-15-SP2-2020-3025 SKIP SUSE-RU-2020:3027-1 as SUSE-SLE-Product-HA-15-2020-3027 is not security or has no CVEs. patches: SUSE-2020-3027,SUSE-SLE-Product-HA-15-2020-3027 SKIP SUSE-RU-2020:3028-1 as SUSE-SLE-Product-HA-15-SP1-2020-3028 is not security or has no CVEs. patches: SUSE-2020-3028,SUSE-SLE-Product-HA-15-2020-3028,SUSE-SLE-Product-HA-15-SP1-2020-3028 SKIP SUSE-RU-2020:3031-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3031 is not security or has no CVEs. patches: SUSE-2020-3031,SUSE-SLE-Module-Basesystem-15-SP2-2020-3031,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3031 SKIP SUSE-RU-2020:3035-1 as SUSE-SLE-Product-HA-15-SP2-2020-3035 is not security or has no CVEs. patches: SUSE-2020-3035,SUSE-SLE-Product-HA-15-SP2-2020-3035 SKIP SUSE-RU-2020:3040-1 as SUSE-Storage-6-2020-3040 is not security or has no CVEs. patches: SUSE-2020-3040,SUSE-Storage-6-2020-3040 SKIP SUSE-RU-2020:3041-1 as SUSE-SLE-Module-Legacy-15-SP2-2020-3041 is not security or has no CVEs. patches: SUSE-2020-3041,SUSE-SLE-Module-Legacy-15-SP1-2020-3041,SUSE-SLE-Module-Legacy-15-SP2-2020-3041 SKIP SUSE-RU-2020:3042-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3042 is not security or has no CVEs. patches: SUSE-2020-3042,SUSE-SLE-Module-Basesystem-15-SP2-2020-3042,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3042 SKIP SUSE-RU-2020:3043-1 as SUSE-SLE-SERVER-12-SP5-2020-3043 is not security or has no CVEs. patches: SUSE-2020-3043,SUSE-SLE-SDK-12-SP5-2020-3043,SUSE-SLE-SERVER-12-SP5-2020-3043 SKIP SUSE-RU-2020:3046-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3046 is not security or has no CVEs. patches: SUSE-2020-3046,SUSE-SLE-Module-Basesystem-15-SP1-2020-3046,SUSE-SLE-Module-Basesystem-15-SP2-2020-3046 SKIP SUSE-RU-2020:3047-1 as SUSE-SLE-Module-Containers-15-SP2-2020-3047 is not security or has no CVEs. patches: SUSE-2020-3047,SUSE-SLE-Module-Containers-15-SP2-2020-3047 SKIP SUSE-RU-2020:3048-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3048 is not security or has no CVEs. patches: SUSE-2020-3048,SUSE-SLE-INSTALLER-15-2020-3048,SUSE-SLE-INSTALLER-15-SP1-2020-3048,SUSE-SLE-INSTALLER-15-SP2-2020-3048,SUSE-SLE-Module-Basesystem-15-SP1-2020-3048,SUSE-SLE-Module-Basesystem-15-SP2-2020-3048,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3048,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3048,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3048,SUSE-SLE-Product-HPC-15-2020-3048,SUSE-SLE-Product-SLES-15-2020-3048,SUSE-SLE-Product-SLES_SAP-15-2020-3048 SKIP SUSE-RU-2020:3055-1 as SUSE-SLE-SERVER-12-SP5-2020-3055 is not security or has no CVEs. patches: SUSE-2020-3055,SUSE-SLE-SDK-12-SP5-2020-3055,SUSE-SLE-SERVER-12-SP5-2020-3055 SKIP SUSE-RU-2020:3056-1 as SUSE-SLE-SERVER-12-SP5-2020-3056 is not security or has no CVEs. patches: SUSE-2020-3056,SUSE-SLE-SERVER-12-SP5-2020-3056 SKIP SUSE-RU-2020:3057-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3057 is not security or has no CVEs. patches: SUSE-2020-3057,SUSE-SLE-INSTALLER-15-SP2-2020-3057,SUSE-SLE-Module-Basesystem-15-SP2-2020-3057 SKIP SUSE-RU-2020:3058-1 as SUSE-SLE-Module-Containers-15-SP2-2020-3058 is not security or has no CVEs. patches: SUSE-2020-3058,SUSE-SLE-Module-Containers-15-SP1-2020-3058,SUSE-SLE-Module-Containers-15-SP2-2020-3058 SKIP SUSE-RU-2020:3059-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3059 is not security or has no CVEs. patches: SUSE-2020-3059,SUSE-SLE-Module-Basesystem-15-SP2-2020-3059 SKIP SUSE-RU-2020:3061-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2020-3061 is not security or has no CVEs. patches: SUSE-2020-3061,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3061 SKIP SUSE-RU-2020:3062-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3062 is not security or has no CVEs. patches: SUSE-2020-3062,SUSE-SLE-Module-Basesystem-15-SP1-2020-3062,SUSE-SLE-Module-Basesystem-15-SP2-2020-3062,SUSE-SLE-Product-HPC-15-2020-3062,SUSE-SLE-Product-SLES-15-2020-3062,SUSE-SLE-Product-SLES_SAP-15-2020-3062 SKIP SUSE-RU-2020:3063-1 as SUSE-SLE-Product-HA-15-SP2-2020-3063 is not security or has no CVEs. patches: SUSE-2020-3063,SUSE-SLE-Product-HA-15-2020-3063,SUSE-SLE-Product-HA-15-SP1-2020-3063,SUSE-SLE-Product-HA-15-SP2-2020-3063 SKIP SUSE-RU-2020:3072-1 as SUSE-SLE-Manager-Tools-15-2020-3072 is not security or has no CVEs. patches: SUSE-2020-3072,SUSE-SLE-Manager-Tools-15-2020-3072 SKIP SUSE-RU-2020:3074-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3074 is not security or has no CVEs. patches: SUSE-2020-3074,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3074 SKIP SUSE-RU-2020:3075-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3075 is not security or has no CVEs. patches: SUSE-2020-3075,SUSE-SLE-Product-HPC-15-2020-3075,SUSE-SLE-Product-SLES-15-2020-3075,SUSE-SLE-Product-SLES_SAP-15-2020-3075 SKIP SUSE-RU-2020:3076-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3076 is not security or has no CVEs. patches: SUSE-2020-3076,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3076,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3076 SKIP SUSE-RU-2020:3077-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3077 is not security or has no CVEs. patches: SUSE-2020-3077,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3077,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3077 SKIP SUSE-RU-2020:3078-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3078 is not security or has no CVEs. patches: SUSE-2020-3078,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3078 SKIP SUSE-RU-2020:3079-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3079 is not security or has no CVEs. patches: SUSE-2020-3079,SUSE-SLE-INSTALLER-15-SP2-2020-3079,SUSE-SLE-Module-Basesystem-15-SP2-2020-3079 SKIP SUSE-RU-2020:3099-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3099 is not security or has no CVEs. patches: SUSE-2020-3099,SUSE-SLE-Module-Basesystem-15-SP1-2020-3099,SUSE-SLE-Module-Basesystem-15-SP2-2020-3099,SUSE-SLE-Product-HPC-15-2020-3099,SUSE-SLE-Product-SLES-15-2020-3099,SUSE-SLE-Product-SLES_SAP-15-2020-3099 SKIP SUSE-RU-2020:3100-1 as SUSE-Storage-5-2020-3100 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3100,SUSE-2020-3100,SUSE-OpenStack-Cloud-7-2020-3100,SUSE-OpenStack-Cloud-8-2020-3100,SUSE-OpenStack-Cloud-9-2020-3100,SUSE-OpenStack-Cloud-Crowbar-8-2020-3100,SUSE-OpenStack-Cloud-Crowbar-9-2020-3100,SUSE-SLE-SAP-12-SP2-2020-3100,SUSE-SLE-SAP-12-SP3-2020-3100,SUSE-SLE-SAP-12-SP4-2020-3100,SUSE-SLE-SERVER-12-SP2-2020-3100,SUSE-SLE-SERVER-12-SP2-BCL-2020-3100,SUSE-SLE-SERVER-12-SP3-2020-3100,SUSE-SLE-SERVER-12-SP3-BCL-2020-3100,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3100,SUSE-SLE-SERVER-12-SP5-2020-3100,SUSE-Storage-5-2020-3100 SKIP SUSE-RU-2020:3101-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3101 is not security or has no CVEs. patches: SUSE-2020-3101,SUSE-SLE-Module-Basesystem-15-SP2-2020-3101 SKIP SUSE-RU-2020:3102-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3102 is not security or has no CVEs. patches: SUSE-2020-3102,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3102 SKIP SUSE-RU-2020:3103-1 as SUSE-SLE-WE-12-SP5-2020-3103 is not security or has no CVEs. patches: SUSE-2020-3103,SUSE-OpenStack-Cloud-9-2020-3103,SUSE-SLE-SDK-12-SP5-2020-3103,SUSE-SLE-SERVER-12-SP5-2020-3103,SUSE-SLE-WE-12-SP5-2020-3103 SKIP SUSE-RU-2020:3104-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-3104 is not security or has no CVEs. patches: SUSE-2020-3104,SUSE-OpenStack-Cloud-7-2020-3104,SUSE-SLE-SAP-12-SP2-2020-3104,SUSE-SLE-SERVER-12-SP2-2020-3104,SUSE-SLE-SERVER-12-SP2-BCL-2020-3104 SKIP SUSE-RU-2020:3105-1 as SUSE-Storage-5-2020-3105 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3105,SUSE-2020-3105,SUSE-OpenStack-Cloud-8-2020-3105,SUSE-OpenStack-Cloud-9-2020-3105,SUSE-OpenStack-Cloud-Crowbar-8-2020-3105,SUSE-OpenStack-Cloud-Crowbar-9-2020-3105,SUSE-SLE-SAP-12-SP3-2020-3105,SUSE-SLE-SAP-12-SP4-2020-3105,SUSE-SLE-SERVER-12-SP3-2020-3105,SUSE-SLE-SERVER-12-SP3-BCL-2020-3105,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3105,SUSE-SLE-SERVER-12-SP5-2020-3105,SUSE-Storage-5-2020-3105 SKIP SUSE-RU-2020:3108-1 as SUSE-SLE-HA-12-SP5-2020-3108 is not security or has no CVEs. patches: SUSE-2020-3108,SUSE-SLE-HA-12-SP5-2020-3108 SKIP SUSE-RU-2020:3109-1 as SUSE-SLE-HA-12-SP4-2020-3109 is not security or has no CVEs. patches: SUSE-2020-3109,SUSE-SLE-HA-12-SP4-2020-3109 SKIP SUSE-RU-2020:3110-1 as SUSE-SLE-HA-12-SP3-2020-3110 is not security or has no CVEs. patches: SUSE-2020-3110,SUSE-SLE-HA-12-SP3-2020-3110 SKIP SUSE-RU-2020:3114-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3114 is not security or has no CVEs. patches: SUSE-2020-3114,SUSE-SLE-Module-Basesystem-15-SP1-2020-3114,SUSE-SLE-Module-Basesystem-15-SP2-2020-3114,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3114,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3114 SKIP SUSE-RU-2020:3116-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3116 is not security or has no CVEs. patches: SUSE-2020-3116,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3116,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3116 SKIP SUSE-RU-2020:3119-1 as SUSE-SLE-Module-Public-Cloud-15-2020-3119 is not security or has no CVEs. patches: SUSE-2020-3119,SUSE-SLE-Module-Public-Cloud-15-2020-3119 SKIP SUSE-RU-2020:3120-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3120 is not security or has no CVEs. patches: SUSE-2020-3120,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3120 SKIP SUSE-RU-2020:3123-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3123 is not security or has no CVEs. patches: SUSE-2020-3123,SUSE-SLE-Module-Basesystem-15-SP1-2020-3123,SUSE-SLE-Module-Basesystem-15-SP2-2020-3123,SUSE-SLE-Product-HPC-15-2020-3123,SUSE-SLE-Product-SLES-15-2020-3123,SUSE-SLE-Product-SLES_SAP-15-2020-3123 SKIP SUSE-RU-2020:3127-1 as SUSE-Storage-7-2020-3127 is not security or has no CVEs. patches: SUSE-2020-3127,SUSE-Storage-7-2020-3127 SKIP SUSE-RU-2020:3128-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3128 is not security or has no CVEs. patches: SUSE-2020-3128,SUSE-SLE-Module-Basesystem-15-SP2-2020-3128 SKIP SUSE-RU-2020:3129-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3129 is not security or has no CVEs. patches: SUSE-2020-3129,SUSE-SLE-Module-Basesystem-15-SP1-2020-3129 SKIP SUSE-RU-2020:3130-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3130 is not security or has no CVEs. patches: SUSE-2020-3130,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3130,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3130 SKIP SUSE-RU-2020:3131-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3131 is not security or has no CVEs. patches: SUSE-2020-3131,SUSE-SLE-INSTALLER-15-SP2-2020-3131,SUSE-SLE-Module-Basesystem-15-SP2-2020-3131 SKIP SUSE-RU-2020:3134-1 as SUSE-SLE-Module-HPC-15-SP1-2020-3134 is not security or has no CVEs. patches: SUSE-2020-3134,SUSE-SLE-Module-HPC-15-SP1-2020-3134 SKIP SUSE-RU-2020:3135-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2020-3135 is not security or has no CVEs. patches: SUSE-2020-3135,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3135 SKIP SUSE-RU-2020:3136-1 as SUSE-SLE-Module-HPC-15-SP2-2020-3136 is not security or has no CVEs. patches: SUSE-2020-3136,SUSE-SLE-Module-HPC-15-SP2-2020-3136 SKIP SUSE-RU-2020:3137-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3137 is not security or has no CVEs. patches: SUSE-2020-3137,SUSE-SLE-Module-Basesystem-15-SP2-2020-3137 SKIP SUSE-RU-2020:3138-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3138 is not security or has no CVEs. patches: SUSE-2020-3138,SUSE-SLE-INSTALLER-15-SP1-2020-3138,SUSE-SLE-Module-Basesystem-15-SP1-2020-3138,SUSE-SLE-Module-Basesystem-15-SP2-2020-3138 SKIP SUSE-RU-2020:3139-1 as SUSE-Storage-5-2020-3139 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3139,SUSE-2020-3139,SUSE-OpenStack-Cloud-7-2020-3139,SUSE-OpenStack-Cloud-8-2020-3139,SUSE-OpenStack-Cloud-9-2020-3139,SUSE-OpenStack-Cloud-Crowbar-8-2020-3139,SUSE-OpenStack-Cloud-Crowbar-9-2020-3139,SUSE-SLE-SAP-12-SP2-2020-3139,SUSE-SLE-SAP-12-SP3-2020-3139,SUSE-SLE-SAP-12-SP4-2020-3139,SUSE-SLE-SERVER-12-SP2-2020-3139,SUSE-SLE-SERVER-12-SP2-BCL-2020-3139,SUSE-SLE-SERVER-12-SP3-2020-3139,SUSE-SLE-SERVER-12-SP3-BCL-2020-3139,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3139,SUSE-SLE-SERVER-12-SP5-2020-3139,SUSE-Storage-5-2020-3139 SKIP SUSE-RU-2020:3142-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3142 is not security or has no CVEs. patches: SUSE-2020-3142,SUSE-SLE-Module-Basesystem-15-SP1-2020-3142,SUSE-SLE-Module-Basesystem-15-SP2-2020-3142 SKIP SUSE-RU-2020:3145-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-3145 is not security or has no CVEs. patches: SUSE-2020-3145,SUSE-OpenStack-Cloud-9-2020-3145,SUSE-OpenStack-Cloud-Crowbar-9-2020-3145,SUSE-SLE-SAP-12-SP4-2020-3145,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3145 SKIP SUSE-RU-2020:3146-1 as SUSE-SLE-SERVER-12-SP5-2020-3146 is not security or has no CVEs. patches: SUSE-2020-3146,SUSE-OpenStack-Cloud-9-2020-3146,SUSE-OpenStack-Cloud-Crowbar-9-2020-3146,SUSE-SLE-SAP-12-SP4-2020-3146,SUSE-SLE-SDK-12-SP5-2020-3146,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3146,SUSE-SLE-SERVER-12-SP5-2020-3146 SKIP SUSE-RU-2020:3148-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3148 is not security or has no CVEs. patches: SUSE-2020-3148,SUSE-SLE-Module-Basesystem-15-SP1-2020-3148,SUSE-SLE-Module-Basesystem-15-SP2-2020-3148,SUSE-SLE-Product-HPC-15-2020-3148,SUSE-SLE-Product-SLES_SAP-15-2020-3148 SKIP SUSE-RU-2020:3150-1 as SUSE-Storage-5-2020-3150 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3150,SUSE-2020-3150,SUSE-OpenStack-Cloud-8-2020-3150,SUSE-OpenStack-Cloud-9-2020-3150,SUSE-OpenStack-Cloud-Crowbar-8-2020-3150,SUSE-OpenStack-Cloud-Crowbar-9-2020-3150,SUSE-SLE-SAP-12-SP3-2020-3150,SUSE-SLE-SAP-12-SP4-2020-3150,SUSE-SLE-SERVER-12-SP3-2020-3150,SUSE-SLE-SERVER-12-SP3-BCL-2020-3150,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3150,SUSE-SLE-SERVER-12-SP5-2020-3150,SUSE-Storage-5-2020-3150 SKIP SUSE-RU-2020:3156-1 as SUSE-Storage-5-2020-3156 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3156,SUSE-2020-3156,SUSE-OpenStack-Cloud-7-2020-3156,SUSE-OpenStack-Cloud-8-2020-3156,SUSE-OpenStack-Cloud-9-2020-3156,SUSE-OpenStack-Cloud-Crowbar-8-2020-3156,SUSE-OpenStack-Cloud-Crowbar-9-2020-3156,SUSE-SLE-SAP-12-SP2-2020-3156,SUSE-SLE-SAP-12-SP3-2020-3156,SUSE-SLE-SAP-12-SP4-2020-3156,SUSE-SLE-SERVER-12-SP2-2020-3156,SUSE-SLE-SERVER-12-SP2-BCL-2020-3156,SUSE-SLE-SERVER-12-SP3-2020-3156,SUSE-SLE-SERVER-12-SP3-BCL-2020-3156,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3156,SUSE-SLE-SERVER-12-SP5-2020-3156,SUSE-Storage-5-2020-3156 SKIP SUSE-RU-2020:3157-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3157 is not security or has no CVEs. patches: SUSE-2020-3157,SUSE-SLE-Module-Basesystem-15-SP2-2020-3157 SKIP SUSE-RU-2020:3158-1 as SUSE-Storage-5-2020-3158 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3158,SUSE-2020-3158,SUSE-OpenStack-Cloud-8-2020-3158,SUSE-OpenStack-Cloud-Crowbar-8-2020-3158,SUSE-SLE-SAP-12-SP3-2020-3158,SUSE-SLE-SERVER-12-SP3-2020-3158,SUSE-SLE-SERVER-12-SP3-BCL-2020-3158,SUSE-Storage-5-2020-3158 SKIP SUSE-RU-2020:3168-1 as SUSE-SLE-Product-HA-15-SP1-2020-3168 is not security or has no CVEs. patches: SUSE-2020-3168,SUSE-SLE-Product-HA-15-SP1-2020-3168 SKIP SUSE-RU-2020:3169-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3169 is not security or has no CVEs. patches: SUSE-2020-3169,SUSE-SLE-Module-Basesystem-15-SP2-2020-3169 SKIP SUSE-RU-2020:3170-1 as SUSE-SLE-Product-HA-15-SP2-2020-3170 is not security or has no CVEs. patches: SUSE-2020-3170,SUSE-SLE-Product-HA-15-SP2-2020-3170 SKIP SUSE-RU-2020:3192-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3192 is not security or has no CVEs. patches: SUSE-2020-3192,SUSE-SLE-Module-Basesystem-15-SP2-2020-3192 SKIP SUSE-RU-2020:3193-1 as SUSE-SLE-Product-HA-15-SP2-2020-3193 is not security or has no CVEs. patches: SUSE-2020-3193,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3193,SUSE-SLE-Product-HA-15-SP2-2020-3193 SKIP SUSE-RU-2020:3194-1 as SUSE-SLE-HA-12-SP3-2020-3194 is not security or has no CVEs. patches: SUSE-2020-3194,SUSE-SLE-HA-12-SP3-2020-3194 SKIP SUSE-RU-2020:3195-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3195 is not security or has no CVEs. patches: SUSE-2020-3195,SUSE-SLE-Product-HPC-15-2020-3195,SUSE-SLE-Product-SLES-15-2020-3195,SUSE-SLE-Product-SLES_SAP-15-2020-3195 SKIP SUSE-RU-2020:3197-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3197 is not security or has no CVEs. patches: SUSE-2020-3197,SUSE-SLE-Module-Basesystem-15-SP1-2020-3197 SKIP SUSE-RU-2020:3198-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3198 is not security or has no CVEs. patches: SUSE-2020-3198,SUSE-SLE-Module-Basesystem-15-SP1-2020-3198 SKIP SUSE-RU-2020:3199-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3199 is not security or has no CVEs. patches: SUSE-2020-3199,SUSE-SLE-Module-Basesystem-15-SP2-2020-3199 SKIP SUSE-RU-2020:3200-1 as SUSE-Storage-5-2020-3200 is not security or has no CVEs. patches: SUSE-2020-3200,SUSE-Storage-5-2020-3200 SKIP SUSE-RU-2020:3201-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3201 is not security or has no CVEs. patches: SUSE-2020-3201,SUSE-SLE-Module-Basesystem-15-SP2-2020-3201 SKIP SUSE-RU-2020:3234-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3234 is not security or has no CVEs. patches: SUSE-2020-3234,SUSE-SLE-Module-Basesystem-15-SP1-2020-3234,SUSE-SLE-Product-HPC-15-2020-3234,SUSE-SLE-Product-SLES-15-2020-3234,SUSE-SLE-Product-SLES_SAP-15-2020-3234 SKIP SUSE-RU-2020:3242-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3242 is not security or has no CVEs. patches: SUSE-2020-3242,SUSE-SLE-Module-Basesystem-15-SP2-2020-3242,SUSE-SLE-Module-Python2-15-SP2-2020-3242,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3242 SKIP SUSE-RU-2020:3247-1 as SUSE-SLE-SAP-12-SP5-2020-3247 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3247,SUSE-2020-3247,SUSE-OpenStack-Cloud-8-2020-3247,SUSE-OpenStack-Cloud-9-2020-3247,SUSE-SLE-Manager-Tools-12-2020-3247,SUSE-SLE-SAP-12-SP3-2020-3247,SUSE-SLE-SAP-12-SP4-2020-3247,SUSE-SLE-SAP-12-SP5-2020-3247 SKIP SUSE-RU-2020:3248-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3248 is not security or has no CVEs. patches: SUSE-2020-3248,SUSE-SLE-Manager-Tools-15-2020-3248,SUSE-SLE-Module-SAP-Applications-15-2020-3248,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3248,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3248 SKIP SUSE-RU-2020:3252-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-3252 is not security or has no CVEs. patches: SUSE-2020-3252,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2020-3252,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2020-3252,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-3252 SKIP SUSE-RU-2020:3253-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3253 is not security or has no CVEs. patches: SUSE-2020-3253,SUSE-SLE-Module-Basesystem-15-SP1-2020-3253,SUSE-SLE-Module-Basesystem-15-SP2-2020-3253,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3253,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3253,SUSE-SLE-Product-HPC-15-2020-3253,SUSE-SLE-Product-SLES-15-2020-3253,SUSE-SLE-Product-SLES_SAP-15-2020-3253 SKIP SUSE-RU-2020:3253-2 as SUSE-2020-3253 is not security or has no CVEs. patches: SUSE-2020-3253,SUSE-SLE-Module-Certifications-15-SP3-2022-1922 SKIP SUSE-RU-2020:3258-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3258 is not security or has no CVEs. patches: SUSE-2020-3258,SUSE-SLE-Module-Basesystem-15-SP1-2020-3258,SUSE-SLE-Module-Basesystem-15-SP2-2020-3258,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3258,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3258 SKIP SUSE-RU-2020:3259-1 as SUSE-SLE-Product-HA-15-SP2-2020-3259 is not security or has no CVEs. patches: SUSE-2020-3259,SUSE-SLE-Product-HA-15-SP2-2020-3259 SKIP SUSE-RU-2020:3265-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3265 is not security or has no CVEs. patches: SUSE-2020-3265,SUSE-SLE-Module-Basesystem-15-SP2-2020-3265 SKIP SUSE-RU-2020:3266-1 as SUSE-SLE-SERVER-12-SP5-2020-3266 is not security or has no CVEs. patches: SUSE-2020-3266,SUSE-SLE-SERVER-12-SP5-2020-3266 SKIP SUSE-RU-2020:3267-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3267 is not security or has no CVEs. patches: SUSE-2020-3267,SUSE-SLE-Module-Basesystem-15-SP2-2020-3267 SKIP SUSE-RU-2020:3270-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3270 is not security or has no CVEs. patches: SUSE-2020-3270,SUSE-SLE-Module-Basesystem-15-SP1-2020-3270,SUSE-SLE-Module-Basesystem-15-SP2-2020-3270,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3270,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3270 SKIP SUSE-RU-2020:3277-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3277 is not security or has no CVEs. patches: SUSE-2020-3277,SUSE-SLE-Module-Public-Cloud-15-2020-3277,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3277,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3277 SKIP SUSE-RU-2020:3278-1 as SUSE-SLE-Module-Public-Cloud-12-2020-3278 is not security or has no CVEs. patches: SUSE-2020-3278,SUSE-SLE-Module-Public-Cloud-12-2020-3278 SKIP SUSE-RU-2020:3285-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3285 is not security or has no CVEs. patches: SUSE-2020-3285,SUSE-SLE-Module-Basesystem-15-SP1-2020-3285,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3285,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3285 SKIP SUSE-RU-2020:3286-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3286 is not security or has no CVEs. patches: SUSE-2020-3286,SUSE-SLE-Module-Basesystem-15-SP2-2020-3286,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3286 SKIP SUSE-RU-2020:3287-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3287 is not security or has no CVEs. patches: SUSE-2020-3287,SUSE-SLE-Module-Basesystem-15-SP1-2020-3287,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3287 SKIP SUSE-RU-2020:3288-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3288 is not security or has no CVEs. patches: SUSE-2020-3288,SUSE-SLE-INSTALLER-15-SP2-2020-3288,SUSE-SLE-Module-Basesystem-15-SP2-2020-3288 SKIP SUSE-RU-2020:3289-1 as SUSE-SLE-Module-Python2-15-SP1-2020-3289 is not security or has no CVEs. patches: SUSE-2020-3289,SUSE-SLE-Module-Basesystem-15-SP1-2020-3289,SUSE-SLE-Module-Python2-15-SP1-2020-3289 SKIP SUSE-RU-2020:3290-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3290 is not security or has no CVEs. patches: SUSE-2020-3290,SUSE-SLE-Module-Basesystem-15-SP1-2020-3290,SUSE-SLE-Module-Basesystem-15-SP2-2020-3290 ERROR: notice SUSE-RU-2020:3294-1 has no valid patches out of: SUSE-2020-3294,SUSE-SLE-Product-SLES-15-SP2-2020-3294 SKIP SUSE-RU-2020:3295-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3295 is not security or has no CVEs. patches: SUSE-2020-3295,SUSE-SLE-Module-Basesystem-15-SP2-2020-3295 SKIP SUSE-RU-2020:3296-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3296 is not security or has no CVEs. patches: SUSE-2020-3296,SUSE-SLE-Module-Basesystem-15-SP1-2020-3296 SKIP SUSE-RU-2020:3298-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3298 is not security or has no CVEs. patches: SUSE-2020-3298,SUSE-SLE-Product-HPC-15-2020-3298,SUSE-SLE-Product-SLES-15-2020-3298,SUSE-SLE-Product-SLES_SAP-15-2020-3298 SKIP SUSE-RU-2020:3300-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3300 is not security or has no CVEs. patches: SUSE-2020-3300,SUSE-SLE-Module-Basesystem-15-SP1-2020-3300,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3300,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3300 SKIP SUSE-RU-2020:3301-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3301 is not security or has no CVEs. patches: SUSE-2020-3301,SUSE-SLE-Module-Basesystem-15-SP2-2020-3301,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3301,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3301 SKIP SUSE-RU-2020:3305-1 as SUSE-SLE-SERVER-12-SP5-2020-3305 is not security or has no CVEs. patches: SUSE-2020-3305,SUSE-SLE-SERVER-12-SP5-2020-3305 SKIP SUSE-RU-2020:3307-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3307 is not security or has no CVEs. patches: SUSE-2020-3307,SUSE-SLE-Module-Basesystem-15-SP2-2020-3307,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3307 SKIP SUSE-RU-2020:3308-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3308 is not security or has no CVEs. patches: SUSE-2020-3308,SUSE-SLE-Module-Basesystem-15-SP1-2020-3308,SUSE-SLE-Module-Basesystem-15-SP2-2020-3308,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3308,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3308 SKIP SUSE-RU-2020:3316-1 as SUSE-SLE-SERVER-12-SP5-2020-3316 is not security or has no CVEs. patches: SUSE-2020-3316,SUSE-SLE-SERVER-12-SP5-2020-3316 SKIP SUSE-RU-2020:3317-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3317 is not security or has no CVEs. patches: SUSE-2020-3317,SUSE-SLE-Module-SAP-Applications-15-2020-3317,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3317,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3317 SKIP SUSE-RU-2020:3318-1 as SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3318 is not security or has no CVEs. patches: SUSE-2020-3318,SUSE-SLE-Module-Basesystem-15-SP1-2020-3318,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3318 SKIP SUSE-RU-2020:3319-1 as SUSE-SLE-Module-SAP-Applications-15-2020-3319 is not security or has no CVEs. patches: SUSE-2020-3319,SUSE-SLE-Module-SAP-Applications-15-2020-3319 SKIP SUSE-RU-2020:3320-1 as SUSE-SLE-SERVER-12-SP5-2020-3320 is not security or has no CVEs. patches: SUSE-2020-3320,SUSE-SLE-SERVER-12-SP5-2020-3320 SKIP SUSE-RU-2020:3321-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3321 is not security or has no CVEs. patches: SUSE-2020-3321,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3321,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3321 SKIP SUSE-RU-2020:3322-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3322 is not security or has no CVEs. patches: SUSE-2020-3322,SUSE-SLE-Module-Basesystem-15-SP2-2020-3322,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3322 SKIP SUSE-RU-2020:3323-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3323 is not security or has no CVEs. patches: SUSE-2020-3323,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3323,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3323 SKIP SUSE-RU-2020:3325-1 as SUSE-SLE-HA-12-SP5-2020-3325 is not security or has no CVEs. patches: SUSE-2020-3325,SUSE-SLE-HA-12-SP4-2020-3325,SUSE-SLE-HA-12-SP5-2020-3325 SKIP SUSE-RU-2020:3327-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3327 is not security or has no CVEs. patches: SUSE-2020-3327,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3327,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3327 SKIP SUSE-RU-2020:3328-1 as SUSE-SLE-Product-HA-15-SP2-2020-3328 is not security or has no CVEs. patches: SUSE-2020-3328,SUSE-SLE-Product-HA-15-SP1-2020-3328,SUSE-SLE-Product-HA-15-SP2-2020-3328 SKIP SUSE-RU-2020:3334-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3334 is not security or has no CVEs. patches: SUSE-2020-3334,SUSE-SLE-INSTALLER-15-SP2-2020-3334,SUSE-SLE-Module-Basesystem-15-SP2-2020-3334 SKIP SUSE-RU-2020:3335-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3335 is not security or has no CVEs. patches: SUSE-2020-3335,SUSE-SLE-Module-Basesystem-15-SP2-2020-3335 SKIP SUSE-RU-2020:3336-1 as SUSE-Storage-5-2020-3336 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3336,SUSE-2020-3336,SUSE-OpenStack-Cloud-8-2020-3336,SUSE-OpenStack-Cloud-9-2020-3336,SUSE-OpenStack-Cloud-Crowbar-8-2020-3336,SUSE-OpenStack-Cloud-Crowbar-9-2020-3336,SUSE-SLE-SAP-12-SP3-2020-3336,SUSE-SLE-SAP-12-SP4-2020-3336,SUSE-SLE-SERVER-12-SP3-2020-3336,SUSE-SLE-SERVER-12-SP3-BCL-2020-3336,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3336,SUSE-Storage-5-2020-3336 SKIP SUSE-RU-2020:3337-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3337 is not security or has no CVEs. patches: SUSE-2020-3337,SUSE-SLE-Module-Basesystem-15-SP2-2020-3337 SKIP SUSE-RU-2020:3338-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3338 is not security or has no CVEs. patches: SUSE-2020-3338,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3338 SKIP SUSE-RU-2020:3339-1 as SUSE-SLE-SERVER-12-SP5-2020-3339 is not security or has no CVEs. patches: SUSE-2020-3339,SUSE-SLE-SERVER-12-SP5-2020-3339 SKIP SUSE-RU-2020:3340-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-3340 is not security or has no CVEs. patches: SUSE-2020-3340,SUSE-OpenStack-Cloud-7-2020-3340,SUSE-SLE-SAP-12-SP2-2020-3340,SUSE-SLE-SERVER-12-SP2-2020-3340,SUSE-SLE-SERVER-12-SP2-BCL-2020-3340 SKIP SUSE-RU-2020:3341-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3341 is not security or has no CVEs. patches: SUSE-2020-3341,SUSE-SLE-INSTALLER-15-2020-3341,SUSE-SLE-Product-HPC-15-2020-3341,SUSE-SLE-Product-SLES-15-2020-3341,SUSE-SLE-Product-SLES_SAP-15-2020-3341 SKIP SUSE-RU-2020:3342-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3342 is not security or has no CVEs. patches: SUSE-2020-3342,SUSE-SLE-INSTALLER-15-SP2-2020-3342,SUSE-SLE-Module-Basesystem-15-SP2-2020-3342,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3342 SKIP SUSE-RU-2020:3344-1 as SUSE-SLE-SAP-12-SP5-2020-3344 is not security or has no CVEs. patches: SUSE-2020-3344,SUSE-SLE-SAP-12-SP2-2020-3344,SUSE-SLE-SAP-12-SP3-2020-3344,SUSE-SLE-SAP-12-SP4-2020-3344,SUSE-SLE-SAP-12-SP5-2020-3344 SKIP SUSE-RU-2020:3345-1 as SUSE-SLE-SAP-12-SP5-2020-3345 is not security or has no CVEs. patches: SUSE-2020-3345,SUSE-SLE-SAP-12-SP2-2020-3345,SUSE-SLE-SAP-12-SP3-2020-3345,SUSE-SLE-SAP-12-SP4-2020-3345,SUSE-SLE-SAP-12-SP5-2020-3345 SKIP SUSE-RU-2020:3346-1 as SUSE-Storage-5-2020-3346 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3346,SUSE-2020-3346,SUSE-OpenStack-Cloud-8-2020-3346,SUSE-OpenStack-Cloud-9-2020-3346,SUSE-OpenStack-Cloud-Crowbar-8-2020-3346,SUSE-OpenStack-Cloud-Crowbar-9-2020-3346,SUSE-SLE-SAP-12-SP3-2020-3346,SUSE-SLE-SAP-12-SP4-2020-3346,SUSE-SLE-SERVER-12-SP3-2020-3346,SUSE-SLE-SERVER-12-SP3-BCL-2020-3346,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3346,SUSE-SLE-SERVER-12-SP5-2020-3346,SUSE-Storage-5-2020-3346 SKIP SUSE-RU-2020:3355-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3355 is not security or has no CVEs. patches: SUSE-2020-3355,SUSE-SLE-Module-SAP-Applications-15-2020-3355,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3355 SKIP SUSE-RU-2020:3356-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3356 is not security or has no CVEs. patches: SUSE-2020-3356,SUSE-SLE-INSTALLER-15-SP2-2020-3356,SUSE-SLE-Module-Basesystem-15-SP2-2020-3356 SKIP SUSE-RU-2020:3357-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3357 is not security or has no CVEs. patches: SUSE-2020-3357,SUSE-SLE-Module-Basesystem-15-SP2-2020-3357,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3357 SKIP SUSE-RU-2020:3361-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-3361 is not security or has no CVEs. patches: SUSE-2020-3361,SUSE-OpenStack-Cloud-7-2020-3361,SUSE-SLE-SAP-12-SP2-2020-3361,SUSE-SLE-SERVER-12-SP2-2020-3361,SUSE-SLE-SERVER-12-SP2-BCL-2020-3361 SKIP SUSE-RU-2020:3363-1 as SUSE-SLE-SERVER-12-SP5-2020-3363 is not security or has no CVEs. patches: SUSE-2020-3363,SUSE-SLE-SERVER-12-SP5-2020-3363 SKIP SUSE-RU-2020:3364-1 as SUSE-SLE-SAP-12-SP5-2020-3364 is not security or has no CVEs. patches: SUSE-2020-3364,SUSE-SLE-SAP-12-SP3-2020-3364,SUSE-SLE-SAP-12-SP4-2020-3364,SUSE-SLE-SAP-12-SP5-2020-3364 SKIP SUSE-RU-2020:3365-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3365 is not security or has no CVEs. patches: SUSE-2020-3365,SUSE-SLE-Module-Basesystem-15-SP2-2020-3365 SKIP SUSE-RU-2020:3366-1 as SUSE-SLE-HA-12-SP3-2020-3366 is not security or has no CVEs. patches: SUSE-2020-3366,SUSE-SLE-HA-12-SP3-2020-3366 SKIP SUSE-RU-2020:3370-1 as SUSE-SLE-HA-12-SP5-2020-3370 is not security or has no CVEs. patches: SUSE-2020-3370,SUSE-SLE-HA-12-SP4-2020-3370,SUSE-SLE-HA-12-SP5-2020-3370 SKIP SUSE-RU-2020:3381-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3381 is not security or has no CVEs. patches: SUSE-2020-3381,SUSE-SLE-INSTALLER-15-SP1-2020-3381,SUSE-SLE-Module-Basesystem-15-SP1-2020-3381,SUSE-SLE-Module-Basesystem-15-SP2-2020-3381 SKIP SUSE-RU-2020:3381-2 as SUSE-SLE-Product-SLES_SAP-15-2020-3381 is not security or has no CVEs. patches: SUSE-2020-3381,SUSE-SLE-Product-HPC-15-2020-3381,SUSE-SLE-Product-SLES-15-2020-3381,SUSE-SLE-Product-SLES_SAP-15-2020-3381 SKIP SUSE-RU-2020:3382-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3382 is not security or has no CVEs. patches: SUSE-2020-3382,SUSE-SLE-Module-Basesystem-15-SP1-2020-3382,SUSE-SLE-Module-Basesystem-15-SP2-2020-3382 SKIP SUSE-RU-2020:3419-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3419 is not security or has no CVEs. patches: SUSE-2020-3419,SUSE-SLE-Module-Basesystem-15-SP1-2020-3419 SKIP SUSE-RU-2020:3420-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3420 is not security or has no CVEs. patches: SUSE-2020-3420,SUSE-SLE-Module-Basesystem-15-SP2-2020-3420 SKIP SUSE-RU-2020:3421-1 as SUSE-SLE-SERVER-12-SP5-2020-3421 is not security or has no CVEs. patches: SUSE-2020-3421,SUSE-SLE-SDK-12-SP5-2020-3421,SUSE-SLE-SERVER-12-SP5-2020-3421 SKIP SUSE-RU-2020:3422-1 as SUSE-SLE-HA-12-SP5-2020-3422 is not security or has no CVEs. patches: SUSE-2020-3422,SUSE-SLE-HA-12-SP4-2020-3422,SUSE-SLE-HA-12-SP5-2020-3422 SKIP SUSE-RU-2020:3450-1 as SUSE-SLE-Product-HA-15-SP2-2020-3450 is not security or has no CVEs. patches: SUSE-2020-3450,SUSE-SLE-Product-HA-15-SP1-2020-3450,SUSE-SLE-Product-HA-15-SP2-2020-3450 SKIP SUSE-RU-2020:3451-1 as SUSE-SLE-Product-HA-15-2020-3451 is not security or has no CVEs. patches: SUSE-2020-3451,SUSE-SLE-Product-HA-15-2020-3451 SKIP SUSE-RU-2020:3452-1 as SUSE-SLE-Module-Web-Scripting-15-SP2-2020-3452 is not security or has no CVEs. patches: SUSE-2020-3452,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-3452 SKIP SUSE-RU-2020:3453-1 as SUSE-SLE-Module-Web-Scripting-15-SP1-2020-3453 is not security or has no CVEs. patches: SUSE-2020-3453,SUSE-SLE-Module-Web-Scripting-15-SP1-2020-3453 SKIP SUSE-RU-2020:3454-1 as SUSE-SLE-SERVER-12-SP5-2020-3454 is not security or has no CVEs. patches: SUSE-2020-3454,SUSE-SLE-SERVER-12-SP5-2020-3454 SKIP SUSE-RU-2020:3461-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3461 is not security or has no CVEs. patches: SUSE-2020-3461,SUSE-SLE-Module-Basesystem-15-SP1-2020-3461,SUSE-SLE-Module-Basesystem-15-SP2-2020-3461,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3461,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3461 SKIP SUSE-RU-2020:3462-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3462 is not security or has no CVEs. patches: SUSE-2020-3462,SUSE-SLE-Module-Basesystem-15-SP1-2020-3462,SUSE-SLE-Module-Basesystem-15-SP2-2020-3462,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3462,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3462 SKIP SUSE-RU-2020:3465-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-3465 is not security or has no CVEs. patches: SUSE-2020-3465,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2020-3465,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2020-3465,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2020-3465 SKIP SUSE-RU-2020:3466-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-3466 is not security or has no CVEs. patches: SUSE-2020-3466,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-3466 SKIP SUSE-RU-2020:3467-1 as SUSE-SLE-SDK-12-SP5-2020-3467 is not security or has no CVEs. patches: SUSE-2020-3467,SUSE-SLE-HA-12-SP3-2020-3467,SUSE-SLE-HA-12-SP4-2020-3467,SUSE-SLE-HA-12-SP5-2020-3467,SUSE-SLE-SDK-12-SP5-2020-3467 SKIP SUSE-RU-2020:3468-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3468 is not security or has no CVEs. patches: SUSE-2020-3468,SUSE-SLE-Module-Basesystem-15-SP2-2020-3468,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3468 SKIP SUSE-RU-2020:3469-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3469 is not security or has no CVEs. patches: SUSE-2020-3469,SUSE-SLE-Product-HPC-15-2020-3469,SUSE-SLE-Product-SLES-15-2020-3469,SUSE-SLE-Product-SLES_SAP-15-2020-3469 SKIP SUSE-RU-2020:3470-1 as SUSE-SLE-Product-HA-15-SP2-2020-3470 is not security or has no CVEs. patches: SUSE-2020-3470,SUSE-SLE-Product-HA-15-2020-3470,SUSE-SLE-Product-HA-15-SP1-2020-3470,SUSE-SLE-Product-HA-15-SP2-2020-3470 SKIP SUSE-RU-2020:3472-1 as SUSE-SLE-Product-HA-15-2020-3472 is not security or has no CVEs. patches: SUSE-2020-3472,SUSE-SLE-Product-HA-15-2020-3472 SKIP SUSE-RU-2020:3475-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3475 is not security or has no CVEs. patches: SUSE-2020-3475,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3475 SKIP SUSE-RU-2020:3479-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3479 is not security or has no CVEs. patches: SUSE-2020-3479,SUSE-SLE-Module-Basesystem-15-SP2-2020-3479 SKIP SUSE-RU-2020:3482-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3482 is not security or has no CVEs. patches: SUSE-2020-3482,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3482 SKIP SUSE-RU-2020:3485-1 as SUSE-SLE-Product-HA-15-SP1-2020-3485 is not security or has no CVEs. patches: SUSE-2020-3485,SUSE-SLE-Module-Basesystem-15-SP1-2020-3485,SUSE-SLE-Product-HA-15-SP1-2020-3485 SKIP SUSE-RU-2020:3486-1 as SUSE-SLE-Product-HA-15-SP2-2020-3486 is not security or has no CVEs. patches: SUSE-2020-3486,SUSE-SLE-Product-HA-15-SP2-2020-3486 SKIP SUSE-RU-2020:3487-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3487 is not security or has no CVEs. patches: SUSE-2020-3487,SUSE-SLE-Module-Basesystem-15-SP2-2020-3487 SKIP SUSE-RU-2020:3488-1 as SUSE-SLE-Product-HA-15-SP2-2020-3488 is not security or has no CVEs. patches: SUSE-2020-3488,SUSE-SLE-Product-HA-15-SP1-2020-3488,SUSE-SLE-Product-HA-15-SP2-2020-3488 SKIP SUSE-RU-2020:3489-1 as SUSE-SLE-SERVER-12-SP5-2020-3489 is not security or has no CVEs. patches: SUSE-2020-3489,SUSE-SLE-SDK-12-SP5-2020-3489,SUSE-SLE-SERVER-12-SP5-2020-3489 SKIP SUSE-RU-2020:3493-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3493 is not security or has no CVEs. patches: SUSE-2020-3493,SUSE-SLE-Module-Basesystem-15-SP1-2020-3493 SKIP SUSE-RU-2020:3494-1 as SUSE-SLE-SERVER-12-SP5-2020-3494 is not security or has no CVEs. patches: SUSE-2020-3494,SUSE-SLE-SERVER-12-SP5-2020-3494 SKIP SUSE-RU-2020:3496-1 as SUSE-SLE-SERVER-12-SP5-2020-3496 is not security or has no CVEs. patches: SUSE-2020-3496,SUSE-SLE-HA-12-SP5-2020-3496,SUSE-SLE-SDK-12-SP5-2020-3496,SUSE-SLE-SERVER-12-SP5-2020-3496 SKIP SUSE-RU-2020:3498-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3498 is not security or has no CVEs. patches: SUSE-2020-3498,SUSE-SLE-Module-Basesystem-15-SP2-2020-3498 SKIP SUSE-RU-2020:3508-1 as SUSE-SLE-Module-Toolchain-12-2020-3508 is not security or has no CVEs. patches: SUSE-2020-3508,SUSE-SLE-Module-Toolchain-12-2020-3508 SKIP SUSE-RU-2020:3509-1 as SUSE-Storage-7-2020-3509 is not security or has no CVEs. patches: SUSE-2020-3509,SUSE-Storage-7-2020-3509 SKIP SUSE-RU-2020:3510-1 as SUSE-Storage-7-2020-3510 is not security or has no CVEs. patches: SUSE-2020-3510,SUSE-Storage-7-2020-3510 SKIP SUSE-RU-2020:3511-1 as SUSE-SLE-Product-HA-15-2020-3511 is not security or has no CVEs. patches: SUSE-2020-3511,SUSE-SLE-Product-HA-15-2020-3511 SKIP SUSE-RU-2020:3517-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3517 is not security or has no CVEs. patches: SUSE-2020-3517,SUSE-SLE-Module-Basesystem-15-SP2-2020-3517 SKIP SUSE-RU-2020:3518-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3518 is not security or has no CVEs. patches: SUSE-2020-3518,SUSE-SLE-Module-SAP-Applications-15-2020-3518,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3518 SKIP SUSE-RU-2020:3519-1 as SUSE-SLE-Product-HA-15-SP1-2020-3519 is not security or has no CVEs. patches: SUSE-2020-3519,SUSE-SLE-Product-HA-15-SP1-2020-3519 SKIP SUSE-RU-2020:3520-1 as SUSE-SLE-Product-HA-15-SP2-2020-3520 is not security or has no CVEs. patches: SUSE-2020-3520,SUSE-SLE-Product-HA-15-SP2-2020-3520 SKIP SUSE-RU-2020:3521-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3521 is not security or has no CVEs. patches: SUSE-2020-3521,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3521 SKIP SUSE-RU-2020:3523-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3523 is not security or has no CVEs. patches: SUSE-2020-3523,SUSE-SLE-Product-HPC-15-2020-3523,SUSE-SLE-Product-SLES_SAP-15-2020-3523 SKIP SUSE-RU-2020:3524-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3524 is not security or has no CVEs. patches: SUSE-2020-3524,SUSE-SLE-Module-Basesystem-15-SP1-2020-3524 SKIP SUSE-RU-2020:3525-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3525 is not security or has no CVEs. patches: SUSE-2020-3525,SUSE-SLE-Module-Basesystem-15-SP2-2020-3525 SKIP SUSE-RU-2020:3526-1 as SUSE-SLE-SERVER-12-SP5-2020-3526 is not security or has no CVEs. patches: SUSE-2020-3526,SUSE-OpenStack-Cloud-9-2020-3526,SUSE-OpenStack-Cloud-Crowbar-9-2020-3526,SUSE-SLE-SAP-12-SP4-2020-3526,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3526,SUSE-SLE-SERVER-12-SP5-2020-3526 SKIP SUSE-RU-2020:3527-1 as SUSE-SLE-Module-Public-Cloud-12-2020-3527 is not security or has no CVEs. patches: SUSE-2020-3527,SUSE-SLE-Module-Public-Cloud-12-2020-3527 SKIP SUSE-RU-2020:3533-1 as SUSE-SLE-Module-Web-Scripting-15-SP2-2020-3533 is not security or has no CVEs. patches: SUSE-2020-3533,SUSE-SLE-Module-Web-Scripting-15-SP2-2020-3533 SKIP SUSE-RU-2020:3534-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3534 is not security or has no CVEs. patches: SUSE-2020-3534,SUSE-SLE-Module-Basesystem-15-SP2-2020-3534 SKIP SUSE-RU-2020:3535-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3535 is not security or has no CVEs. patches: SUSE-2020-3535,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3535,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3535 SKIP SUSE-RU-2020:3536-1 as SUSE-SLE-SERVER-12-SP5-2020-3536 is not security or has no CVEs. patches: SUSE-2020-3536,SUSE-SLE-SERVER-12-SP5-2020-3536 SKIP SUSE-RU-2020:3538-1 as SUSE-SLE-SERVER-12-SP5-2020-3538 is not security or has no CVEs. patches: SUSE-2020-3538,SUSE-SLE-SERVER-12-SP5-2020-3538 SKIP SUSE-RU-2020:3538-2 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-3538 is not security or has no CVEs. patches: SUSE-2020-3538,SUSE-OpenStack-Cloud-9-2020-3538,SUSE-OpenStack-Cloud-Crowbar-9-2020-3538,SUSE-SLE-SAP-12-SP4-2020-3538,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3538 SKIP SUSE-RU-2020:3540-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3540 is not security or has no CVEs. patches: SUSE-2020-3540,SUSE-SLE-Module-Basesystem-15-SP2-2020-3540 SKIP SUSE-RU-2020:3541-1 as SUSE-SLE-SERVER-12-SP5-2020-3541 is not security or has no CVEs. patches: SUSE-2020-3541,SUSE-SLE-Module-Public-Cloud-12-2020-3541,SUSE-SLE-SERVER-12-SP5-2020-3541 SKIP SUSE-RU-2020:3542-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3542 is not security or has no CVEs. patches: SUSE-2020-3542,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3542,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3542 SKIP SUSE-RU-2020:3543-1 as SUSE-SLE-Product-WE-15-SP2-2020-3543 is not security or has no CVEs. patches: SUSE-2020-3543,SUSE-SLE-Product-WE-15-SP2-2020-3543 ERROR: notice SUSE-RU-2020:3545-1 has no valid patches out of: SUSE-2020-3545,SUSE-SLE-SAP-12-SP3-2020-3545,SUSE-SLE-SAP-12-SP4-2020-3545,SUSE-SLE-SAP-12-SP5-2020-3545 SKIP SUSE-RU-2020:3546-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3546 is not security or has no CVEs. patches: SUSE-2020-3546,SUSE-SLE-Module-Basesystem-15-SP1-2020-3546 SKIP SUSE-RU-2020:3547-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3547 is not security or has no CVEs. patches: SUSE-2020-3547,SUSE-SLE-Module-Basesystem-15-SP2-2020-3547 SKIP SUSE-RU-2020:3553-1 as SUSE-SLE-Product-HA-15-SP1-2020-3553 is not security or has no CVEs. patches: SUSE-2020-3553,SUSE-SLE-Product-HA-15-SP1-2020-3553 SKIP SUSE-RU-2020:3554-1 as SUSE-SLE-HA-12-SP5-2020-3554 is not security or has no CVEs. patches: SUSE-2020-3554,SUSE-SLE-HA-12-SP4-2020-3554,SUSE-SLE-HA-12-SP5-2020-3554 SKIP SUSE-RU-2020:3555-1 as SUSE-SLE-Product-HA-15-SP2-2020-3555 is not security or has no CVEs. patches: SUSE-2020-3555,SUSE-SLE-Product-HA-15-SP2-2020-3555 SKIP SUSE-RU-2020:3556-1 as SUSE-SLE-Product-HA-15-2020-3556 is not security or has no CVEs. patches: SUSE-2020-3556,SUSE-SLE-Product-HA-15-2020-3556 SKIP SUSE-RU-2020:3557-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3557 is not security or has no CVEs. patches: SUSE-2020-3557,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3557 SKIP SUSE-RU-2020:3558-1 as SUSE-SLE-SERVER-12-SP5-2020-3558 is not security or has no CVEs. patches: SUSE-2020-3558,SUSE-OpenStack-Cloud-9-2020-3558,SUSE-OpenStack-Cloud-Crowbar-9-2020-3558,SUSE-SLE-SAP-12-SP4-2020-3558,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3558,SUSE-SLE-SERVER-12-SP5-2020-3558 SKIP SUSE-RU-2020:3559-1 as SUSE-SLE-Live-Patching-12-SP5-2020-3559 is not security or has no CVEs. patches: SUSE-2020-3559,SUSE-SLE-Live-Patching-12-2020-3559,SUSE-SLE-Live-Patching-12-SP3-2020-3559,SUSE-SLE-Live-Patching-12-SP4-2020-3559,SUSE-SLE-Live-Patching-12-SP5-2020-3559 SKIP SUSE-RU-2020:3560-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3560 is not security or has no CVEs. patches: SUSE-2020-3560,SUSE-SLE-Module-Basesystem-15-SP1-2020-3560 SKIP SUSE-RU-2020:3569-1 as SUSE-SLE-SERVER-12-SP5-2020-3569 is not security or has no CVEs. patches: SUSE-2020-3569,SUSE-SLE-SDK-12-SP5-2020-3569,SUSE-SLE-SERVER-12-SP5-2020-3569 SKIP SUSE-RU-2020:3570-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3570 is not security or has no CVEs. patches: SUSE-2020-3570,SUSE-SLE-Module-Basesystem-15-SP2-2020-3570,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3570 SKIP SUSE-RU-2020:3571-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3571 is not security or has no CVEs. patches: SUSE-2020-3571,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3571 SKIP SUSE-RU-2020:3572-1 as SUSE-SLE-Product-HA-15-SP1-2020-3572 is not security or has no CVEs. patches: SUSE-2020-3572,SUSE-SLE-Module-Basesystem-15-SP1-2020-3572,SUSE-SLE-Product-HA-15-SP1-2020-3572 SKIP SUSE-RU-2020:3573-1 as SUSE-SLE-SERVER-12-SP5-2020-3573 is not security or has no CVEs. patches: SUSE-2020-3573,SUSE-SLE-SDK-12-SP5-2020-3573,SUSE-SLE-SERVER-12-SP5-2020-3573 SKIP SUSE-RU-2020:3574-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3574 is not security or has no CVEs. patches: SUSE-2020-3574,SUSE-SLE-Module-Basesystem-15-SP2-2020-3574,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3574 SKIP SUSE-RU-2020:3575-1 as SUSE-SLE-SERVER-12-SP5-2020-3575 is not security or has no CVEs. patches: SUSE-2020-3575,SUSE-OpenStack-Cloud-9-2020-3575,SUSE-OpenStack-Cloud-Crowbar-9-2020-3575,SUSE-SLE-HA-12-SP4-2020-3575,SUSE-SLE-HA-12-SP5-2020-3575,SUSE-SLE-SAP-12-SP4-2020-3575,SUSE-SLE-SDK-12-SP5-2020-3575,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3575,SUSE-SLE-SERVER-12-SP5-2020-3575 SKIP SUSE-RU-2020:3576-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2020-3576 is not security or has no CVEs. patches: SUSE-2020-3576,SUSE-SLE-Module-Live-Patching-15-2020-3576,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3576,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3576 SKIP SUSE-RU-2020:3577-1 as SUSE-SLE-Module-Public-Cloud-12-2020-3577 is not security or has no CVEs. patches: SUSE-2020-3577,SUSE-SLE-Module-Public-Cloud-12-2020-3577 SKIP SUSE-RU-2020:3578-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3578 is not security or has no CVEs. patches: SUSE-2020-3578,SUSE-SLE-Module-Basesystem-15-SP2-2020-3578 SKIP SUSE-RU-2020:3579-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3579 is not security or has no CVEs. patches: SUSE-2020-3579,SUSE-SLE-Module-Basesystem-15-SP1-2020-3579 SKIP SUSE-RU-2020:3580-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3580 is not security or has no CVEs. patches: SUSE-2020-3580,SUSE-SLE-Module-Basesystem-15-SP2-2020-3580 SKIP SUSE-RU-2020:3581-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3581 is not security or has no CVEs. patches: SUSE-2020-3581,SUSE-SLE-Module-Basesystem-15-SP1-2020-3581,SUSE-SLE-Module-Basesystem-15-SP2-2020-3581,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3581,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3581 SKIP SUSE-RU-2020:3590-1 as SUSE-SLE-Product-HA-15-SP2-2020-3590 is not security or has no CVEs. patches: SUSE-2020-3590,SUSE-SLE-Product-HA-15-2020-3590,SUSE-SLE-Product-HA-15-SP1-2020-3590,SUSE-SLE-Product-HA-15-SP2-2020-3590 SKIP SUSE-RU-2020:3601-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3601 is not security or has no CVEs. patches: SUSE-2020-3601,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-3601,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3601 SKIP SUSE-RU-2020:3602-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-3602 is not security or has no CVEs. patches: SUSE-2020-3602,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2020-3602,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-3602 SKIP SUSE-RU-2020:3603-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3603 is not security or has no CVEs. patches: SUSE-2020-3603,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3603 SKIP SUSE-RU-2020:3604-1 as SUSE-SLE-SERVER-12-SP5-2020-3604 is not security or has no CVEs. patches: SUSE-2020-3604,SUSE-OpenStack-Cloud-9-2020-3604,SUSE-OpenStack-Cloud-Crowbar-9-2020-3604,SUSE-SLE-SAP-12-SP4-2020-3604,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3604,SUSE-SLE-SERVER-12-SP5-2020-3604 SKIP SUSE-RU-2020:3605-1 as SUSE-SLE-Module-HPC-15-SP1-2020-3605 is not security or has no CVEs. patches: SUSE-2020-3605,SUSE-SLE-Module-HPC-15-SP1-2020-3605 SKIP SUSE-RU-2020:3606-1 as SUSE-SLE-Module-HPC-15-SP2-2020-3606 is not security or has no CVEs. patches: SUSE-2020-3606,SUSE-SLE-Module-HPC-15-SP2-2020-3606 SKIP SUSE-RU-2020:3607-1 as SUSE-SLE-Module-Public-Cloud-12-2020-3607 is not security or has no CVEs. patches: SUSE-2020-3607,SUSE-SLE-Module-Public-Cloud-12-2020-3607 SKIP SUSE-RU-2020:3608-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3608 is not security or has no CVEs. patches: SUSE-2020-3608,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3608,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3608 SKIP SUSE-RU-2020:3609-1 as SUSE-SLE-Module-Public-Cloud-15-2020-3609 is not security or has no CVEs. patches: SUSE-2020-3609,SUSE-SLE-Module-Public-Cloud-15-2020-3609 SKIP SUSE-RU-2020:3610-1 as SUSE-Storage-5-2020-3610 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3610,SUSE-2020-3610,SUSE-OpenStack-Cloud-7-2020-3610,SUSE-OpenStack-Cloud-8-2020-3610,SUSE-OpenStack-Cloud-9-2020-3610,SUSE-OpenStack-Cloud-Crowbar-8-2020-3610,SUSE-OpenStack-Cloud-Crowbar-9-2020-3610,SUSE-SLE-SAP-12-SP2-2020-3610,SUSE-SLE-SAP-12-SP3-2020-3610,SUSE-SLE-SAP-12-SP4-2020-3610,SUSE-SLE-SERVER-12-SP2-2020-3610,SUSE-SLE-SERVER-12-SP2-BCL-2020-3610,SUSE-SLE-SERVER-12-SP3-2020-3610,SUSE-SLE-SERVER-12-SP3-BCL-2020-3610,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3610,SUSE-SLE-SERVER-12-SP5-2020-3610,SUSE-Storage-5-2020-3610 SKIP SUSE-RU-2020:3616-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3616 is not security or has no CVEs. patches: SUSE-2020-3616,SUSE-SLE-Module-Basesystem-15-SP1-2020-3616,SUSE-SLE-Module-Basesystem-15-SP2-2020-3616,SUSE-SLE-Module-Basesystem-15-SP3-2020-3616,SUSE-SLE-Product-HPC-15-2020-3616,SUSE-SLE-Product-SLES-15-2020-3616,SUSE-SLE-Product-SLES_SAP-15-2020-3616 SKIP SUSE-RU-2020:3617-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3617 is not security or has no CVEs. patches: SUSE-2020-3617,SUSE-SLE-Module-Basesystem-15-SP2-2020-3617 SKIP SUSE-RU-2020:3617-2 as SUSE-SLE-INSTALLER-15-SP2-2020-3617 is not security or has no CVEs. patches: SUSE-2020-3617,SUSE-SLE-INSTALLER-15-SP2-2020-3617 SKIP SUSE-RU-2020:3618-1 as SUSE-SLE-SERVER-12-SP5-2020-3618 is not security or has no CVEs. patches: SUSE-2020-3618,SUSE-SLE-SDK-12-SP5-2020-3618,SUSE-SLE-SERVER-12-SP5-2020-3618 SKIP SUSE-RU-2020:3619-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3619 is not security or has no CVEs. patches: SUSE-2020-3619,SUSE-SLE-Module-Public-Cloud-15-2020-3619,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3619,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3619 SKIP SUSE-RU-2020:3620-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3620 is not security or has no CVEs. patches: SUSE-2020-3620,SUSE-SLE-Module-Basesystem-15-SP1-2020-3620,SUSE-SLE-Module-Basesystem-15-SP2-2020-3620,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3620,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3620 SKIP SUSE-RU-2020:3621-1 as SUSE-SLE-WE-12-SP5-2020-3621 is not security or has no CVEs. patches: SUSE-2020-3621,SUSE-SLE-SDK-12-SP5-2020-3621,SUSE-SLE-SERVER-12-SP5-2020-3621,SUSE-SLE-WE-12-SP5-2020-3621 SKIP SUSE-RU-2020:3621-2 as SUSE-Storage-5-2020-3621 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3621,SUSE-2020-3621,SUSE-OpenStack-Cloud-7-2020-3621,SUSE-OpenStack-Cloud-8-2020-3621,SUSE-OpenStack-Cloud-9-2020-3621,SUSE-OpenStack-Cloud-Crowbar-8-2020-3621,SUSE-OpenStack-Cloud-Crowbar-9-2020-3621,SUSE-SLE-SAP-12-SP2-2020-3621,SUSE-SLE-SAP-12-SP3-2020-3621,SUSE-SLE-SAP-12-SP4-2020-3621,SUSE-SLE-SERVER-12-SP2-2020-3621,SUSE-SLE-SERVER-12-SP2-BCL-2020-3621,SUSE-SLE-SERVER-12-SP3-2020-3621,SUSE-SLE-SERVER-12-SP3-BCL-2020-3621,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3621,SUSE-Storage-5-2020-3621 ERROR: notice SUSE-RU-2020:3622-1 has no valid patches out of: SUSE-2020-3622,SUSE-SLE-SERVER-12-SP5-2020-3622 SKIP SUSE-RU-2020:3622-2 as SUSE-Storage-5-2021-33 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-33,SUSE-2020-3622,SUSE-OpenStack-Cloud-7-2021-33,SUSE-OpenStack-Cloud-8-2021-33,SUSE-OpenStack-Cloud-9-2021-33,SUSE-OpenStack-Cloud-Crowbar-8-2021-33,SUSE-OpenStack-Cloud-Crowbar-9-2021-33,SUSE-SLE-SAP-12-SP2-2021-33,SUSE-SLE-SAP-12-SP3-2021-33,SUSE-SLE-SAP-12-SP4-2021-33,SUSE-SLE-SERVER-12-SP2-2021-33,SUSE-SLE-SERVER-12-SP2-BCL-2021-33,SUSE-SLE-SERVER-12-SP3-2021-33,SUSE-SLE-SERVER-12-SP3-BCL-2021-33,SUSE-SLE-SERVER-12-SP4-LTSS-2021-33,SUSE-Storage-5-2021-33 SKIP SUSE-RU-2020:3623-1 as SUSE-SLE-Module-Web-Scripting-12-2020-3623 is not security or has no CVEs. patches: SUSE-2020-3623,SUSE-SLE-Module-Web-Scripting-12-2020-3623 SKIP SUSE-RU-2020:3626-1 as SUSE-SLE-Module-Python2-15-SP2-2020-3626 is not security or has no CVEs. patches: SUSE-2020-3626,SUSE-SLE-Module-Basesystem-15-SP2-2020-3626,SUSE-SLE-Module-Python2-15-SP2-2020-3626 SKIP SUSE-RU-2020:3633-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3633 is not security or has no CVEs. patches: SUSE-2020-3633,SUSE-SLE-Module-Basesystem-15-SP1-2020-3633,SUSE-SLE-Module-Basesystem-15-SP2-2020-3633,SUSE-SLE-Product-HPC-15-2020-3633,SUSE-SLE-Product-SLES-15-2020-3633,SUSE-SLE-Product-SLES_SAP-15-2020-3633 SKIP SUSE-RU-2020:3634-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2020-3634 is not security or has no CVEs. patches: SUSE-2020-3634,SUSE-SLE-INSTALLER-15-SP2-2020-3634,SUSE-SLE-Product-SLES_SAP-15-SP2-2020-3634 SKIP SUSE-RU-2020:3636-1 as SUSE-SLE-HA-12-SP5-2020-3636 is not security or has no CVEs. patches: SUSE-2020-3636,SUSE-SLE-HA-12-SP4-2020-3636,SUSE-SLE-HA-12-SP5-2020-3636 SKIP SUSE-RU-2020:3637-1 as SUSE-SLE-Product-HA-15-2020-3637 is not security or has no CVEs. patches: SUSE-2020-3637,SUSE-SLE-Product-HA-15-2020-3637 SKIP SUSE-RU-2020:3639-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3639 is not security or has no CVEs. patches: SUSE-2020-3639,SUSE-SLE-INSTALLER-15-SP1-2020-3639,SUSE-SLE-Module-Basesystem-15-SP1-2020-3639 SKIP SUSE-RU-2020:3640-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3640 is not security or has no CVEs. patches: SUSE-2020-3640,SUSE-SLE-Module-Basesystem-15-SP1-2020-3640,SUSE-SLE-Module-Basesystem-15-SP2-2020-3640,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3640,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3640,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3640,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3640 SKIP SUSE-RU-2020:3643-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3643 is not security or has no CVEs. patches: SUSE-2020-3643,SUSE-SLE-Product-HPC-15-2020-3643,SUSE-SLE-Product-SLES-15-2020-3643,SUSE-SLE-Product-SLES_SAP-15-2020-3643 SKIP SUSE-RU-2020:3699-1 as SUSE-Storage-5-2020-3699 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3699,SUSE-2020-3699,SUSE-OpenStack-Cloud-7-2020-3699,SUSE-OpenStack-Cloud-8-2020-3699,SUSE-OpenStack-Cloud-9-2020-3699,SUSE-OpenStack-Cloud-Crowbar-8-2020-3699,SUSE-OpenStack-Cloud-Crowbar-9-2020-3699,SUSE-SLE-SAP-12-SP2-2020-3699,SUSE-SLE-SAP-12-SP3-2020-3699,SUSE-SLE-SAP-12-SP4-2020-3699,SUSE-SLE-SDK-12-SP5-2020-3699,SUSE-SLE-SERVER-12-SP2-2020-3699,SUSE-SLE-SERVER-12-SP2-BCL-2020-3699,SUSE-SLE-SERVER-12-SP3-2020-3699,SUSE-SLE-SERVER-12-SP3-BCL-2020-3699,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3699,SUSE-SLE-SERVER-12-SP5-2020-3699,SUSE-Storage-5-2020-3699 SKIP SUSE-RU-2020:3700-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3700 is not security or has no CVEs. patches: SUSE-2020-3700,SUSE-SLE-Module-Basesystem-15-SP1-2020-3700,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3700,SUSE-SLE-Product-HPC-15-2020-3700,SUSE-SLE-Product-SLES-15-2020-3700,SUSE-SLE-Product-SLES_SAP-15-2020-3700 SKIP SUSE-RU-2020:3701-1 as SUSE-SLE-Product-WE-15-SP2-2020-3701 is not security or has no CVEs. patches: SUSE-2020-3701,SUSE-SLE-Module-Basesystem-15-SP2-2020-3701,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3701,SUSE-SLE-Product-WE-15-SP2-2020-3701 SKIP SUSE-RU-2020:3702-1 as SUSE-SLE-SERVER-12-SP5-2020-3702 is not security or has no CVEs. patches: SUSE-2020-3702,SUSE-SLE-SDK-12-SP5-2020-3702,SUSE-SLE-SERVER-12-SP5-2020-3702 SKIP SUSE-RU-2020:3703-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3703 is not security or has no CVEs. patches: SUSE-2020-3703,SUSE-SLE-Module-Basesystem-15-SP1-2020-3703,SUSE-SLE-Module-Basesystem-15-SP2-2020-3703,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3703,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3703,SUSE-SLE-Product-SLES-15-2020-3703,SUSE-SLE-Product-SLES_SAP-15-2020-3703 SKIP SUSE-RU-2020:3704-1 as SUSE-Storage-7-2020-3704 is not security or has no CVEs. patches: SUSE-2020-3704,SUSE-Storage-7-2020-3704 SKIP SUSE-RU-2020:3708-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3708 is not security or has no CVEs. patches: SUSE-2020-3708,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3708,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3708 SKIP SUSE-RU-2020:3710-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-3710 is not security or has no CVEs. patches: SUSE-2020-3710,SUSE-OpenStack-Cloud-9-2020-3710,SUSE-OpenStack-Cloud-Crowbar-9-2020-3710,SUSE-SLE-SAP-12-SP4-2020-3710,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3710 SKIP SUSE-RU-2020:3711-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3711 is not security or has no CVEs. patches: SUSE-2020-3711,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3711 SKIP SUSE-RU-2020:3724-1 as SUSE-SLE-SERVER-12-SP5-2020-3724 is not security or has no CVEs. patches: SUSE-2020-3724,SUSE-SLE-SDK-12-SP5-2020-3724,SUSE-SLE-SERVER-12-SP5-2020-3724 SKIP SUSE-RU-2020:3725-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3725 is not security or has no CVEs. patches: SUSE-2020-3725,SUSE-SLE-Module-Basesystem-15-SP1-2020-3725,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3725 SKIP SUSE-RU-2020:3726-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3726 is not security or has no CVEs. patches: SUSE-2020-3726,SUSE-SLE-Module-Basesystem-15-SP2-2020-3726,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3726 SKIP SUSE-RU-2020:3727-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3727 is not security or has no CVEs. patches: SUSE-2020-3727,SUSE-SLE-Module-Basesystem-15-SP1-2020-3727 SKIP SUSE-RU-2020:3728-1 as SUSE-SLE-SERVER-12-SP5-2020-3728 is not security or has no CVEs. patches: SUSE-2020-3728,SUSE-SLE-SERVER-12-SP5-2020-3728 SKIP SUSE-RU-2020:3731-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3731 is not security or has no CVEs. patches: SUSE-2020-3731,SUSE-SLE-Module-Basesystem-15-SP2-2020-3731 SKIP SUSE-RU-2020:3738-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3738 is not security or has no CVEs. patches: SUSE-2020-3738,SUSE-SLE-Product-HPC-15-2020-3738,SUSE-SLE-Product-SLES_SAP-15-2020-3738 SKIP SUSE-RU-2020:3741-1 as SUSE-Storage-7-2020-3741 is not security or has no CVEs. patches: SUSE-2020-3741,SUSE-SLE-Module-Basesystem-15-SP2-2020-3741,SUSE-Storage-7-2020-3741 SKIP SUSE-RU-2020:3743-1 as SUSE-Storage-5-2020-3743 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3743,SUSE-2020-3743,SUSE-OpenStack-Cloud-7-2020-3743,SUSE-OpenStack-Cloud-8-2020-3743,SUSE-OpenStack-Cloud-9-2020-3743,SUSE-OpenStack-Cloud-Crowbar-8-2020-3743,SUSE-OpenStack-Cloud-Crowbar-9-2020-3743,SUSE-SLE-SAP-12-SP2-2020-3743,SUSE-SLE-SAP-12-SP3-2020-3743,SUSE-SLE-SAP-12-SP4-2020-3743,SUSE-SLE-SERVER-12-SP2-2020-3743,SUSE-SLE-SERVER-12-SP2-BCL-2020-3743,SUSE-SLE-SERVER-12-SP3-2020-3743,SUSE-SLE-SERVER-12-SP3-BCL-2020-3743,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3743,SUSE-Storage-5-2020-3743 SKIP SUSE-RU-2020:3744-1 as SUSE-SLE-Product-WE-15-SP2-2020-3744 is not security or has no CVEs. patches: SUSE-2020-3744,SUSE-SLE-Product-WE-15-SP1-2020-3744,SUSE-SLE-Product-WE-15-SP2-2020-3744 SKIP SUSE-RU-2020:3746-1 as SUSE-SLE-SERVER-12-SP5-2020-3746 is not security or has no CVEs. patches: SUSE-2020-3746,SUSE-SLE-SERVER-12-SP5-2020-3746 SKIP SUSE-RU-2020:3750-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3750 is not security or has no CVEs. patches: SUSE-2020-3750,SUSE-SLE-Module-Basesystem-15-SP1-2020-3750,SUSE-SLE-Module-Basesystem-15-SP2-2020-3750 SKIP SUSE-RU-2020:3751-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3751 is not security or has no CVEs. patches: SUSE-2020-3751,SUSE-SLE-Module-Basesystem-15-SP1-2020-3751 SKIP SUSE-RU-2020:3752-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3752 is not security or has no CVEs. patches: SUSE-2020-3752,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3752 SKIP SUSE-RU-2020:3753-1 as SUSE-SLE-Product-HA-15-SP2-2020-3753 is not security or has no CVEs. patches: SUSE-2020-3753,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-3753,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3753,SUSE-SLE-Product-HA-15-SP1-2020-3753,SUSE-SLE-Product-HA-15-SP2-2020-3753 SKIP SUSE-RU-2020:3754-1 as SUSE-SLE-WE-12-SP5-2020-3754 is not security or has no CVEs. patches: SUSE-2020-3754,SUSE-SLE-SDK-12-SP5-2020-3754,SUSE-SLE-WE-12-SP5-2020-3754 SKIP SUSE-RU-2020:3756-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3756 is not security or has no CVEs. patches: SUSE-2020-3756,SUSE-SLE-Module-Basesystem-15-SP2-2020-3756 SKIP SUSE-RU-2020:3757-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3757 is not security or has no CVEs. patches: SUSE-2020-3757,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3757,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3757 SKIP SUSE-RU-2020:3758-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3758 is not security or has no CVEs. patches: SUSE-2020-3758,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3758,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3758 SKIP SUSE-RU-2020:3770-1 as SUSE-SLE-SDK-12-SP5-2020-3770 is not security or has no CVEs. patches: SUSE-2020-3770,SUSE-SLE-SDK-12-SP5-2020-3770 SKIP SUSE-RU-2020:3771-1 as SUSE-SLE-HA-12-SP5-2020-3771 is not security or has no CVEs. patches: SUSE-2020-3771,SUSE-SLE-HA-12-SP4-2020-3771,SUSE-SLE-HA-12-SP5-2020-3771 SKIP SUSE-RU-2020:3772-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3772 is not security or has no CVEs. patches: SUSE-2020-3772,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3772 SKIP SUSE-RU-2020:3773-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3773 is not security or has no CVEs. patches: SUSE-2020-3773,SUSE-SLE-Module-Basesystem-15-SP1-2020-3773,SUSE-SLE-Module-Basesystem-15-SP2-2020-3773,SUSE-SLE-Module-Desktop-Applications-15-SP1-2020-3773,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3773 SKIP SUSE-RU-2020:3774-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3774 is not security or has no CVEs. patches: SUSE-2020-3774,SUSE-SLE-Product-HPC-15-2020-3774,SUSE-SLE-Product-SLES-15-2020-3774,SUSE-SLE-Product-SLES_SAP-15-2020-3774 SKIP SUSE-RU-2020:3778-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3778 is not security or has no CVEs. patches: SUSE-2020-3778,SUSE-SLE-Module-Basesystem-15-SP2-2020-3778,SUSE-SLE-Module-Python2-15-SP2-2020-3778,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3778 SKIP SUSE-RU-2020:3779-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3779 is not security or has no CVEs. patches: SUSE-2020-3779,SUSE-SLE-Module-Basesystem-15-SP1-2020-3779,SUSE-SLE-Module-Python2-15-SP1-2020-3779,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3779 SKIP SUSE-RU-2020:3780-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3780 is not security or has no CVEs. patches: SUSE-2020-3780,SUSE-SLE-Product-HPC-15-2020-3780,SUSE-SLE-Product-SLES-15-2020-3780,SUSE-SLE-Product-SLES_SAP-15-2020-3780 SKIP SUSE-RU-2020:3781-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-3781 is not security or has no CVEs. patches: SUSE-2020-3781,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-3781 SKIP SUSE-RU-2020:3783-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-3783 is not security or has no CVEs. patches: SUSE-2020-3783,SUSE-SLE-Manager-Tools-15-2020-3783,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2020-3783 SKIP SUSE-RU-2020:3784-1 as SUSE-SLE-Manager-Tools-12-2020-3784 is not security or has no CVEs. patches: SUSE-2020-3784,SUSE-SLE-Manager-Tools-12-2020-3784 SKIP SUSE-RU-2020:3786-1 as SUSE-SLE-POS-12-SP2-2020-3786 is not security or has no CVEs. patches: SUSE-2020-3786,SUSE-SLE-Manager-Tools-12-2020-3786,SUSE-SLE-Module-Adv-Systems-Management-12-2020-3786,SUSE-SLE-POS-12-SP2-2020-3786 SKIP SUSE-RU-2020:3789-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-3789 is not security or has no CVEs. patches: SUSE-2020-3789,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2020-3789,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2020-3789,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2020-3789 SKIP SUSE-RU-2020:3791-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3791 is not security or has no CVEs. patches: SUSE-2020-3791,SUSE-SLE-Module-Basesystem-15-SP2-2020-3791 SKIP SUSE-RU-2020:3792-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3792 is not security or has no CVEs. patches: SUSE-2020-3792,SUSE-SLE-Module-Basesystem-15-SP1-2020-3792 SKIP SUSE-RU-2020:3793-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3793 is not security or has no CVEs. patches: SUSE-2020-3793,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3793,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3793 SKIP SUSE-RU-2020:3794-1 as SUSE-Storage-5-2020-3794 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2020-3794,SUSE-2020-3794,SUSE-OpenStack-Cloud-8-2020-3794,SUSE-OpenStack-Cloud-9-2020-3794,SUSE-OpenStack-Cloud-Crowbar-8-2020-3794,SUSE-OpenStack-Cloud-Crowbar-9-2020-3794,SUSE-SLE-SAP-12-SP3-2020-3794,SUSE-SLE-SAP-12-SP4-2020-3794,SUSE-SLE-SDK-12-SP5-2020-3794,SUSE-SLE-SERVER-12-SP3-2020-3794,SUSE-SLE-SERVER-12-SP3-BCL-2020-3794,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3794,SUSE-SLE-SERVER-12-SP5-2020-3794,SUSE-Storage-5-2020-3794 SKIP SUSE-RU-2020:3796-1 as SUSE-SLE-HA-12-SP3-2020-3796 is not security or has no CVEs. patches: SUSE-2020-3796,SUSE-SLE-HA-12-SP3-2020-3796 SKIP SUSE-RU-2020:3803-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3803 is not security or has no CVEs. patches: SUSE-2020-3803,SUSE-SLE-Module-Basesystem-15-SP1-2020-3803,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3803 SKIP SUSE-RU-2020:3804-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-3804 is not security or has no CVEs. patches: SUSE-2020-3804,SUSE-OpenStack-Cloud-7-2020-3804,SUSE-SLE-SAP-12-SP2-2020-3804,SUSE-SLE-SERVER-12-SP2-2020-3804,SUSE-SLE-SERVER-12-SP2-BCL-2020-3804 SKIP SUSE-RU-2020:3805-1 as SUSE-SLE-Product-HA-15-SP2-2020-3805 is not security or has no CVEs. patches: SUSE-2020-3805,SUSE-SLE-Product-HA-15-SP2-2020-3805 SKIP SUSE-RU-2020:3807-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3807 is not security or has no CVEs. patches: SUSE-2020-3807,SUSE-SLE-INSTALLER-15-SP2-2020-3807,SUSE-SLE-Module-Basesystem-15-SP2-2020-3807 SKIP SUSE-RU-2020:3808-1 as SUSE-SLE-SERVER-12-SP2-BCL-2020-3808 is not security or has no CVEs. patches: SUSE-2020-3808,SUSE-OpenStack-Cloud-7-2020-3808,SUSE-SLE-SAP-12-SP2-2020-3808,SUSE-SLE-SERVER-12-SP2-2020-3808,SUSE-SLE-SERVER-12-SP2-BCL-2020-3808 SKIP SUSE-RU-2020:3809-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3809 is not security or has no CVEs. patches: SUSE-2020-3809,SUSE-SLE-Module-Basesystem-15-SP2-2020-3809 SKIP SUSE-RU-2020:3810-1 as SUSE-SLE-Module-Public-Cloud-12-2020-3810 is not security or has no CVEs. patches: SUSE-2020-3810,SUSE-SLE-Module-Public-Cloud-12-2020-3810 SKIP SUSE-RU-2020:3811-1 as SUSE-SLE-SAP-12-SP5-2020-3811 is not security or has no CVEs. patches: SUSE-2020-3811,SUSE-SLE-Manager-Tools-12-2020-3811,SUSE-SLE-SAP-12-SP3-2020-3811,SUSE-SLE-SAP-12-SP4-2020-3811,SUSE-SLE-SAP-12-SP5-2020-3811 SKIP SUSE-RU-2020:3812-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3812 is not security or has no CVEs. patches: SUSE-2020-3812,SUSE-SLE-Manager-Tools-15-2020-3812,SUSE-SLE-Module-SAP-Applications-15-2020-3812,SUSE-SLE-Module-SAP-Applications-15-SP1-2020-3812,SUSE-SLE-Module-SAP-Applications-15-SP2-2020-3812 SKIP SUSE-RU-2020:3813-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-3813 is not security or has no CVEs. patches: SUSE-2020-3813,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-3813 SKIP SUSE-RU-2020:3814-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3814 is not security or has no CVEs. patches: SUSE-2020-3814,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2020-3814 SKIP SUSE-RU-2020:3817-1 as SUSE-2020-3817 is not security or has no CVEs. patches: SUSE-2020-3817,SUSE-SLE-Manager-Tools-15-2020-3817 SKIP SUSE-RU-2020:3823-1 as SUSE-2020-3823 is not security or has no CVEs. patches: SUSE-2020-3823,SUSE-SLE-Manager-Tools-12-2020-3823 ERROR: notice SUSE-RU-2020:3826-1 has no valid patches out of: SUSE-2020-3826,SUSE-SLE-Module-Basesystem-15-SP3-2020-3826 SKIP SUSE-RU-2020:3827-1 as SUSE-2020-3827 is not security or has no CVEs. patches: SUSE-2020-3827,SUSE-SLE-Module-Basesystem-15-SP3-2020-3827 ERROR: notice SUSE-RU-2020:3828-1 has no valid patches out of: SUSE-2020-3828,SUSE-SLE-Module-Basesystem-15-SP3-2020-3828 ERROR: notice SUSE-RU-2020:3831-1 has no valid patches out of: SUSE-2020-3831,SUSE-SLE-Module-Basesystem-15-SP3-2020-3831 ERROR: notice SUSE-RU-2020:3833-1 has no valid patches out of: SUSE-2020-3833,SUSE-SLE-Module-Basesystem-15-SP3-2020-3833 ERROR: notice SUSE-RU-2020:3834-1 has no valid patches out of: SUSE-2020-3834,SUSE-SLE-Module-Basesystem-15-SP3-2020-3834 SKIP SUSE-RU-2020:3836-1 as SUSE-SLE-SERVER-12-SP5-2020-3836 is not security or has no CVEs. patches: SUSE-2020-3836,SUSE-SLE-SERVER-12-SP5-2020-3836 SKIP SUSE-RU-2020:3837-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3837 is not security or has no CVEs. patches: SUSE-2020-3837,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3837 SKIP SUSE-RU-2020:3838-1 as SUSE-SLE-SERVER-12-SP5-2020-3838 is not security or has no CVEs. patches: SUSE-2020-3838,SUSE-SLE-SAP-12-SP5-2020-3838,SUSE-SLE-SERVER-12-SP5-2020-3838 SKIP SUSE-RU-2020:3839-1 as SUSE-SLE-Product-HA-15-SP1-2020-3839 is not security or has no CVEs. patches: SUSE-2020-3839,SUSE-SLE-Product-HA-15-SP1-2020-3839 SKIP SUSE-RU-2020:3840-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3840 is not security or has no CVEs. patches: SUSE-2020-3840,SUSE-SLE-Module-Basesystem-15-SP1-2020-3840,SUSE-SLE-Module-Basesystem-15-SP2-2020-3840,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3840,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3840,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3840,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3840 SKIP SUSE-RU-2020:3849-1 as SUSE-SLE-Product-HA-15-2020-3849 is not security or has no CVEs. patches: SUSE-2020-3849,SUSE-SLE-Product-HA-15-2020-3849 SKIP SUSE-RU-2020:3851-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2020-3851 is not security or has no CVEs. patches: SUSE-2020-3851,SUSE-OpenStack-Cloud-9-2020-3851,SUSE-OpenStack-Cloud-Crowbar-9-2020-3851,SUSE-SLE-SAP-12-SP4-2020-3851,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3851 SKIP SUSE-RU-2020:3852-1 as SUSE-SLE-WE-12-SP5-2020-3852 is not security or has no CVEs. patches: SUSE-2020-3852,SUSE-SLE-SDK-12-SP5-2020-3852,SUSE-SLE-SERVER-12-SP5-2020-3852,SUSE-SLE-WE-12-SP5-2020-3852 SKIP SUSE-RU-2020:3853-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3853 is not security or has no CVEs. patches: SUSE-2020-3853,SUSE-SLE-Module-Basesystem-15-SP1-2020-3853,SUSE-SLE-Module-Basesystem-15-SP2-2020-3853,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3853,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3853 SKIP SUSE-RU-2020:3855-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3855 is not security or has no CVEs. patches: SUSE-2020-3855,SUSE-SLE-Product-HPC-15-2020-3855,SUSE-SLE-Product-SLES-15-2020-3855,SUSE-SLE-Product-SLES_SAP-15-2020-3855 SKIP SUSE-RU-2020:3856-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3856 is not security or has no CVEs. patches: SUSE-2020-3856,SUSE-SLE-Module-Basesystem-15-SP2-2020-3856 SKIP SUSE-RU-2020:3857-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2020-3857 is not security or has no CVEs. patches: SUSE-2020-3857,SUSE-SLE-Module-Basesystem-15-SP1-2020-3857,SUSE-SLE-Module-Basesystem-15-SP2-2020-3857,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3857,SUSE-SLE-Module-Server-Applications-15-SP2-2020-3857 SKIP SUSE-RU-2020:3858-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2020-3858 is not security or has no CVEs. patches: SUSE-2020-3858,SUSE-SLE-Module-Server-Applications-15-SP1-2020-3858 SKIP SUSE-RU-2020:3859-1 as SUSE-SLE-SAP-12-SP4-2020-3859 is not security or has no CVEs. patches: SUSE-2020-3859,SUSE-SLE-SAP-12-SP4-2020-3859 SKIP SUSE-RU-2020:3860-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3860 is not security or has no CVEs. patches: SUSE-2020-3860,SUSE-SLE-Module-Basesystem-15-SP1-2020-3860,SUSE-SLE-Module-Basesystem-15-SP2-2020-3860 SKIP SUSE-RU-2020:3861-1 as SUSE-SLE-Product-HA-15-SP2-2020-3861 is not security or has no CVEs. patches: SUSE-2020-3861,SUSE-SLE-Product-HA-15-SP2-2020-3861 SKIP SUSE-RU-2020:3862-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3862 is not security or has no CVEs. patches: SUSE-2020-3862,SUSE-SLE-Module-Basesystem-15-SP2-2020-3862,SUSE-SLE-Module-Desktop-Applications-15-SP2-2020-3862 SKIP SUSE-RU-2020:3868-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3868 is not security or has no CVEs. patches: SUSE-2020-3868,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3868,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3868,SUSE-SLE-Product-HPC-15-2020-3868,SUSE-SLE-Product-SLES-15-2020-3868,SUSE-SLE-Product-SLES_SAP-15-2020-3868 SKIP SUSE-RU-2020:3869-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3869 is not security or has no CVEs. patches: SUSE-2020-3869,SUSE-SLE-INSTALLER-15-SP2-2020-3869,SUSE-SLE-Module-Basesystem-15-SP2-2020-3869 SKIP SUSE-RU-2020:3873-1 as SUSE-SLE-HA-12-SP3-2020-3873 is not security or has no CVEs. patches: SUSE-2020-3873,SUSE-SLE-HA-12-SP3-2020-3873 SKIP SUSE-RU-2020:3874-1 as SUSE-SLE-WE-12-SP5-2020-3874 is not security or has no CVEs. patches: SUSE-2020-3874,SUSE-SLE-SDK-12-SP5-2020-3874,SUSE-SLE-SERVER-12-SP5-2020-3874,SUSE-SLE-WE-12-SP5-2020-3874 SKIP SUSE-RU-2020:3886-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3886 is not security or has no CVEs. patches: SUSE-2020-3886,SUSE-SLE-INSTALLER-15-SP2-2020-3886,SUSE-SLE-Module-Basesystem-15-SP2-2020-3886 SKIP SUSE-RU-2020:3887-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3887 is not security or has no CVEs. patches: SUSE-2020-3887,SUSE-SLE-Module-Basesystem-15-SP2-2020-3887 SKIP SUSE-RU-2020:3889-1 as SUSE-SLE-HA-12-SP5-2020-3889 is not security or has no CVEs. patches: SUSE-2020-3889,SUSE-SLE-HA-12-SP4-2020-3889,SUSE-SLE-HA-12-SP5-2020-3889 SKIP SUSE-RU-2020:3890-1 as SUSE-SLE-SERVER-12-SP5-2020-3890 is not security or has no CVEs. patches: SUSE-2020-3890,SUSE-SLE-SERVER-12-SP5-2020-3890 SKIP SUSE-RU-2020:3904-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3904 is not security or has no CVEs. patches: SUSE-2020-3904,SUSE-SLE-Module-Basesystem-15-SP2-2020-3904 SKIP SUSE-RU-2020:3905-1 as SUSE-Storage-5-2020-3905 is not security or has no CVEs. patches: SUSE-2020-3905,SUSE-OpenStack-Cloud-7-2020-3905,SUSE-SLE-Module-Public-Cloud-12-2020-3905,SUSE-Storage-5-2020-3905 SKIP SUSE-RU-2020:3912-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3912 is not security or has no CVEs. patches: SUSE-2020-3912,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-3912,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-3912 SKIP SUSE-RU-2020:3919-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3919 is not security or has no CVEs. patches: SUSE-2020-3919,SUSE-SLE-Module-Basesystem-15-SP1-2020-3919,SUSE-SLE-Module-Basesystem-15-SP2-2020-3919 SKIP SUSE-RU-2020:3920-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3920 is not security or has no CVEs. patches: SUSE-2020-3920,SUSE-SLE-Module-Basesystem-15-SP1-2020-3920,SUSE-SLE-Module-Basesystem-15-SP2-2020-3920 SKIP SUSE-RU-2020:3921-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3921 is not security or has no CVEs. patches: SUSE-2020-3921,SUSE-SLE-Module-Basesystem-15-SP1-2020-3921,SUSE-SLE-Module-Basesystem-15-SP2-2020-3921 SKIP SUSE-RU-2020:3923-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3923 is not security or has no CVEs. patches: SUSE-2020-3923,SUSE-SLE-Module-Basesystem-15-SP2-2020-3923 SKIP SUSE-RU-2020:3924-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3924 is not security or has no CVEs. patches: SUSE-2020-3924,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3924 SKIP SUSE-RU-2020:3925-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3925 is not security or has no CVEs. patches: SUSE-2020-3925,SUSE-SLE-Module-Basesystem-15-SP2-2020-3925,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3925 SKIP SUSE-RU-2020:3927-1 as SUSE-SLE-SERVER-12-SP5-2020-3927 is not security or has no CVEs. patches: SUSE-2020-3927,SUSE-SLE-SERVER-12-SP5-2020-3927 SKIP SUSE-RU-2020:3929-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2020-3929 is not security or has no CVEs. patches: SUSE-2020-3929,SUSE-SLE-Live-Patching-12-2020-3928,SUSE-SLE-Live-Patching-12-SP3-2020-3928,SUSE-SLE-Live-Patching-12-SP4-2020-3928,SUSE-SLE-Live-Patching-12-SP5-2020-3928,SUSE-SLE-Module-Live-Patching-15-2020-3929,SUSE-SLE-Module-Live-Patching-15-SP1-2020-3929,SUSE-SLE-Module-Live-Patching-15-SP2-2020-3929 SKIP SUSE-RU-2020:3936-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2020-3936 is not security or has no CVEs. patches: SUSE-2020-3936,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3936,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3936 SKIP SUSE-RU-2020:3937-1 as SUSE-SLE-SERVER-12-SP5-2020-3937 is not security or has no CVEs. patches: SUSE-2020-3937,SUSE-SLE-SERVER-12-SP5-2020-3937 SKIP SUSE-RU-2020:3942-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3942 is not security or has no CVEs. patches: SUSE-2020-3942,SUSE-SLE-Module-Basesystem-15-SP1-2020-3942,SUSE-SLE-Module-Basesystem-15-SP2-2020-3942,SUSE-SLE-Module-Basesystem-15-SP3-2020-3942,SUSE-SLE-Product-HPC-15-2020-3942,SUSE-SLE-Product-SLES-15-2020-3942,SUSE-SLE-Product-SLES_SAP-15-2020-3942 SKIP SUSE-RU-2020:3943-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3943 is not security or has no CVEs. patches: SUSE-2020-3943,SUSE-SLE-Module-Basesystem-15-SP1-2020-3943,SUSE-SLE-Module-Basesystem-15-SP2-2020-3943,SUSE-SLE-Module-Basesystem-15-SP3-2020-3943,SUSE-SLE-Module-Python2-15-SP1-2020-3943,SUSE-SLE-Module-Python2-15-SP2-2020-3943,SUSE-SLE-Module-Python2-15-SP3-2020-3943,SUSE-SLE-Product-HPC-15-2020-3943,SUSE-SLE-Product-SLES-15-2020-3943,SUSE-SLE-Product-SLES_SAP-15-2020-3943 SKIP SUSE-RU-2020:3946-1 as SUSE-SLE-Product-SLES_SAP-15-2020-3946 is not security or has no CVEs. patches: SUSE-2020-3946,SUSE-SLE-Module-Basesystem-15-SP1-2020-3946,SUSE-SLE-Module-Basesystem-15-SP2-2020-3946,SUSE-SLE-Module-Basesystem-15-SP3-2020-3946,SUSE-SLE-Module-Development-Tools-15-SP1-2020-3946,SUSE-SLE-Module-Development-Tools-15-SP2-2020-3946,SUSE-SLE-Module-Development-Tools-15-SP3-2020-3946,SUSE-SLE-Product-HPC-15-2020-3946,SUSE-SLE-Product-SLES-15-2020-3946,SUSE-SLE-Product-SLES_SAP-15-2020-3946 SKIP SUSE-RU-2020:3948-1 as SUSE-SLE-SERVER-12-SP5-2020-3948 is not security or has no CVEs. patches: SUSE-2020-3948,SUSE-SLE-SDK-12-SP5-2020-3948,SUSE-SLE-SERVER-12-SP5-2020-3948 SKIP SUSE-RU-2020:3949-1 as SUSE-SLE-Module-Basesystem-15-SP1-2020-3949 is not security or has no CVEs. patches: SUSE-2020-3949,SUSE-SLE-Module-Basesystem-15-SP1-2020-3949 SKIP SUSE-RU-2020:3950-1 as SUSE-SLE-Module-Basesystem-15-SP2-2020-3950 is not security or has no CVEs. patches: SUSE-2020-3950,SUSE-SLE-Module-Basesystem-15-SP2-2020-3950 SKIP SUSE-RU-2021:0001-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2021-1 is not security or has no CVEs. patches: SUSE-2021-1,SUSE-SLE-Module-Basesystem-15-SP2-2021-1,SUSE-SLE-Module-Development-Tools-15-SP1-2021-1 SKIP SUSE-RU-2021:0002-1 as SUSE-SLE-Product-SLES_SAP-15-2021-2 is not security or has no CVEs. patches: SUSE-2021-2,SUSE-SLE-Module-Basesystem-15-SP1-2021-2,SUSE-SLE-Module-Basesystem-15-SP2-2021-2,SUSE-SLE-Product-HPC-15-2021-2,SUSE-SLE-Product-SLES-15-2021-2,SUSE-SLE-Product-SLES_SAP-15-2021-2 SKIP SUSE-RU-2021:0003-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3 is not security or has no CVEs. patches: SUSE-2021-3,SUSE-SLE-Module-Basesystem-15-SP2-2021-3 SKIP SUSE-RU-2021:0004-1 as SUSE-SLE-Product-SLES_SAP-15-2021-4 is not security or has no CVEs. patches: SUSE-2021-4,SUSE-SLE-INSTALLER-15-2021-4,SUSE-SLE-Product-SLES-15-2021-4,SUSE-SLE-Product-SLES_SAP-15-2021-4 SKIP SUSE-RU-2021:0005-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-5 is not security or has no CVEs. patches: SUSE-2021-5,SUSE-SLE-Module-Basesystem-15-SP2-2021-5 SKIP SUSE-RU-2021:0006-1 as SUSE-SLE-Product-HA-15-SP2-2021-6 is not security or has no CVEs. patches: SUSE-2021-6,SUSE-SLE-Module-Basesystem-15-SP2-2021-6,SUSE-SLE-Product-HA-15-SP2-2021-6 SKIP SUSE-RU-2021:0007-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-7 is not security or has no CVEs. patches: SUSE-2021-7,SUSE-SLE-Module-Basesystem-15-SP2-2021-7 SKIP SUSE-RU-2021:0008-1 as SUSE-SLE-Product-SLES-15-SP1-2021-8 is not security or has no CVEs. patches: SUSE-2021-8,SUSE-SLE-INSTALLER-15-SP1-2021-8,SUSE-SLE-Product-SLES-15-SP1-2021-8 SKIP SUSE-RU-2021:0009-1 as SUSE-SLE-Product-HPC-15-SP1-2021-9 is not security or has no CVEs. patches: SUSE-2021-9,SUSE-SLE-Module-HPC-15-SP1-2021-9,SUSE-SLE-Product-HPC-15-SP1-2021-9 SKIP SUSE-RU-2021:0010-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-10 is not security or has no CVEs. patches: SUSE-2021-10,SUSE-SLE-Module-Basesystem-15-SP1-2021-10,SUSE-SLE-Module-Basesystem-15-SP2-2021-10 SKIP SUSE-RU-2021:0011-1 as SUSE-SLE-Product-SLES_SAP-15-2021-11 is not security or has no CVEs. patches: SUSE-2021-11,SUSE-SLE-Module-Server-Applications-15-SP1-2021-11,SUSE-SLE-Module-Server-Applications-15-SP2-2021-11,SUSE-SLE-Product-HPC-15-2021-11,SUSE-SLE-Product-SLES-15-2021-11,SUSE-SLE-Product-SLES_SAP-15-2021-11 SKIP SUSE-RU-2021:0012-1 as SUSE-SLE-SDK-12-SP5-2021-12 is not security or has no CVEs. patches: SUSE-2021-12,SUSE-SLE-HA-12-SP5-2021-12,SUSE-SLE-SDK-12-SP5-2021-12 SKIP SUSE-RU-2021:0013-1 as SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-13 is not security or has no CVEs. patches: SUSE-2021-13,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-13,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-13,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-13 SKIP SUSE-RU-2021:0020-1 as SUSE-Storage-5-2021-20 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-20,SUSE-2021-20,SUSE-OpenStack-Cloud-8-2021-20,SUSE-OpenStack-Cloud-Crowbar-8-2021-20,SUSE-SLE-SAP-12-SP3-2021-20,SUSE-SLE-SERVER-12-SP3-2021-20,SUSE-SLE-SERVER-12-SP3-BCL-2021-20,SUSE-Storage-5-2021-20 SKIP SUSE-RU-2021:0021-1 as SUSE-SLE-SDK-12-SP5-2021-21 is not security or has no CVEs. patches: SUSE-2021-21,SUSE-SLE-SDK-12-SP5-2021-21 SKIP SUSE-RU-2021:0025-1 as SUSE-Storage-7-2021-25 is not security or has no CVEs. patches: SUSE-2021-25,SUSE-Storage-7-2021-25 SKIP SUSE-RU-2021:0026-1 as SUSE-Storage-5-2021-26 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-26,SUSE-2021-26,SUSE-OpenStack-Cloud-7-2021-26,SUSE-OpenStack-Cloud-8-2021-26,SUSE-OpenStack-Cloud-9-2021-26,SUSE-OpenStack-Cloud-Crowbar-8-2021-26,SUSE-OpenStack-Cloud-Crowbar-9-2021-26,SUSE-SLE-SAP-12-SP2-2021-26,SUSE-SLE-SAP-12-SP3-2021-26,SUSE-SLE-SAP-12-SP4-2021-26,SUSE-SLE-SDK-12-SP5-2021-26,SUSE-SLE-SERVER-12-SP2-2021-26,SUSE-SLE-SERVER-12-SP2-BCL-2021-26,SUSE-SLE-SERVER-12-SP3-2021-26,SUSE-SLE-SERVER-12-SP3-BCL-2021-26,SUSE-SLE-SERVER-12-SP4-LTSS-2021-26,SUSE-SLE-SERVER-12-SP5-2021-26,SUSE-Storage-5-2021-26 SKIP SUSE-RU-2021:0035-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-35 is not security or has no CVEs. patches: SUSE-2021-35,SUSE-SLE-Module-Basesystem-15-SP1-2021-35,SUSE-SLE-Module-Basesystem-15-SP2-2021-35,SUSE-SLE-Module-Desktop-Applications-15-SP1-2021-35,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-35,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2021-35,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-35 SKIP SUSE-RU-2021:0036-1 as SUSE-SLE-Product-HPC-15-SP2-2021-36 is not security or has no CVEs. patches: SUSE-2021-36,SUSE-SLE-Module-HPC-15-SP2-2021-36,SUSE-SLE-Product-HPC-15-SP2-2021-36 SKIP SUSE-RU-2021:0037-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2021-37 is not security or has no CVEs. patches: SUSE-2021-37,SUSE-SLE-Module-Basesystem-15-SP1-2021-37,SUSE-SLE-Module-Basesystem-15-SP2-2021-37,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2021-37 SKIP SUSE-RU-2021:0043-1 as SUSE-SLE-SERVER-12-SP5-2021-43 is not security or has no CVEs. patches: SUSE-2021-43,SUSE-SLE-SERVER-12-SP5-2021-43 SKIP SUSE-RU-2021:0044-1 as SUSE-SLE-Product-SLES-15-SP2-2021-44 is not security or has no CVEs. patches: SUSE-2021-44,SUSE-SLE-INSTALLER-15-SP2-2021-44,SUSE-SLE-Product-SLES-15-SP2-2021-44 SKIP SUSE-RU-2021:0046-1 as SUSE-SLE-Product-HPC-15-2021-46 is not security or has no CVEs. patches: SUSE-2021-46,SUSE-SLE-Product-HPC-15-2021-46 SKIP SUSE-RU-2021:0049-1 as SUSE-SLE-HA-12-SP4-2021-49 is not security or has no CVEs. patches: SUSE-2021-49,SUSE-SLE-HA-12-SP4-2021-49 SKIP SUSE-RU-2021:0050-1 as SUSE-SLE-HA-12-SP3-2021-50 is not security or has no CVEs. patches: SUSE-2021-50,SUSE-SLE-HA-12-SP3-2021-50 SKIP SUSE-RU-2021:0051-1 as SUSE-SLE-HA-12-SP5-2021-51 is not security or has no CVEs. patches: SUSE-2021-51,SUSE-SLE-HA-12-SP5-2021-51 SKIP SUSE-RU-2021:0052-1 as SUSE-SLE-SDK-12-SP5-2021-52 is not security or has no CVEs. patches: SUSE-2021-52,SUSE-SLE-SDK-12-SP5-2021-52 SKIP SUSE-RU-2021:0058-1 as SUSE-Storage-5-2021-58 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-58,SUSE-2021-58,SUSE-OpenStack-Cloud-8-2021-58,SUSE-OpenStack-Cloud-9-2021-58,SUSE-OpenStack-Cloud-Crowbar-8-2021-58,SUSE-OpenStack-Cloud-Crowbar-9-2021-58,SUSE-SLE-SAP-12-SP3-2021-58,SUSE-SLE-SAP-12-SP4-2021-58,SUSE-SLE-SDK-12-SP5-2021-58,SUSE-SLE-SERVER-12-SP3-2021-58,SUSE-SLE-SERVER-12-SP3-BCL-2021-58,SUSE-SLE-SERVER-12-SP4-LTSS-2021-58,SUSE-SLE-SERVER-12-SP5-2021-58,SUSE-Storage-5-2021-58 SKIP SUSE-RU-2021:0063-1 as SUSE-SLE-Product-HA-15-SP2-2021-63 is not security or has no CVEs. patches: SUSE-2021-63,SUSE-SLE-Product-HA-15-SP2-2021-63 SKIP SUSE-RU-2021:0064-1 as SUSE-Storage-6-2021-64 is not security or has no CVEs. patches: SUSE-2021-64,SUSE-Storage-6-2021-64 SKIP SUSE-RU-2021:0065-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-65 is not security or has no CVEs. patches: SUSE-2021-65,SUSE-SLE-Module-Development-Tools-15-SP2-2021-65 SKIP SUSE-RU-2021:0066-1 as SUSE-SLE-Product-HA-15-SP1-2021-66 is not security or has no CVEs. patches: SUSE-2021-66,SUSE-SLE-Product-HA-15-SP1-2021-66 SKIP SUSE-RU-2021:0067-1 as SUSE-SLE-Product-HA-15-2021-67 is not security or has no CVEs. patches: SUSE-2021-67,SUSE-SLE-Product-HA-15-2021-67 SKIP SUSE-RU-2021:0070-1 as SUSE-SLE-Module-RT-15-SP2-2021-70 is not security or has no CVEs. patches: SUSE-2021-70,SUSE-SLE-Module-RT-15-SP1-2021-70,SUSE-SLE-Module-RT-15-SP2-2021-70 SKIP SUSE-RU-2021:0073-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-73 is not security or has no CVEs. patches: SUSE-2021-73,SUSE-SLE-Module-Basesystem-15-SP2-2021-73 SKIP SUSE-RU-2021:0074-1 as SUSE-SLE-SERVER-12-SP5-2021-74 is not security or has no CVEs. patches: SUSE-2021-74,SUSE-SLE-SERVER-12-SP5-2021-74 SKIP SUSE-RU-2021:0075-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-75 is not security or has no CVEs. patches: SUSE-2021-75,SUSE-OpenStack-Cloud-7-2021-75,SUSE-SLE-SAP-12-SP2-2021-75,SUSE-SLE-SERVER-12-SP2-2021-75,SUSE-SLE-SERVER-12-SP2-BCL-2021-75 SKIP SUSE-RU-2021:0076-1 as SUSE-SLE-Product-SLES_SAP-15-2021-76 is not security or has no CVEs. patches: SUSE-2021-76,SUSE-SLE-Product-HPC-15-2021-76,SUSE-SLE-Product-SLES-15-2021-76,SUSE-SLE-Product-SLES_SAP-15-2021-76 SKIP SUSE-RU-2021:0077-1 as SUSE-Storage-5-2021-77 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-77,SUSE-2021-77,SUSE-OpenStack-Cloud-8-2021-77,SUSE-OpenStack-Cloud-9-2021-77,SUSE-OpenStack-Cloud-Crowbar-8-2021-77,SUSE-OpenStack-Cloud-Crowbar-9-2021-77,SUSE-SLE-SAP-12-SP3-2021-77,SUSE-SLE-SAP-12-SP4-2021-77,SUSE-SLE-SERVER-12-SP3-2021-77,SUSE-SLE-SERVER-12-SP3-BCL-2021-77,SUSE-SLE-SERVER-12-SP4-LTSS-2021-77,SUSE-Storage-5-2021-77 SKIP SUSE-RU-2021:0079-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-79 is not security or has no CVEs. patches: SUSE-2021-79,SUSE-SLE-Module-Basesystem-15-SP1-2021-79,SUSE-SLE-Module-Basesystem-15-SP2-2021-79,SUSE-SLE-Module-Development-Tools-15-SP1-2021-79,SUSE-SLE-Module-Development-Tools-15-SP2-2021-79 SKIP SUSE-RU-2021:0091-1 as SUSE-SLE-SAP-12-SP5-2021-91 is not security or has no CVEs. patches: SUSE-2021-91,SUSE-SLE-SAP-12-SP3-2021-91,SUSE-SLE-SAP-12-SP4-2021-91,SUSE-SLE-SAP-12-SP5-2021-91 SKIP SUSE-RU-2021:0092-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-92 is not security or has no CVEs. patches: SUSE-2021-92,SUSE-SLE-Module-SAP-Applications-15-2021-92,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-92 SKIP SUSE-RU-2021:0100-1 as SUSE-SLE-HA-GEO-12-SP2-2021-100 is not security or has no CVEs. patches: SUSE-2021-100,SUSE-SLE-HA-12-SP2-2021-100,SUSE-SLE-HA-GEO-12-SP2-2021-100 SKIP SUSE-RU-2021:0101-1 as SUSE-SLE-SERVER-12-SP5-2021-101 is not security or has no CVEs. patches: SUSE-2021-101,SUSE-SLE-SERVER-12-SP5-2021-101 SKIP SUSE-RU-2021:0102-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-102 is not security or has no CVEs. patches: SUSE-2021-102,SUSE-SLE-Module-Basesystem-15-SP1-2021-102,SUSE-SLE-Module-Basesystem-15-SP2-2021-102 SKIP SUSE-RU-2021:0103-1 as SUSE-SLE-SERVER-12-SP5-2021-103 is not security or has no CVEs. patches: SUSE-2021-103,SUSE-SLE-SDK-12-SP5-2021-103,SUSE-SLE-SERVER-12-SP5-2021-103 SKIP SUSE-RU-2021:0104-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2021-104 is not security or has no CVEs. patches: SUSE-2021-104,SUSE-SLE-Module-Basesystem-15-SP1-2021-104,SUSE-SLE-Module-Server-Applications-15-SP1-2021-104 SKIP SUSE-RU-2021:0105-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-105 is not security or has no CVEs. patches: SUSE-2021-105,SUSE-SLE-Module-Basesystem-15-SP2-2021-105,SUSE-SLE-Module-Server-Applications-15-SP2-2021-105 SKIP SUSE-RU-2021:0110-1 as SUSE-Storage-7-2021-110 is not security or has no CVEs. patches: SUSE-2021-110,SUSE-Storage-7-2021-110 SKIP SUSE-RU-2021:0111-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-111 is not security or has no CVEs. patches: SUSE-2021-111,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-111 SKIP SUSE-RU-2021:0112-1 as SUSE-SLE-SERVER-12-SP5-2021-112 is not security or has no CVEs. patches: SUSE-2021-112,SUSE-SLE-SERVER-12-SP5-2021-112 SKIP SUSE-RU-2021:0113-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-113 is not security or has no CVEs. patches: SUSE-2021-113,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-113 SKIP SUSE-RU-2021:0114-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-114 is not security or has no CVEs. patches: SUSE-2021-114,SUSE-OpenStack-Cloud-7-2021-114,SUSE-SLE-SAP-12-SP2-2021-114,SUSE-SLE-SERVER-12-SP2-2021-114,SUSE-SLE-SERVER-12-SP2-BCL-2021-114 SKIP SUSE-RU-2021:0116-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-116 is not security or has no CVEs. patches: SUSE-2021-116,SUSE-SLE-SERVER-12-SP5-2021-116,SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-116 SKIP SUSE-RU-2021:0119-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-119 is not security or has no CVEs. patches: SUSE-2021-119,SUSE-SLE-Module-Basesystem-15-SP2-2021-119 SKIP SUSE-RU-2021:0120-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-120 is not security or has no CVEs. patches: SUSE-2021-120,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-120 SKIP SUSE-RU-2021:0130-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-130 is not security or has no CVEs. patches: SUSE-2021-130,SUSE-SLE-Module-Basesystem-15-SP1-2021-130,SUSE-SLE-Module-Basesystem-15-SP2-2021-130 SKIP SUSE-RU-2021:0134-1 as SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-134 is not security or has no CVEs. patches: SUSE-2021-134,SUSE-SLE-Module-HPC-15-SP2-2021-134,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-134,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-134 SKIP SUSE-RU-2021:0136-1 as SUSE-Storage-5-2021-136 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-136,SUSE-2021-136,SUSE-OpenStack-Cloud-7-2021-136,SUSE-OpenStack-Cloud-8-2021-136,SUSE-OpenStack-Cloud-9-2021-136,SUSE-OpenStack-Cloud-Crowbar-8-2021-136,SUSE-OpenStack-Cloud-Crowbar-9-2021-136,SUSE-SLE-SAP-12-SP2-2021-136,SUSE-SLE-SAP-12-SP3-2021-136,SUSE-SLE-SAP-12-SP4-2021-136,SUSE-SLE-SERVER-12-SP2-2021-136,SUSE-SLE-SERVER-12-SP2-BCL-2021-136,SUSE-SLE-SERVER-12-SP3-2021-136,SUSE-SLE-SERVER-12-SP3-BCL-2021-136,SUSE-SLE-SERVER-12-SP4-LTSS-2021-136,SUSE-SLE-SERVER-12-SP5-2021-136,SUSE-Storage-5-2021-136 SKIP SUSE-RU-2021:0137-1 as SUSE-SLE-SDK-12-SP5-2021-137 is not security or has no CVEs. patches: SUSE-2021-137,SUSE-SLE-SDK-12-SP5-2021-137 SKIP SUSE-RU-2021:0138-1 as SUSE-SLE-Module-Development-Tools-15-SP1-2021-138 is not security or has no CVEs. patches: SUSE-2021-138,SUSE-SLE-Module-Development-Tools-15-SP1-2021-138 SKIP SUSE-RU-2021:0140-1 as SUSE-SLE-SERVER-12-SP5-2021-140 is not security or has no CVEs. patches: SUSE-2021-140,SUSE-SLE-SERVER-12-SP5-2021-140 SKIP SUSE-RU-2021:0141-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-141 is not security or has no CVEs. patches: SUSE-2021-141,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-141 SKIP SUSE-RU-2021:0144-1 as SUSE-Storage-6-2021-144 is not security or has no CVEs. patches: SUSE-2021-144,SUSE-SLE-Module-Basesystem-15-SP1-2021-144,SUSE-SLE-Module-Basesystem-15-SP2-2021-144,SUSE-SLE-Module-Basesystem-15-SP3-2021-144,SUSE-SLE-Module-Desktop-Applications-15-SP1-2021-144,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-144,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-144,SUSE-SLE-Product-HPC-15-2021-144,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-144,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-144,SUSE-SLE-Product-SLES-15-2021-144,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-144,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-144,SUSE-SLE-Product-SLES_SAP-15-2021-144,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-144,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-144,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-144,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-144,SUSE-Storage-6-2021-144 SKIP SUSE-RU-2021:0146-1 as SUSE-SLE-SERVER-12-SP5-2021-146 is not security or has no CVEs. patches: SUSE-2021-146,SUSE-SLE-SERVER-12-SP5-2021-146 SKIP SUSE-RU-2021:0148-1 as SUSE-SLE-SERVER-12-SP5-2021-148 is not security or has no CVEs. patches: SUSE-2021-148,SUSE-SLE-Module-Public-Cloud-12-2021-148,SUSE-SLE-SERVER-12-SP5-2021-148 SKIP SUSE-RU-2021:0149-1 as SUSE-SLE-Module-Legacy-12-2021-149 is not security or has no CVEs. patches: SUSE-2021-149,SUSE-SLE-Module-Legacy-12-2021-149 SKIP SUSE-RU-2021:0151-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-151 is not security or has no CVEs. patches: SUSE-2021-151,SUSE-SLE-Module-Basesystem-15-SP1-2021-151,SUSE-SLE-Module-Basesystem-15-SP2-2021-151 SKIP SUSE-RU-2021:0152-1 as SUSE-SLE-Product-HA-15-SP2-2021-152 is not security or has no CVEs. patches: SUSE-2021-152,SUSE-SLE-Module-Basesystem-15-SP2-2021-152,SUSE-SLE-Product-HA-15-SP2-2021-152 SKIP SUSE-RU-2021:0160-1 as SUSE-SLE-Product-RT-15-SP2-2021-160 is not security or has no CVEs. patches: SUSE-2021-160,SUSE-SLE-Module-RT-15-SP2-2021-160,SUSE-SLE-Product-RT-15-SP2-2021-160 SKIP SUSE-RU-2021:0161-1 as SUSE-SLE-SERVER-12-SP5-2021-161 is not security or has no CVEs. patches: SUSE-2021-161,SUSE-SLE-SDK-12-SP5-2021-161,SUSE-SLE-SERVER-12-SP5-2021-161 SKIP SUSE-RU-2021:0168-1 as SUSE-SLE-SERVER-12-SP5-2021-168 is not security or has no CVEs. patches: SUSE-2021-168,SUSE-SLE-SERVER-12-SP5-2021-168 SKIP SUSE-RU-2021:0169-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-169 is not security or has no CVEs. patches: SUSE-2021-169,SUSE-SLE-INSTALLER-15-SP2-2021-169,SUSE-SLE-Module-Basesystem-15-SP2-2021-169,SUSE-SLE-Module-Development-Tools-15-SP2-2021-169 SKIP SUSE-RU-2021:0170-1 as SUSE-SLE-Module-Basesystem-15-SP1-2021-170 is not security or has no CVEs. patches: SUSE-2021-170,SUSE-SLE-Module-Basesystem-15-SP1-2021-170 SKIP SUSE-RU-2021:0174-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-174 is not security or has no CVEs. patches: SUSE-2021-174,SUSE-SLE-Module-Basesystem-15-SP2-2021-174 SKIP SUSE-RU-2021:0177-1 as SUSE-SLE-Product-SLES_SAP-15-2021-177 is not security or has no CVEs. patches: SUSE-2021-177,SUSE-SLE-Product-HPC-15-2021-177,SUSE-SLE-Product-SLES-15-2021-177,SUSE-SLE-Product-SLES_SAP-15-2021-177 SKIP SUSE-RU-2021:0178-1 as SUSE-SLE-Module-Basesystem-15-SP1-2021-178 is not security or has no CVEs. patches: SUSE-2021-178,SUSE-SLE-Module-Basesystem-15-SP1-2021-178 SKIP SUSE-RU-2021:0179-1 as SUSE-SLE-Product-SLES_SAP-15-2021-179 is not security or has no CVEs. patches: SUSE-2021-179,SUSE-SLE-Module-Basesystem-15-SP1-2021-179,SUSE-SLE-Module-Basesystem-15-SP2-2021-179,SUSE-SLE-Module-Basesystem-15-SP3-2021-179,SUSE-SLE-Product-HPC-15-2021-179,SUSE-SLE-Product-SLES-15-2021-179,SUSE-SLE-Product-SLES_SAP-15-2021-179 SKIP SUSE-RU-2021:0187-1 as SUSE-SLE-HA-12-SP5-2021-187 is not security or has no CVEs. patches: SUSE-2021-187,SUSE-SLE-HA-12-SP4-2021-187,SUSE-SLE-HA-12-SP5-2021-187 SKIP SUSE-RU-2021:0188-1 as SUSE-SLE-Product-HA-15-2021-188 is not security or has no CVEs. patches: SUSE-2021-188,SUSE-SLE-Product-HA-15-2021-188 SKIP SUSE-RU-2021:0190-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-190 is not security or has no CVEs. patches: SUSE-2021-190,SUSE-SLE-INSTALLER-15-SP2-2021-190,SUSE-SLE-Module-Basesystem-15-SP2-2021-190 SKIP SUSE-RU-2021:0191-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-191 is not security or has no CVEs. patches: SUSE-2021-191,SUSE-SLE-Module-Basesystem-15-SP2-2021-191 SKIP SUSE-RU-2021:0201-1 as SUSE-SLE-Product-HA-15-SP2-2021-201 is not security or has no CVEs. patches: SUSE-2021-201,SUSE-SLE-Product-HA-15-SP2-2021-201 SKIP SUSE-RU-2021:0202-1 as SUSE-SLE-Product-HA-15-2021-202 is not security or has no CVEs. patches: SUSE-2021-202,SUSE-SLE-Product-HA-15-2021-202 SKIP SUSE-RU-2021:0203-1 as SUSE-SLE-SERVER-12-SP5-2021-203 is not security or has no CVEs. patches: SUSE-2021-203,SUSE-SLE-SERVER-12-SP5-2021-203 SKIP SUSE-RU-2021:0204-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-204 is not security or has no CVEs. patches: SUSE-2021-204,SUSE-SLE-Module-Basesystem-15-SP1-2021-204,SUSE-SLE-Module-Basesystem-15-SP2-2021-204 SKIP SUSE-RU-2021:0205-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-205 is not security or has no CVEs. patches: SUSE-2021-205,SUSE-SLE-Module-Basesystem-15-SP2-2021-205 SKIP SUSE-RU-2021:0206-1 as SUSE-SLE-SERVER-12-SP5-2021-206 is not security or has no CVEs. patches: SUSE-2021-206,SUSE-SLE-SDK-12-SP5-2021-206,SUSE-SLE-SERVER-12-SP5-2021-206 SKIP SUSE-RU-2021:0207-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-207 is not security or has no CVEs. patches: SUSE-2021-207,SUSE-SLE-Module-Basesystem-15-SP1-2021-207,SUSE-SLE-Module-Basesystem-15-SP2-2021-207 SKIP SUSE-RU-2021:0208-1 as SUSE-Storage-7-2021-208 is not security or has no CVEs. patches: SUSE-2021-208,SUSE-Storage-7-2021-208 SKIP SUSE-RU-2021:0211-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-211 is not security or has no CVEs. patches: SUSE-2021-211,SUSE-SLE-Module-Basesystem-15-SP2-2021-211,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-211 SKIP SUSE-RU-2021:0212-1 as SUSE-SLE-HA-12-SP3-2021-212 is not security or has no CVEs. patches: SUSE-2021-212,SUSE-SLE-HA-12-SP3-2021-212 SKIP SUSE-RU-2021:0213-1 as SUSE-SLE-Product-HA-15-2021-213 is not security or has no CVEs. patches: SUSE-2021-213,SUSE-SLE-Product-HA-15-2021-213 SKIP SUSE-RU-2021:0214-1 as SUSE-SLE-HA-12-SP5-2021-214 is not security or has no CVEs. patches: SUSE-2021-214,SUSE-SLE-HA-12-SP4-2021-214,SUSE-SLE-HA-12-SP5-2021-214 SKIP SUSE-RU-2021:0215-1 as SUSE-SLE-Product-HA-15-2021-215 is not security or has no CVEs. patches: SUSE-2021-215,SUSE-SLE-Product-HA-15-2021-215 SKIP SUSE-RU-2021:0216-1 as SUSE-SLE-HA-12-SP5-2021-216 is not security or has no CVEs. patches: SUSE-2021-216,SUSE-SLE-HA-12-SP4-2021-216,SUSE-SLE-HA-12-SP5-2021-216 SKIP SUSE-RU-2021:0218-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-218 is not security or has no CVEs. patches: SUSE-2021-218,SUSE-SLE-INSTALLER-15-SP2-2021-218,SUSE-SLE-Module-Basesystem-15-SP2-2021-218 SKIP SUSE-RU-2021:0219-1 as SUSE-SLE-SERVER-12-SP5-2021-219 is not security or has no CVEs. patches: SUSE-2021-219,SUSE-SLE-SERVER-12-SP5-2021-219 SKIP SUSE-RU-2021:0220-1 as SUSE-Storage-6-2021-220 is not security or has no CVEs. patches: SUSE-2021-220,SUSE-SLE-Module-Basesystem-15-SP2-2021-220,SUSE-SLE-Product-HPC-15-2021-220,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-220,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-220,SUSE-SLE-Product-SLES-15-2021-220,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-220,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-220,SUSE-SLE-Product-SLES_SAP-15-2021-220,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-220,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-220,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-220,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-220,SUSE-Storage-6-2021-220 SKIP SUSE-RU-2021:0221-1 as SUSE-Storage-6-2021-221 is not security or has no CVEs. patches: SUSE-2021-221,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-221,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-221,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-221,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-221,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-221,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-221,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-221,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-221,SUSE-Storage-6-2021-221 SKIP SUSE-RU-2021:0228-1 as SUSE-Storage-6-2021-228 is not security or has no CVEs. patches: SUSE-2021-228,SUSE-SLE-Module-Development-Tools-15-SP2-2021-228,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-228,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-228,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-228,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-228,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-228,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-228,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-228,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-228,SUSE-Storage-6-2021-228 SKIP SUSE-RU-2021:0229-1 as SUSE-SLE-Product-HA-15-SP2-2021-229 is not security or has no CVEs. patches: SUSE-2021-229,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-229,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-229,SUSE-SLE-Product-HA-15-SP1-2021-229,SUSE-SLE-Product-HA-15-SP2-2021-229 SKIP SUSE-RU-2021:0230-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2021-230 is not security or has no CVEs. patches: SUSE-2021-230,SUSE-SLE-Module-Basesystem-15-SP1-2021-230,SUSE-SLE-Module-Basesystem-15-SP2-2021-230,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2021-230 SKIP SUSE-RU-2021:0231-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-231 is not security or has no CVEs. patches: SUSE-2021-231,SUSE-SLE-Module-Basesystem-15-SP2-2021-231,SUSE-SLE-Module-Server-Applications-15-SP2-2021-231 SKIP SUSE-RU-2021:0233-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-233 is not security or has no CVEs. patches: SUSE-2021-233,SUSE-SLE-INSTALLER-15-SP1-2021-233,SUSE-SLE-Module-Basesystem-15-SP2-2021-233 SKIP SUSE-RU-2021:0234-1 as SUSE-SLE-SERVER-12-SP5-2021-234 is not security or has no CVEs. patches: SUSE-2021-234,SUSE-SLE-SDK-12-SP5-2021-234,SUSE-SLE-SERVER-12-SP5-2021-234 SKIP SUSE-RU-2021:0235-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-235 is not security or has no CVEs. patches: SUSE-2021-235,SUSE-SLE-INSTALLER-15-SP2-2021-235,SUSE-SLE-Module-Basesystem-15-SP2-2021-235 SKIP SUSE-RU-2021:0237-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-237 is not security or has no CVEs. patches: SUSE-2021-237,SUSE-SLE-Module-SAP-Applications-15-2021-237,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-237,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-237 SKIP SUSE-RU-2021:0238-1 as SUSE-SLE-SAP-12-SP5-2021-238 is not security or has no CVEs. patches: SUSE-2021-238,SUSE-SLE-SAP-12-SP3-2021-238,SUSE-SLE-SAP-12-SP4-2021-238,SUSE-SLE-SAP-12-SP5-2021-238 SKIP SUSE-RU-2021:0239-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-239 is not security or has no CVEs. patches: SUSE-2021-239,SUSE-SLE-Module-Basesystem-15-SP2-2021-239 SKIP SUSE-RU-2021:0240-1 as SUSE-SLE-Module-Public-Cloud-15-2021-240 is not security or has no CVEs. patches: SUSE-2021-240,SUSE-SLE-Module-Public-Cloud-15-2021-240 SKIP SUSE-RU-2021:0244-1 as SUSE-SLE-SERVER-12-SP5-2021-244 is not security or has no CVEs. patches: SUSE-2021-244,SUSE-OpenStack-Cloud-9-2021-244,SUSE-OpenStack-Cloud-Crowbar-9-2021-244,SUSE-SLE-SAP-12-SP4-2021-244,SUSE-SLE-SDK-12-SP5-2021-244,SUSE-SLE-SERVER-12-SP4-LTSS-2021-244,SUSE-SLE-SERVER-12-SP5-2021-244 SKIP SUSE-RU-2021:0247-1 as SUSE-SLE-SERVER-12-SP5-2021-247 is not security or has no CVEs. patches: SUSE-2021-247,SUSE-OpenStack-Cloud-9-2021-247,SUSE-OpenStack-Cloud-Crowbar-9-2021-247,SUSE-SLE-HA-12-SP4-2021-247,SUSE-SLE-HA-12-SP5-2021-247,SUSE-SLE-SAP-12-SP4-2021-247,SUSE-SLE-SDK-12-SP5-2021-247,SUSE-SLE-SERVER-12-SP4-LTSS-2021-247,SUSE-SLE-SERVER-12-SP5-2021-247 SKIP SUSE-RU-2021:0250-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-250 is not security or has no CVEs. patches: SUSE-2021-250,SUSE-SLE-Module-Basesystem-15-SP2-2021-250,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-250 SKIP SUSE-RU-2021:0252-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-252 is not security or has no CVEs. patches: SUSE-2021-252,SUSE-SLE-Module-Basesystem-15-SP2-2021-252 SKIP SUSE-RU-2021:0253-1 as SUSE-SLE-SERVER-12-SP5-2021-253 is not security or has no CVEs. patches: SUSE-2021-253,SUSE-SLE-SERVER-12-SP5-2021-253 SKIP SUSE-RU-2021:0254-1 as SUSE-SLE-HA-12-SP3-2021-254 is not security or has no CVEs. patches: SUSE-2021-254,SUSE-SLE-HA-12-SP3-2021-254 SKIP SUSE-RU-2021:0255-1 as SUSE-SLE-Product-HA-15-SP1-2021-255 is not security or has no CVEs. patches: SUSE-2021-255,SUSE-SLE-Product-HA-15-SP1-2021-255 SKIP SUSE-RU-2021:0256-1 as SUSE-SLE-HA-12-SP5-2021-256 is not security or has no CVEs. patches: SUSE-2021-256,SUSE-SLE-HA-12-SP4-2021-256,SUSE-SLE-HA-12-SP5-2021-256 SKIP SUSE-RU-2021:0260-1 as SUSE-SLE-SAP-12-SP5-2021-260 is not security or has no CVEs. patches: SUSE-2021-260,SUSE-SLE-SAP-12-SP3-2021-260,SUSE-SLE-SAP-12-SP4-2021-260,SUSE-SLE-SAP-12-SP5-2021-260 SKIP SUSE-RU-2021:0261-1 as SUSE-Storage-7-2021-261 is not security or has no CVEs. patches: SUSE-2021-261,SUSE-Storage-7-2021-261 SKIP SUSE-RU-2021:0262-1 as SUSE-Storage-5-2021-262 is not security or has no CVEs. patches: SUSE-2021-262,SUSE-Storage-5-2021-262 SKIP SUSE-RU-2021:0264-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-264 is not security or has no CVEs. patches: SUSE-2021-264,SUSE-SLE-Module-Basesystem-15-SP2-2021-264 SKIP SUSE-RU-2021:0265-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-265 is not security or has no CVEs. patches: SUSE-2021-265,SUSE-SLE-INSTALLER-15-SP1-2021-265,SUSE-SLE-Module-Basesystem-15-SP2-2021-265 SKIP SUSE-RU-2021:0266-1 as SUSE-SLE-Product-HA-15-SP1-2021-266 is not security or has no CVEs. patches: SUSE-2021-266,SUSE-SLE-Module-Basesystem-15-SP1-2021-266,SUSE-SLE-Product-HA-15-SP1-2021-266 SKIP SUSE-RU-2021:0267-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-267 is not security or has no CVEs. patches: SUSE-2021-267,SUSE-SLE-INSTALLER-15-SP2-2021-267,SUSE-SLE-Module-Basesystem-15-SP2-2021-267 SKIP SUSE-RU-2021:0268-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-268 is not security or has no CVEs. patches: SUSE-2021-268,SUSE-SLE-Module-SAP-Applications-15-2021-268,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-268 SKIP SUSE-RU-2021:0269-1 as SUSE-SLE-SERVER-12-SP5-2021-269 is not security or has no CVEs. patches: SUSE-2021-269,SUSE-SLE-SDK-12-SP5-2021-269,SUSE-SLE-SERVER-12-SP5-2021-269 SKIP SUSE-RU-2021:0270-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-270 is not security or has no CVEs. patches: SUSE-2021-270,SUSE-SLE-Module-Basesystem-15-SP2-2021-270 SKIP SUSE-RU-2021:0271-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-271 is not security or has no CVEs. patches: SUSE-2021-271,SUSE-SLE-Module-Basesystem-15-SP2-2021-271 SKIP SUSE-RU-2021:0272-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-272 is not security or has no CVEs. patches: SUSE-2021-272,SUSE-SLE-Module-Basesystem-15-SP2-2021-272,SUSE-SLE-Module-Development-Tools-15-SP2-2021-272,SUSE-SLE-Module-Server-Applications-15-SP2-2021-272 SKIP SUSE-RU-2021:0273-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-273 is not security or has no CVEs. patches: SUSE-2021-273,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-273 SKIP SUSE-RU-2021:0274-1 as SUSE-SLE-SERVER-12-SP5-2021-274 is not security or has no CVEs. patches: SUSE-2021-274,SUSE-SLE-SERVER-12-SP5-2021-274 SKIP SUSE-RU-2021:0278-1 as SUSE-SLE-Product-HA-15-SP2-2021-278 is not security or has no CVEs. patches: SUSE-2021-278,SUSE-SLE-Module-Basesystem-15-SP2-2021-278,SUSE-SLE-Product-HA-15-SP2-2021-278 SKIP SUSE-RU-2021:0279-1 as SUSE-Storage-5-2021-279 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-279,SUSE-2021-279,SUSE-OpenStack-Cloud-7-2021-279,SUSE-OpenStack-Cloud-8-2021-279,SUSE-OpenStack-Cloud-9-2021-279,SUSE-OpenStack-Cloud-Crowbar-8-2021-279,SUSE-OpenStack-Cloud-Crowbar-9-2021-279,SUSE-SLE-SAP-12-SP2-2021-279,SUSE-SLE-SAP-12-SP3-2021-279,SUSE-SLE-SAP-12-SP4-2021-279,SUSE-SLE-SERVER-12-SP2-2021-279,SUSE-SLE-SERVER-12-SP2-BCL-2021-279,SUSE-SLE-SERVER-12-SP3-2021-279,SUSE-SLE-SERVER-12-SP3-BCL-2021-279,SUSE-SLE-SERVER-12-SP4-LTSS-2021-279,SUSE-SLE-SERVER-12-SP5-2021-279,SUSE-Storage-5-2021-279 SKIP SUSE-RU-2021:0280-1 as SUSE-SLE-Product-WE-15-SP2-2021-280 is not security or has no CVEs. patches: SUSE-2021-280,SUSE-SLE-Module-Basesystem-15-SP2-2021-280,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-280,SUSE-SLE-Product-WE-15-SP2-2021-280 SKIP SUSE-RU-2021:0281-1 as SUSE-SLE-Product-WE-15-SP2-2021-281 is not security or has no CVEs. patches: SUSE-2021-281,SUSE-SLE-Module-Basesystem-15-SP2-2021-281,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-281,SUSE-SLE-Product-WE-15-SP2-2021-281 SKIP SUSE-RU-2021:0282-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-282 is not security or has no CVEs. patches: SUSE-2021-282,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-282 SKIP SUSE-RU-2021:0283-1 as SUSE-SLE-Module-HPC-15-SP2-2021-283 is not security or has no CVEs. patches: SUSE-2021-283,SUSE-SLE-Module-Development-Tools-15-SP2-2021-283,SUSE-SLE-Module-HPC-15-SP2-2021-283 SKIP SUSE-RU-2021:0288-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-288 is not security or has no CVEs. patches: SUSE-2021-288,SUSE-SLE-Module-Basesystem-15-SP2-2021-288,SUSE-SLE-Module-Server-Applications-15-SP2-2021-288 SKIP SUSE-RU-2021:0289-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-289 is not security or has no CVEs. patches: SUSE-2021-289,SUSE-SLE-Module-Basesystem-15-SP2-2021-289 SKIP SUSE-RU-2021:0292-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-292 is not security or has no CVEs. patches: SUSE-2021-292,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-292,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-292 SKIP SUSE-RU-2021:0293-1 as SUSE-Storage-6-2021-293 is not security or has no CVEs. patches: SUSE-2021-293,SUSE-SLE-Module-Basesystem-15-SP2-2021-293,SUSE-SLE-Module-Basesystem-15-SP3-2021-293,SUSE-SLE-Module-Development-Tools-15-SP2-2021-293,SUSE-SLE-Module-Development-Tools-15-SP3-2021-293,SUSE-SLE-Product-HPC-15-2021-293,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-293,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-293,SUSE-SLE-Product-SLES-15-2021-293,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-293,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-293,SUSE-SLE-Product-SLES_SAP-15-2021-293,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-293,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-293,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-293,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-293,SUSE-Storage-6-2021-293 SKIP SUSE-RU-2021:0294-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-294 is not security or has no CVEs. patches: SUSE-2021-294,SUSE-SLE-INSTALLER-15-SP2-2021-294,SUSE-SLE-Module-Basesystem-15-SP2-2021-294,SUSE-SLE-Module-Development-Tools-15-SP2-2021-294,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-294,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-294,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-294 SKIP SUSE-RU-2021:0295-1 as SUSE-Storage-6-2021-295 is not security or has no CVEs. patches: SUSE-2021-295,SUSE-SLE-Module-Basesystem-15-SP2-2021-295,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-295,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-295,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-295,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-295,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-295,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-295,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-295,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-295,SUSE-Storage-6-2021-295 SKIP SUSE-RU-2021:0296-1 as SUSE-Storage-6-2021-296 is not security or has no CVEs. patches: SUSE-2021-296,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-296,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-296,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-296,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-296,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-296,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-296,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-296,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-296,SUSE-Storage-6-2021-296 SKIP SUSE-RU-2021:0301-1 as SUSE-Storage-6-2021-301 is not security or has no CVEs. patches: SUSE-2021-301,SUSE-SLE-Module-Basesystem-15-SP2-2021-301,SUSE-SLE-Module-Basesystem-15-SP3-2021-301,SUSE-SLE-Product-HPC-15-2021-301,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-301,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-301,SUSE-SLE-Product-SLES-15-2021-301,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-301,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-301,SUSE-SLE-Product-SLES_SAP-15-2021-301,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-301,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-301,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-301,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-301,SUSE-Storage-6-2021-301 SKIP SUSE-RU-2021:0302-1 as SUSE-SLE-Product-HA-15-SP2-2021-302 is not security or has no CVEs. patches: SUSE-2021-302,SUSE-SLE-Module-Basesystem-15-SP2-2021-302,SUSE-SLE-Product-HA-15-SP2-2021-302 SKIP SUSE-RU-2021:0303-1 as SUSE-SLE-Module-Public-Cloud-12-2021-303 is not security or has no CVEs. patches: SUSE-2021-303,SUSE-SLE-Module-Public-Cloud-12-2021-303 SKIP SUSE-RU-2021:0304-1 as SUSE-Storage-6-2021-304 is not security or has no CVEs. patches: SUSE-2021-304,SUSE-SLE-Product-HA-15-SP1-2021-304,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-304,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-304,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-304,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-304,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-304,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-304,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-304,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-304,SUSE-Storage-6-2021-304 SKIP SUSE-RU-2021:0305-1 as SUSE-Storage-6-2021-305 is not security or has no CVEs. patches: SUSE-2021-305,SUSE-SLE-INSTALLER-15-2021-305,SUSE-SLE-INSTALLER-15-SP1-2021-305,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-305,SUSE-SLE-Product-HPC-15-2021-305,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-305,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-305,SUSE-SLE-Product-SLES-15-2021-305,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-305,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-305,SUSE-SLE-Product-SLES_SAP-15-2021-305,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-305,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-305,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-305,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-305,SUSE-Storage-6-2021-305 SKIP SUSE-RU-2021:0307-1 as SUSE-Storage-6-2021-307 is not security or has no CVEs. patches: SUSE-2021-307,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-307,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-307,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-307,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-307,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-307,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-307,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-307,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-307,SUSE-Storage-6-2021-307 SKIP SUSE-RU-2021:0310-1 as SUSE-Storage-5-2021-310 is not security or has no CVEs. patches: SUSE-2021-310,SUSE-Storage-5-2021-310 SKIP SUSE-RU-2021:0312-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-312 is not security or has no CVEs. patches: SUSE-2021-312,SUSE-SLE-Module-Development-Tools-15-SP2-2021-312 SKIP SUSE-RU-2021:0313-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-313 is not security or has no CVEs. patches: SUSE-2021-313,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-313 SKIP SUSE-RU-2021:0314-1 as SUSE-SLE-Module-Containers-12-2021-314 is not security or has no CVEs. patches: SUSE-2021-314,SUSE-SLE-Manager-Tools-12-2021-314,SUSE-SLE-Module-Containers-12-2021-314 SKIP SUSE-RU-2021:0319-1 as SUSE-SLE-POS-12-SP2-2021-319 is not security or has no CVEs. patches: SUSE-2021-319,SUSE-SLE-Manager-Tools-12-2021-319,SUSE-SLE-Module-Adv-Systems-Management-12-2021-319,SUSE-SLE-POS-12-SP2-2021-319 SKIP SUSE-RU-2021:0324-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-324 is not security or has no CVEs. patches: SUSE-2021-324,SUSE-SLE-Module-Basesystem-15-SP2-2021-324,SUSE-SLE-Module-Python2-15-SP2-2021-324,SUSE-SLE-Module-Server-Applications-15-SP2-2021-324 SKIP SUSE-RU-2021:0325-1 as SUSE-SLE-Product-SLES_SAP-15-2021-325 is not security or has no CVEs. patches: SUSE-2021-325,SUSE-SLE-Product-HPC-15-2021-325,SUSE-SLE-Product-SLES-15-2021-325,SUSE-SLE-Product-SLES_SAP-15-2021-325 SKIP SUSE-RU-2021:0327-1 as SUSE-SLE-Module-Server-Applications-15-SP1-2021-327 is not security or has no CVEs. patches: SUSE-2021-327,SUSE-SLE-Module-Basesystem-15-SP1-2021-327,SUSE-SLE-Module-Python2-15-SP1-2021-327,SUSE-SLE-Module-Server-Applications-15-SP1-2021-327 SKIP SUSE-RU-2021:0331-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-331 is not security or has no CVEs. patches: SUSE-2021-331,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-331,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-331,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-331 SKIP SUSE-RU-2021:0332-1 as SUSE-SLE-Manager-Tools-12-2021-332 is not security or has no CVEs. patches: SUSE-2021-332,SUSE-SLE-Manager-Tools-12-2021-332 SKIP SUSE-RU-2021:0333-1 as SUSE-SLE-Manager-Tools-15-2021-333 is not security or has no CVEs. patches: SUSE-2021-333,SUSE-SLE-Manager-Tools-15-2021-333 SKIP SUSE-RU-2021:0334-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-334 is not security or has no CVEs. patches: SUSE-2021-334,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-334,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-334 SKIP SUSE-RU-2021:0337-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-337 is not security or has no CVEs. patches: SUSE-2021-337,SUSE-SLE-Module-Development-Tools-15-SP2-2021-337 SKIP SUSE-RU-2021:0338-1 as SUSE-SLE-Product-SLES-15-SP2-2021-338 is not security or has no CVEs. patches: SUSE-2021-338,SUSE-SLE-INSTALLER-15-SP2-2021-338,SUSE-SLE-Product-SLES-15-SP2-2021-338 SKIP SUSE-RU-2021:0349-1 as SUSE-SLE-SERVER-12-SP5-2021-349 is not security or has no CVEs. patches: SUSE-2021-349,SUSE-SLE-SDK-12-SP5-2021-349,SUSE-SLE-SERVER-12-SP5-2021-349 SKIP SUSE-RU-2021:0350-1 as SUSE-SLE-INSTALLER-15-SP1-2021-350 is not security or has no CVEs. patches: SUSE-2021-350,SUSE-SLE-INSTALLER-15-SP1-2021-350 SKIP SUSE-RU-2021:0356-1 as SUSE-SLE-SERVER-12-SP5-2021-356 is not security or has no CVEs. patches: SUSE-2021-356,SUSE-SLE-SDK-12-SP5-2021-356,SUSE-SLE-SERVER-12-SP5-2021-356 SKIP SUSE-RU-2021:0357-1 as SUSE-SLE-Product-WE-15-SP2-2021-357 is not security or has no CVEs. patches: SUSE-2021-357,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-357,SUSE-SLE-Product-WE-15-SP2-2021-357 SKIP SUSE-RU-2021:0358-1 as SUSE-SLE-SERVER-12-SP5-2021-358 is not security or has no CVEs. patches: SUSE-2021-358,SUSE-SLE-SDK-12-SP5-2021-358,SUSE-SLE-SERVER-12-SP5-2021-358 SKIP SUSE-RU-2021:0415-1 as SUSE-SLE-Module-Public-Cloud-15-2021-415 is not security or has no CVEs. patches: SUSE-2021-415,SUSE-SLE-Module-Public-Cloud-15-2021-415 SKIP SUSE-RU-2021:0416-1 as SUSE-Storage-6-2021-416 is not security or has no CVEs. patches: SUSE-2021-416,SUSE-Storage-6-2021-416 SKIP SUSE-RU-2021:0417-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-417 is not security or has no CVEs. patches: SUSE-2021-417,SUSE-SLE-Module-Development-Tools-15-SP2-2021-417 SKIP SUSE-RU-2021:0418-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-418 is not security or has no CVEs. patches: SUSE-2021-418,SUSE-SLE-Module-Basesystem-15-SP2-2021-418 SKIP SUSE-RU-2021:0419-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-419 is not security or has no CVEs. patches: SUSE-2021-419,SUSE-SLE-Module-Basesystem-15-SP2-2021-419 SKIP SUSE-RU-2021:0420-1 as SUSE-SLE-SERVER-12-SP5-2021-420 is not security or has no CVEs. patches: SUSE-2021-420,SUSE-SLE-SERVER-12-SP5-2021-420 SKIP SUSE-RU-2021:0421-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-421 is not security or has no CVEs. patches: SUSE-2021-421,SUSE-SLE-Manager-Tools-15-2021-421,SUSE-SLE-Module-Basesystem-15-SP2-2021-421,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-421,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-421,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-421,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-421 SKIP SUSE-RU-2021:0442-1 as SUSE-SLE-Product-WE-15-SP2-2021-442 is not security or has no CVEs. patches: SUSE-2021-442,SUSE-SLE-Product-WE-15-SP2-2021-442 SKIP SUSE-RU-2021:0447-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-447 is not security or has no CVEs. patches: SUSE-2021-447,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-447,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-447,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-447 SKIP SUSE-RU-2021:0448-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-448 is not security or has no CVEs. patches: SUSE-2021-448,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-448 SKIP SUSE-RU-2021:0450-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-450 is not security or has no CVEs. patches: SUSE-2021-450,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-450,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-450 SKIP SUSE-RU-2021:0457-1 as SUSE-SLE-Live-Patching-12-SP5-2021-458 is not security or has no CVEs. patches: SUSE-2021-457,SUSE-SLE-Live-Patching-12-SP5-2021-453,SUSE-SLE-Live-Patching-12-SP5-2021-454,SUSE-SLE-Live-Patching-12-SP5-2021-455,SUSE-SLE-Live-Patching-12-SP5-2021-456,SUSE-SLE-Live-Patching-12-SP5-2021-457,SUSE-SLE-Live-Patching-12-SP5-2021-458 SKIP SUSE-RU-2021:0459-1 as SUSE-2021-459 is not security or has no CVEs. patches: SUSE-2021-459,SUSE-SLE-Manager-Tools-12-2021-459 SKIP SUSE-RU-2021:0464-1 as SUSE-2021-464 is not security or has no CVEs. patches: SUSE-2021-464,SUSE-SLE-Manager-Tools-15-2021-464 SKIP SUSE-RU-2021:0465-1 as SUSE-2021-465 is not security or has no CVEs. patches: SUSE-2021-465,SUSE-SLE-Manager-Tools-15-2021-465 ERROR: notice SUSE-RU-2021:0468-1 has no valid patches out of: SUSE-2021-468,SUSE-Debian-9.0-CLIENT-TOOLS-BETA-x86_64-2021-468 SKIP SUSE-RU-2021:0470-1 as SUSE-2021-470 is not security or has no CVEs. patches: SUSE-2021-470,SUSE-SLE-Manager-Tools-12-2021-470 SKIP SUSE-RU-2021:0471-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-471 is not security or has no CVEs. patches: SUSE-2021-471,SUSE-SLE-Module-Server-Applications-15-SP2-2021-471 SKIP SUSE-RU-2021:0472-1 as SUSE-SLE-Product-HA-15-SP2-2021-472 is not security or has no CVEs. patches: SUSE-2021-472,SUSE-SLE-Product-HA-15-SP2-2021-472 SKIP SUSE-RU-2021:0493-1 as SUSE-SLE-Product-SLES_SAP-15-2021-493 is not security or has no CVEs. patches: SUSE-2021-493,SUSE-SLE-Module-Development-Tools-15-SP2-2021-493,SUSE-SLE-Product-HPC-15-2021-493,SUSE-SLE-Product-SLES-15-2021-493,SUSE-SLE-Product-SLES_SAP-15-2021-493 SKIP SUSE-RU-2021:0495-1 as SUSE-SLE-Product-WE-15-SP1-2021-495 is not security or has no CVEs. patches: SUSE-2021-495,SUSE-SLE-Product-WE-15-SP1-2021-495 SKIP SUSE-RU-2021:0496-1 as SUSE-SLE-SERVER-12-SP5-2021-496 is not security or has no CVEs. patches: SUSE-2021-496,SUSE-SLE-SERVER-12-SP5-2021-496 SKIP SUSE-RU-2021:0499-1 as SUSE-SLE-Product-WE-15-SP2-2021-499 is not security or has no CVEs. patches: SUSE-2021-499,SUSE-SLE-Product-WE-15-SP2-2021-499 SKIP SUSE-RU-2021:0500-1 as SUSE-Storage-7-2021-500 is not security or has no CVEs. patches: SUSE-2021-500,SUSE-Storage-7-2021-500 SKIP SUSE-RU-2021:0501-1 as SUSE-SLE-Product-SLES_SAP-15-2021-501 is not security or has no CVEs. patches: SUSE-2021-501,SUSE-SLE-Product-HPC-15-2021-501,SUSE-SLE-Product-SLES-15-2021-501,SUSE-SLE-Product-SLES_SAP-15-2021-501 SKIP SUSE-RU-2021:0502-1 as SUSE-Storage-6-2021-502 is not security or has no CVEs. patches: SUSE-2021-502,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-502,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-502,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-502,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-502,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-502,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-502,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-502,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-502,SUSE-Storage-6-2021-502 SKIP SUSE-RU-2021:0509-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-509 is not security or has no CVEs. patches: SUSE-2021-509,SUSE-SLE-Module-Basesystem-15-SP2-2021-509 SKIP SUSE-RU-2021:0510-1 as SUSE-SLE-Product-SLES_SAP-15-2021-510 is not security or has no CVEs. patches: SUSE-2021-510,SUSE-SLE-Product-HPC-15-2021-510,SUSE-SLE-Product-SLES_SAP-15-2021-510 SKIP SUSE-RU-2021:0514-1 as SUSE-SLE-SERVER-12-SP5-2021-514 is not security or has no CVEs. patches: SUSE-2021-514,SUSE-SLE-SERVER-12-SP5-2021-514 SKIP SUSE-RU-2021:0516-1 as SUSE-SLE-Module-Containers-15-SP2-2021-516 is not security or has no CVEs. patches: SUSE-2021-516,SUSE-SLE-Module-Containers-15-SP2-2021-516 SKIP SUSE-RU-2021:0517-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-517 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-517,SUSE-2021-517,SUSE-OpenStack-Cloud-7-2021-517,SUSE-OpenStack-Cloud-8-2021-517,SUSE-OpenStack-Cloud-9-2021-517,SUSE-OpenStack-Cloud-Crowbar-8-2021-517,SUSE-OpenStack-Cloud-Crowbar-9-2021-517,SUSE-SLE-SAP-12-SP2-2021-517,SUSE-SLE-SAP-12-SP3-2021-517,SUSE-SLE-SAP-12-SP4-2021-517,SUSE-SLE-SERVER-12-SP2-2021-517,SUSE-SLE-SERVER-12-SP2-BCL-2021-517,SUSE-SLE-SERVER-12-SP3-2021-517,SUSE-SLE-SERVER-12-SP3-BCL-2021-517,SUSE-SLE-SERVER-12-SP4-LTSS-2021-517 SKIP SUSE-RU-2021:0518-1 as SUSE-SLE-Product-WE-15-SP2-2021-518 is not security or has no CVEs. patches: SUSE-2021-518,SUSE-SLE-Product-WE-15-SP2-2021-518 SKIP SUSE-RU-2021:0519-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-519 is not security or has no CVEs. patches: SUSE-2021-519,SUSE-SLE-Module-Basesystem-15-SP2-2021-519,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-519,SUSE-SLE-Module-Server-Applications-15-SP2-2021-519 SKIP SUSE-RU-2021:0524-1 as SUSE-Storage-6-2021-524 is not security or has no CVEs. patches: SUSE-2021-524,SUSE-SLE-Module-Development-Tools-15-SP2-2021-524,SUSE-SLE-Module-Development-Tools-15-SP3-2021-524,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-524,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-524,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-524,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-524,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-524,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-524,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-524,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-524,SUSE-Storage-6-2021-524 SKIP SUSE-RU-2021:0525-1 as SUSE-Storage-6-2021-525 is not security or has no CVEs. patches: SUSE-2021-525,SUSE-SLE-Module-Development-Tools-15-SP2-2021-525,SUSE-SLE-Module-Development-Tools-15-SP3-2021-525,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-525,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-525,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-525,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-525,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-525,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-525,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-525,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-525,SUSE-Storage-6-2021-525 SKIP SUSE-RU-2021:0526-1 as SUSE-Storage-6-2021-526 is not security or has no CVEs. patches: SUSE-2021-526,SUSE-SLE-Module-Basesystem-15-SP2-2021-526,SUSE-SLE-Module-Public-Cloud-15-2021-526,SUSE-SLE-Module-Python2-15-SP2-2021-526,SUSE-SLE-Product-HPC-15-2021-526,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-526,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-526,SUSE-SLE-Product-SLES-15-2021-526,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-526,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-526,SUSE-SLE-Product-SLES_SAP-15-2021-526,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-526,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-526,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-526,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-526,SUSE-Storage-6-2021-526 SKIP SUSE-RU-2021:0538-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-538 is not security or has no CVEs. patches: SUSE-2021-538,SUSE-SLE-Module-Basesystem-15-SP2-2021-538,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-538 SKIP SUSE-RU-2021:0539-1 as SUSE-SLE-SERVER-12-SP5-2021-539 is not security or has no CVEs. patches: SUSE-2021-539,SUSE-SLE-SERVER-12-SP5-2021-539 SKIP SUSE-RU-2021:0540-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-540 is not security or has no CVEs. patches: SUSE-2021-540,SUSE-SLE-Module-Basesystem-15-SP2-2021-540,SUSE-SLE-Module-Server-Applications-15-SP2-2021-540 SKIP SUSE-RU-2021:0541-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-541 is not security or has no CVEs. patches: SUSE-2021-541,SUSE-SLE-INSTALLER-15-SP2-2021-541,SUSE-SLE-Module-Basesystem-15-SP2-2021-541 SKIP SUSE-RU-2021:0542-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-542 is not security or has no CVEs. patches: SUSE-2021-542,SUSE-SLE-Module-Basesystem-15-SP2-2021-542 SKIP SUSE-RU-2021:0547-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-547 is not security or has no CVEs. patches: SUSE-2021-547,SUSE-SLE-Module-Basesystem-15-SP2-2021-547 SKIP SUSE-RU-2021:0552-1 as SUSE-SLE-SERVER-12-SP5-2021-552 is not security or has no CVEs. patches: SUSE-2021-552,SUSE-SLE-SERVER-12-SP5-2021-552 SKIP SUSE-RU-2021:0553-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2021-554 is not security or has no CVEs. patches: SUSE-2021-553,SUSE-SLE-Live-Patching-12-2021-553,SUSE-SLE-Live-Patching-12-SP3-2021-553,SUSE-SLE-Live-Patching-12-SP4-2021-553,SUSE-SLE-Live-Patching-12-SP5-2021-553,SUSE-SLE-Module-Live-Patching-15-2021-554,SUSE-SLE-Module-Live-Patching-15-SP1-2021-554,SUSE-SLE-Module-Live-Patching-15-SP2-2021-554 SKIP SUSE-RU-2021:0555-1 as SUSE-SLE-SERVER-12-SP5-2021-555 is not security or has no CVEs. patches: SUSE-2021-555,SUSE-SLE-SDK-12-SP5-2021-555,SUSE-SLE-SERVER-12-SP5-2021-555 SKIP SUSE-RU-2021:0556-1 as SUSE-Storage-6-2021-556 is not security or has no CVEs. patches: SUSE-2021-556,SUSE-SLE-Module-Basesystem-15-SP2-2021-556,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-556,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-556,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-556,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-556,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-556,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-556,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-556,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-556,SUSE-Storage-6-2021-556 SKIP SUSE-RU-2021:0568-1 as SUSE-SLE-Live-Patching-12-SP5-2021-569 is not security or has no CVEs. patches: SUSE-2021-568,SUSE-SLE-Live-Patching-12-SP5-2021-557,SUSE-SLE-Live-Patching-12-SP5-2021-558,SUSE-SLE-Live-Patching-12-SP5-2021-559,SUSE-SLE-Live-Patching-12-SP5-2021-560,SUSE-SLE-Live-Patching-12-SP5-2021-561,SUSE-SLE-Live-Patching-12-SP5-2021-564,SUSE-SLE-Live-Patching-12-SP5-2021-566,SUSE-SLE-Live-Patching-12-SP5-2021-567,SUSE-SLE-Live-Patching-12-SP5-2021-568,SUSE-SLE-Live-Patching-12-SP5-2021-569 SKIP SUSE-RU-2021:0570-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-570 is not security or has no CVEs. patches: SUSE-2021-570,SUSE-SLE-Module-Server-Applications-15-SP2-2021-570 SKIP SUSE-RU-2021:0571-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-571 is not security or has no CVEs. patches: SUSE-2021-571,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-571,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-571,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-571 SKIP SUSE-RU-2021:0572-1 as SUSE-Storage-6-2021-572 is not security or has no CVEs. patches: SUSE-2021-572,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-572,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-572,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-572,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-572,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-572,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-572,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-572,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-572,SUSE-Storage-6-2021-572 SKIP SUSE-RU-2021:0573-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-573 is not security or has no CVEs. patches: SUSE-2021-573,SUSE-SLE-Module-Basesystem-15-SP2-2021-573 SKIP SUSE-RU-2021:0577-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-577 is not security or has no CVEs. patches: SUSE-2021-577,SUSE-SLE-Module-Basesystem-15-SP2-2021-577 SKIP SUSE-RU-2021:0578-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-578 is not security or has no CVEs. patches: SUSE-2021-578,SUSE-SLE-INSTALLER-15-SP2-2021-578,SUSE-SLE-Module-Basesystem-15-SP2-2021-578 SKIP SUSE-RU-2021:0579-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-579 is not security or has no CVEs. patches: SUSE-2021-579,SUSE-SLE-Module-Basesystem-15-SP2-2021-579 SKIP SUSE-RU-2021:0588-1 as SUSE-SLE-SERVER-12-SP5-2021-588 is not security or has no CVEs. patches: SUSE-2021-588,SUSE-SLE-SDK-12-SP5-2021-588,SUSE-SLE-SERVER-12-SP5-2021-588 SKIP SUSE-RU-2021:0589-1 as SUSE-SLE-Product-HA-15-SP2-2021-589 is not security or has no CVEs. patches: SUSE-2021-589,SUSE-SLE-Product-HA-15-2021-589,SUSE-SLE-Product-HA-15-SP1-2021-589,SUSE-SLE-Product-HA-15-SP2-2021-589 SKIP SUSE-RU-2021:0590-1 as SUSE-SLE-SERVER-12-SP5-2021-590 is not security or has no CVEs. patches: SUSE-2021-590,SUSE-SLE-SDK-12-SP5-2021-590,SUSE-SLE-SERVER-12-SP5-2021-590 SKIP SUSE-RU-2021:0596-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-596 is not security or has no CVEs. patches: SUSE-2021-596,SUSE-SLE-Module-Basesystem-15-SP2-2021-596,SUSE-SLE-Module-Development-Tools-15-SP2-2021-596 SKIP SUSE-RU-2021:0604-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-604 is not security or has no CVEs. patches: SUSE-2021-604,SUSE-SLE-Module-Development-Tools-15-SP2-2021-604 SKIP SUSE-RU-2021:0609-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-609 is not security or has no CVEs. patches: SUSE-2021-609,SUSE-SLE-INSTALLER-15-SP2-2021-609,SUSE-SLE-Module-Basesystem-15-SP2-2021-609 SKIP SUSE-RU-2021:0610-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-610 is not security or has no CVEs. patches: SUSE-2021-610,SUSE-OpenStack-Cloud-7-2021-610,SUSE-SLE-SAP-12-SP2-2021-610,SUSE-SLE-SERVER-12-SP2-2021-610,SUSE-SLE-SERVER-12-SP2-BCL-2021-610 SKIP SUSE-RU-2021:0611-1 as SUSE-SLE-HA-12-SP3-2021-611 is not security or has no CVEs. patches: SUSE-2021-611,SUSE-SLE-HA-12-SP3-2021-611 SKIP SUSE-RU-2021:0613-1 as SUSE-SLE-SERVER-12-SP5-2021-613 is not security or has no CVEs. patches: SUSE-2021-613,SUSE-SLE-SDK-12-SP5-2021-613,SUSE-SLE-SERVER-12-SP5-2021-613 SKIP SUSE-RU-2021:0614-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-614 is not security or has no CVEs. patches: SUSE-2021-614,SUSE-SLE-INSTALLER-15-SP2-2021-614,SUSE-SLE-Module-Basesystem-15-SP2-2021-614 SKIP SUSE-RU-2021:0615-1 as SUSE-SLE-SERVER-12-SP5-2021-615 is not security or has no CVEs. patches: SUSE-2021-615,SUSE-SLE-SERVER-12-SP5-2021-615 SKIP SUSE-RU-2021:0616-1 as SUSE-SLE-Module-Python2-15-SP2-2021-616 is not security or has no CVEs. patches: SUSE-2021-616,SUSE-SLE-Module-Python2-15-SP2-2021-616 ERROR: notice SUSE-RU-2021:0634-1 has no valid patches out of: SUSE-2021-634,SUSE-Debian-9.0-CLIENT-TOOLS-BETA-x86_64-2021-634 ERROR: notice SUSE-RU-2021:0640-1 has no valid patches out of: SUSE-2021-640,SUSE-Debian-10-CLIENT-TOOLS-BETA-x86_64-2021-640 SKIP SUSE-RU-2021:0641-1 as SUSE-2021-641 is not security or has no CVEs. patches: SUSE-2021-641,SUSE-SLE-Manager-Tools-15-2021-641 SKIP SUSE-RU-2021:0643-1 as SUSE-2021-643 is not security or has no CVEs. patches: SUSE-2021-643,SUSE-SLE-Manager-Tools-12-2021-643 SKIP SUSE-RU-2021:0644-1 as SUSE-2021-644 is not security or has no CVEs. patches: SUSE-2021-644,SUSE-SLE-Manager-Tools-15-2021-644 SKIP SUSE-RU-2021:0646-1 as SUSE-SLE-HA-12-SP5-2021-646 is not security or has no CVEs. patches: SUSE-2021-646,SUSE-SLE-HA-12-SP4-2021-646,SUSE-SLE-HA-12-SP5-2021-646 SKIP SUSE-RU-2021:0655-1 as SUSE-SLE-Product-HA-15-SP2-2021-655 is not security or has no CVEs. patches: SUSE-2021-655,SUSE-SLE-Product-HA-15-SP1-2021-655,SUSE-SLE-Product-HA-15-SP2-2021-655 SKIP SUSE-RU-2021:0656-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-656 is not security or has no CVEs. patches: SUSE-2021-656,SUSE-SLE-INSTALLER-15-SP2-2021-656,SUSE-SLE-Module-Basesystem-15-SP2-2021-656,SUSE-SLE-Module-Development-Tools-15-SP2-2021-656,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-656,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-656,SUSE-SLE-Module-Python2-15-SP2-2021-656,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-656 SKIP SUSE-RU-2021:0657-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-657 is not security or has no CVEs. patches: SUSE-2021-657,SUSE-SLE-INSTALLER-15-SP2-2021-657,SUSE-SLE-Module-Basesystem-15-SP2-2021-657 SKIP SUSE-RU-2021:0660-1 as SUSE-SLE-SERVER-12-SP5-2021-660 is not security or has no CVEs. patches: SUSE-2021-660,SUSE-SLE-SERVER-12-SP5-2021-660 SKIP SUSE-RU-2021:0671-1 as SUSE-SLE-Product-SLES-15-SP2-2021-671 is not security or has no CVEs. patches: SUSE-2021-671,SUSE-SLE-INSTALLER-15-SP2-2021-671,SUSE-SLE-Product-SLES-15-SP2-2021-671 SKIP SUSE-RU-2021:0672-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-672 is not security or has no CVEs. patches: SUSE-2021-672,SUSE-SLE-Module-Basesystem-15-SP2-2021-672 SKIP SUSE-RU-2021:0677-1 as SUSE-SLE-SERVER-12-SP5-2021-677 is not security or has no CVEs. patches: SUSE-2021-677,SUSE-SLE-SERVER-12-SP5-2021-677 SKIP SUSE-RU-2021:0690-1 as SUSE-Storage-6-2021-690 is not security or has no CVEs. patches: SUSE-2021-690,SUSE-SLE-Module-Basesystem-15-SP2-2021-690,SUSE-SLE-Product-HPC-15-2021-690,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-690,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-690,SUSE-SLE-Product-SLES-15-2021-690,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-690,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-690,SUSE-SLE-Product-SLES_SAP-15-2021-690,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-690,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-690,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-690,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-690,SUSE-Storage-6-2021-690 SKIP SUSE-RU-2021:0697-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-697 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-697,SUSE-2021-697,SUSE-OpenStack-Cloud-7-2021-697,SUSE-OpenStack-Cloud-8-2021-697,SUSE-OpenStack-Cloud-Crowbar-8-2021-697,SUSE-SLE-SAP-12-SP2-2021-697,SUSE-SLE-SAP-12-SP3-2021-697,SUSE-SLE-SERVER-12-SP2-2021-697,SUSE-SLE-SERVER-12-SP2-BCL-2021-697,SUSE-SLE-SERVER-12-SP3-2021-697,SUSE-SLE-SERVER-12-SP3-BCL-2021-697 SKIP SUSE-RU-2021:0698-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-698 is not security or has no CVEs. patches: SUSE-2021-698,SUSE-SLE-INSTALLER-15-SP2-2021-698,SUSE-SLE-Module-Basesystem-15-SP2-2021-698 SKIP SUSE-RU-2021:0699-1 as SUSE-SLE-Product-HA-15-2021-699 is not security or has no CVEs. patches: SUSE-2021-699,SUSE-SLE-Product-HA-15-2021-699 SKIP SUSE-RU-2021:0700-1 as SUSE-SLE-SERVER-12-SP5-2021-700 is not security or has no CVEs. patches: SUSE-2021-700,SUSE-SLE-SDK-12-SP5-2021-700,SUSE-SLE-SERVER-12-SP5-2021-700 SKIP SUSE-RU-2021:0701-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-701 is not security or has no CVEs. patches: SUSE-2021-701,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-701,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-701 SKIP SUSE-RU-2021:0702-1 as SUSE-SLE-Product-HA-15-SP1-2021-702 is not security or has no CVEs. patches: SUSE-2021-702,SUSE-SLE-Product-HA-15-SP1-2021-702 SKIP SUSE-RU-2021:0703-1 as SUSE-SLE-Product-HA-15-SP2-2021-703 is not security or has no CVEs. patches: SUSE-2021-703,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-703,SUSE-SLE-Product-HA-15-SP2-2021-703 SKIP SUSE-RU-2021:0704-1 as SUSE-SLE-Product-HA-15-2021-704 is not security or has no CVEs. patches: SUSE-2021-704,SUSE-SLE-Product-HA-15-2021-704 SKIP SUSE-RU-2021:0705-1 as SUSE-Storage-7-2021-705 is not security or has no CVEs. patches: SUSE-2021-705,SUSE-Storage-7-2021-705 SKIP SUSE-RU-2021:0706-1 as SUSE-SLE-HA-12-SP5-2021-706 is not security or has no CVEs. patches: SUSE-2021-706,SUSE-SLE-HA-12-SP3-2021-706,SUSE-SLE-HA-12-SP4-2021-706,SUSE-SLE-HA-12-SP5-2021-706 SKIP SUSE-RU-2021:0707-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-707 is not security or has no CVEs. patches: SUSE-2021-707,SUSE-SLE-Module-Basesystem-15-SP2-2021-707 SKIP SUSE-RU-2021:0708-1 as SUSE-SLE-SERVER-12-SP5-2021-708 is not security or has no CVEs. patches: SUSE-2021-708,SUSE-SLE-SERVER-12-SP5-2021-708 SKIP SUSE-RU-2021:0709-1 as SUSE-SLE-SDK-12-SP5-2021-709 is not security or has no CVEs. patches: SUSE-2021-709,SUSE-SLE-SDK-12-SP5-2021-709 SKIP SUSE-RU-2021:0715-1 as SUSE-SLE-Module-Public-Cloud-12-2021-715 is not security or has no CVEs. patches: SUSE-2021-715,SUSE-SLE-Module-Public-Cloud-12-2021-715 SKIP SUSE-RU-2021:0717-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-717 is not security or has no CVEs. patches: SUSE-2021-717,SUSE-SLE-Module-Server-Applications-15-SP2-2021-717 SKIP SUSE-RU-2021:0718-1 as SUSE-SLE-SERVER-12-SP5-2021-718 is not security or has no CVEs. patches: SUSE-2021-718,SUSE-SLE-SERVER-12-SP5-2021-718 SKIP SUSE-RU-2021:0726-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-726 is not security or has no CVEs. patches: SUSE-2021-726,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-726,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-726 SKIP SUSE-RU-2021:0728-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-728 is not security or has no CVEs. patches: SUSE-2021-728,SUSE-SLE-Module-Basesystem-15-SP2-2021-728 SKIP SUSE-RU-2021:0729-1 as SUSE-Storage-6-2021-729 is not security or has no CVEs. patches: SUSE-2021-729,SUSE-SLE-INSTALLER-15-SP1-2021-729,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-729,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-729,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-729,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-729,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-729,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-729,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-729,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-729,SUSE-Storage-6-2021-729 SKIP SUSE-RU-2021:0730-1 as SUSE-SLE-SERVER-12-SP5-2021-730 is not security or has no CVEs. patches: SUSE-2021-730,SUSE-OpenStack-Cloud-9-2021-730,SUSE-OpenStack-Cloud-Crowbar-9-2021-730,SUSE-SLE-SAP-12-SP4-2021-730,SUSE-SLE-SDK-12-SP5-2021-730,SUSE-SLE-SERVER-12-SP4-LTSS-2021-730,SUSE-SLE-SERVER-12-SP5-2021-730 SKIP SUSE-RU-2021:0731-1 as SUSE-SLE-Module-Public-Cloud-12-2021-731 is not security or has no CVEs. patches: SUSE-2021-731,SUSE-SLE-Module-Public-Cloud-12-2021-731 SKIP SUSE-RU-2021:0734-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-734 is not security or has no CVEs. patches: SUSE-2021-734,SUSE-SLE-Module-Server-Applications-15-SP2-2021-734 SKIP SUSE-RU-2021:0746-1 as SUSE-SLE-Product-WE-15-SP2-2021-746 is not security or has no CVEs. patches: SUSE-2021-746,SUSE-SLE-Module-Basesystem-15-SP2-2021-746,SUSE-SLE-Module-Development-Tools-15-SP2-2021-746,SUSE-SLE-Product-WE-15-SP2-2021-746 SKIP SUSE-RU-2021:0747-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-747 is not security or has no CVEs. patches: SUSE-2021-747,SUSE-SLE-INSTALLER-15-SP2-2021-747,SUSE-SLE-Module-Basesystem-15-SP2-2021-747 SKIP SUSE-RU-2021:0748-1 as SUSE-SLE-SERVER-12-SP5-2021-748 is not security or has no CVEs. patches: SUSE-2021-748,SUSE-OpenStack-Cloud-7-2021-748,SUSE-OpenStack-Cloud-8-2021-748,SUSE-OpenStack-Cloud-9-2021-748,SUSE-OpenStack-Cloud-Crowbar-9-2021-748,SUSE-SLE-SAP-12-SP2-2021-748,SUSE-SLE-SAP-12-SP3-2021-748,SUSE-SLE-SAP-12-SP4-2021-748,SUSE-SLE-SERVER-12-SP2-2021-748,SUSE-SLE-SERVER-12-SP2-BCL-2021-748,SUSE-SLE-SERVER-12-SP3-2021-748,SUSE-SLE-SERVER-12-SP3-BCL-2021-748,SUSE-SLE-SERVER-12-SP4-LTSS-2021-748,SUSE-SLE-SERVER-12-SP5-2021-748 SKIP SUSE-RU-2021:0749-1 as SUSE-SLE-Module-Containers-12-2021-749 is not security or has no CVEs. patches: SUSE-2021-749,SUSE-SLE-Module-Containers-12-2021-749 SKIP SUSE-RU-2021:0750-1 as SUSE-Storage-6-2021-750 is not security or has no CVEs. patches: SUSE-2021-750,SUSE-SLE-Product-HPC-15-2021-750,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-750,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-750,SUSE-SLE-Product-SLES-15-2021-750,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-750,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-750,SUSE-SLE-Product-SLES_SAP-15-2021-750,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-750,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-750,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-750,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-750,SUSE-Storage-6-2021-750 SKIP SUSE-RU-2021:0751-1 as SUSE-SLE-SDK-12-SP5-2021-751 is not security or has no CVEs. patches: SUSE-2021-751,SUSE-SLE-SDK-12-SP5-2021-751 SKIP SUSE-RU-2021:0758-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-758 is not security or has no CVEs. patches: SUSE-2021-758,SUSE-SLE-Module-Basesystem-15-SP2-2021-758,SUSE-SUSE-MicroOS-5.0-2021-758 SKIP SUSE-RU-2021:0759-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-759 is not security or has no CVEs. patches: SUSE-2021-759,SUSE-SLE-Module-Basesystem-15-SP2-2021-759 SKIP SUSE-RU-2021:0760-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-760 is not security or has no CVEs. patches: SUSE-2021-760,SUSE-SLE-INSTALLER-15-SP2-2021-760,SUSE-SLE-Module-Basesystem-15-SP2-2021-760 SKIP SUSE-RU-2021:0761-1 as SUSE-SUSE-MicroOS-5.0-2021-761 is not security or has no CVEs. patches: SUSE-2021-761,SUSE-SLE-Module-Basesystem-15-SP2-2021-761,SUSE-SUSE-MicroOS-5.0-2021-761 SKIP SUSE-RU-2021:0762-1 as SUSE-SLE-SERVER-12-SP5-2021-762 is not security or has no CVEs. patches: SUSE-2021-762,SUSE-SLE-SERVER-12-SP5-2021-762 SKIP SUSE-RU-2021:0763-1 as SUSE-Storage-6-2021-763 is not security or has no CVEs. patches: SUSE-2021-763,SUSE-Storage-6-2021-763 SKIP SUSE-RU-2021:0764-1 as SUSE-Storage-7-2021-764 is not security or has no CVEs. patches: SUSE-2021-764,SUSE-Storage-7-2021-764 SKIP SUSE-RU-2021:0765-1 as SUSE-SLE-SERVER-12-SP5-2021-765 is not security or has no CVEs. patches: SUSE-2021-765,SUSE-SLE-SERVER-12-SP5-2021-765 SKIP SUSE-RU-2021:0766-1 as SUSE-Storage-7-2021-766 is not security or has no CVEs. patches: SUSE-2021-766,SUSE-Storage-7-2021-766 SKIP SUSE-RU-2021:0767-1 as SUSE-SLE-RT-12-SP5-2021-767 is not security or has no CVEs. patches: SUSE-2021-767,SUSE-SLE-RT-12-SP5-2021-767 SKIP SUSE-RU-2021:0784-1 as SUSE-SUSE-MicroOS-5.0-2021-784 is not security or has no CVEs. patches: SUSE-2021-784,SUSE-SLE-Module-Basesystem-15-SP2-2021-784,SUSE-SUSE-MicroOS-5.0-2021-784 SKIP SUSE-RU-2021:0785-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-785 is not security or has no CVEs. patches: SUSE-2021-785,SUSE-SLE-INSTALLER-15-SP2-2021-785,SUSE-SLE-Module-Basesystem-15-SP2-2021-785 SKIP SUSE-RU-2021:0786-1 as SUSE-SUSE-MicroOS-5.0-2021-786 is not security or has no CVEs. patches: SUSE-2021-786,SUSE-SLE-Module-Basesystem-15-SP2-2021-786,SUSE-SLE-Module-Development-Tools-15-SP2-2021-786,SUSE-SUSE-MicroOS-5.0-2021-786 SKIP SUSE-RU-2021:0787-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-787 is not security or has no CVEs. patches: SUSE-2021-787,SUSE-SLE-Module-Basesystem-15-SP2-2021-787 SKIP SUSE-RU-2021:0788-1 as SUSE-SLE-Product-HPC-15-SP2-2021-788 is not security or has no CVEs. patches: SUSE-2021-788,SUSE-SLE-Module-HPC-15-SP2-2021-788,SUSE-SLE-Product-HPC-15-SP2-2021-788 SKIP SUSE-RU-2021:0789-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-789 is not security or has no CVEs. patches: SUSE-2021-789,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-789,SUSE-SLE-Module-Server-Applications-15-SP2-2021-789 SKIP SUSE-RU-2021:0795-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-795 is not security or has no CVEs. patches: SUSE-2021-795,SUSE-SLE-Module-Basesystem-15-SP2-2021-795 SKIP SUSE-RU-2021:0796-1 as SUSE-SLE-SERVER-12-SP5-2021-796 is not security or has no CVEs. patches: SUSE-2021-796,SUSE-SLE-SDK-12-SP5-2021-796,SUSE-SLE-SERVER-12-SP5-2021-796 SKIP SUSE-RU-2021:0797-1 as SUSE-SLE-SERVER-12-SP5-2021-797 is not security or has no CVEs. patches: SUSE-2021-797,SUSE-SLE-SERVER-12-SP5-2021-797 SKIP SUSE-RU-2021:0802-1 as SUSE-SUSE-MicroOS-5.0-2021-802 is not security or has no CVEs. patches: SUSE-2021-802,SUSE-SLE-Module-Basesystem-15-SP2-2021-802,SUSE-SLE-Module-Server-Applications-15-SP2-2021-802,SUSE-SUSE-MicroOS-5.0-2021-802 SKIP SUSE-RU-2021:0872-1 as SUSE-Storage-7-2021-872 is not security or has no CVEs. patches: SUSE-2021-872,SUSE-Storage-7-2021-872 SKIP SUSE-RU-2021:0873-1 as SUSE-SLE-Product-WE-15-SP2-2021-873 is not security or has no CVEs. patches: SUSE-2021-873,SUSE-SLE-Module-Basesystem-15-SP2-2021-873,SUSE-SLE-Module-Development-Tools-15-SP2-2021-873,SUSE-SLE-Product-WE-15-SP2-2021-873 SKIP SUSE-RU-2021:0874-1 as SUSE-SUSE-MicroOS-5.0-2021-874 is not security or has no CVEs. patches: SUSE-2021-874,SUSE-SLE-INSTALLER-15-SP2-2021-874,SUSE-SLE-Module-Basesystem-15-SP2-2021-874,SUSE-SLE-Module-Development-Tools-15-SP2-2021-874,SUSE-SUSE-MicroOS-5.0-2021-874 SKIP SUSE-RU-2021:0875-1 as SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-875 is not security or has no CVEs. patches: SUSE-2021-875,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-875,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-875 SKIP SUSE-RU-2021:0877-1 as SUSE-SLE-SERVER-12-SP5-2021-877 is not security or has no CVEs. patches: SUSE-2021-877,SUSE-SLE-SDK-12-SP5-2021-877,SUSE-SLE-SERVER-12-SP5-2021-877 SKIP SUSE-RU-2021:0878-1 as SUSE-SLE-HA-12-SP5-2021-878 is not security or has no CVEs. patches: SUSE-2021-878,SUSE-SLE-HA-12-SP4-2021-878,SUSE-SLE-HA-12-SP5-2021-878 SKIP SUSE-RU-2021:0879-1 as SUSE-SLE-SERVER-12-SP5-2021-879 is not security or has no CVEs. patches: SUSE-2021-879,SUSE-SLE-SERVER-12-SP5-2021-879 SKIP SUSE-RU-2021:0880-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-880 is not security or has no CVEs. patches: SUSE-2021-880,SUSE-SLE-Manager-Tools-15-2021-880,SUSE-SLE-Module-Basesystem-15-SP2-2021-880,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-880,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-880,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-880,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-880 SKIP SUSE-RU-2021:0881-1 as SUSE-SLE-Product-HA-15-SP2-2021-881 is not security or has no CVEs. patches: SUSE-2021-881,SUSE-SLE-Module-Basesystem-15-SP2-2021-881,SUSE-SLE-Module-Python2-15-SP2-2021-881,SUSE-SLE-Module-Server-Applications-15-SP2-2021-881,SUSE-SLE-Product-HA-15-SP2-2021-881 SKIP SUSE-RU-2021:0894-1 as SUSE-SLE-POS-12-SP2-2021-894 is not security or has no CVEs. patches: SUSE-2021-894,SUSE-SLE-Manager-Tools-12-2021-894,SUSE-SLE-Module-Adv-Systems-Management-12-2021-894,SUSE-SLE-POS-12-SP2-2021-894 SKIP SUSE-RU-2021:0896-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-896 is not security or has no CVEs. patches: SUSE-2021-896,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-896,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-896,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-896 SKIP SUSE-RU-2021:0897-1 as SUSE-SLE-Product-SLES_SAP-15-2021-897 is not security or has no CVEs. patches: SUSE-2021-897,SUSE-SLE-Product-HPC-15-2021-897,SUSE-SLE-Product-SLES-15-2021-897,SUSE-SLE-Product-SLES_SAP-15-2021-897 SKIP SUSE-RU-2021:0898-1 as SUSE-SLE-Manager-Tools-12-2021-898 is not security or has no CVEs. patches: SUSE-2021-898,SUSE-SLE-Manager-Tools-12-2021-898 SKIP SUSE-RU-2021:0899-1 as SUSE-SLE-Manager-Tools-15-2021-899 is not security or has no CVEs. patches: SUSE-2021-899,SUSE-SLE-Manager-Tools-15-2021-899 SKIP SUSE-RU-2021:0900-1 as SUSE-SUSE-MicroOS-5.0-2021-900 is not security or has no CVEs. patches: SUSE-2021-900,SUSE-SLE-Module-Basesystem-15-SP2-2021-900,SUSE-SLE-Module-Python2-15-SP2-2021-900,SUSE-SLE-Module-Server-Applications-15-SP2-2021-900,SUSE-SUSE-MicroOS-5.0-2021-900 SKIP SUSE-RU-2021:0903-1 as SUSE-Storage-6-2021-903 is not security or has no CVEs. patches: SUSE-2021-903,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-903,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-903,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-903,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-903,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-903,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-903,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-903,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-903,SUSE-Storage-6-2021-903 ERROR: notice SUSE-RU-2021:0904-1 has no valid patches out of: SUSE-2021-904,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2021-904 ERROR: notice SUSE-RU-2021:0905-1 has no valid patches out of: SUSE-2021-905,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2021-905 SKIP SUSE-RU-2021:0919-1 as SUSE-2021-919 is not security or has no CVEs. patches: SUSE-2021-919,SUSE-SLE-Manager-Tools-12-2021-919 SKIP SUSE-RU-2021:0921-1 as SUSE-2021-921 is not security or has no CVEs. patches: SUSE-2021-921,SUSE-SLE-Manager-Tools-15-2021-921 SKIP SUSE-RU-2021:0922-1 as SUSE-SLE-SERVER-12-SP5-2021-922 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-922,SUSE-2021-922,SUSE-OpenStack-Cloud-7-2021-922,SUSE-OpenStack-Cloud-8-2021-922,SUSE-OpenStack-Cloud-9-2021-922,SUSE-OpenStack-Cloud-Crowbar-8-2021-922,SUSE-OpenStack-Cloud-Crowbar-9-2021-922,SUSE-SLE-SAP-12-SP2-2021-922,SUSE-SLE-SAP-12-SP3-2021-922,SUSE-SLE-SAP-12-SP4-2021-922,SUSE-SLE-SERVER-12-SP2-2021-922,SUSE-SLE-SERVER-12-SP2-BCL-2021-922,SUSE-SLE-SERVER-12-SP3-2021-922,SUSE-SLE-SERVER-12-SP3-BCL-2021-922,SUSE-SLE-SERVER-12-SP4-LTSS-2021-922,SUSE-SLE-SERVER-12-SP5-2021-922 SKIP SUSE-RU-2021:0924-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-924 is not security or has no CVEs. patches: SUSE-2021-924,SUSE-SLE-Module-Basesystem-15-SP2-2021-924 SKIP SUSE-RU-2021:0925-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-925 is not security or has no CVEs. patches: SUSE-2021-925,SUSE-SLE-Module-Basesystem-15-SP2-2021-925,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-925 SKIP SUSE-RU-2021:0926-1 as SUSE-SUSE-MicroOS-5.0-2021-926 is not security or has no CVEs. patches: SUSE-2021-926,SUSE-SLE-Module-Basesystem-15-SP2-2021-926,SUSE-SUSE-MicroOS-5.0-2021-926 SKIP SUSE-RU-2021:0927-1 as SUSE-SUSE-MicroOS-5.0-2021-927 is not security or has no CVEs. patches: SUSE-2021-927,SUSE-SLE-Module-Basesystem-15-SP2-2021-927,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-927,SUSE-SLE-Product-WE-15-SP2-2021-927,SUSE-SUSE-MicroOS-5.0-2021-927 SKIP SUSE-RU-2021:0950-1 as SUSE-Storage-6-2021-950 is not security or has no CVEs. patches: SUSE-2021-950,SUSE-SLE-Product-HPC-15-2021-950,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-950,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-950,SUSE-SLE-Product-SLES-15-2021-950,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-950,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-950,SUSE-SLE-Product-SLES_SAP-15-2021-950,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-950,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-950,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-950,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-950,SUSE-Storage-6-2021-950 SKIP SUSE-RU-2021:0951-1 as SUSE-Storage-6-2021-951 is not security or has no CVEs. patches: SUSE-2021-951,SUSE-SLE-Product-HPC-15-2021-951,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-951,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-951,SUSE-SLE-Product-SLES-15-2021-951,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-951,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-951,SUSE-SLE-Product-SLES_SAP-15-2021-951,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-951,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-951,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-951,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-951,SUSE-Storage-6-2021-951 SKIP SUSE-RU-2021:0952-1 as SUSE-SUSE-MicroOS-5.0-2021-952 is not security or has no CVEs. patches: SUSE-2021-952,SUSE-SLE-Module-Basesystem-15-SP2-2021-952,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-952,SUSE-SUSE-MicroOS-5.0-2021-952 SKIP SUSE-RU-2021:0953-1 as SUSE-SUSE-MicroOS-5.0-2021-953 is not security or has no CVEs. patches: SUSE-2021-953,SUSE-SLE-Module-Basesystem-15-SP2-2021-953,SUSE-SUSE-MicroOS-5.0-2021-953 SKIP SUSE-RU-2021:0958-1 as SUSE-SLE-Product-SLES_SAP-15-2021-958 is not security or has no CVEs. patches: SUSE-2021-958,SUSE-SLE-INSTALLER-15-2021-958,SUSE-SLE-Product-HPC-15-2021-958,SUSE-SLE-Product-SLES-15-2021-958,SUSE-SLE-Product-SLES_SAP-15-2021-958 SKIP SUSE-RU-2021:0959-1 as SUSE-SLE-SAP-12-SP5-2021-959 is not security or has no CVEs. patches: SUSE-2021-959,SUSE-SLE-SAP-12-SP3-2021-959,SUSE-SLE-SAP-12-SP4-2021-959,SUSE-SLE-SAP-12-SP5-2021-959 SKIP SUSE-RU-2021:0960-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-960 is not security or has no CVEs. patches: SUSE-2021-960,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-960,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-960 SKIP SUSE-RU-2021:0962-1 as SUSE-SUSE-MicroOS-5.0-2021-962 is not security or has no CVEs. patches: SUSE-2021-962,SUSE-SLE-Module-Basesystem-15-SP2-2021-962,SUSE-SUSE-MicroOS-5.0-2021-962 SKIP SUSE-RU-2021:0963-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-963 is not security or has no CVEs. patches: SUSE-2021-963,SUSE-SLE-INSTALLER-15-SP2-2021-963,SUSE-SLE-Module-Basesystem-15-SP2-2021-963 SKIP SUSE-RU-2021:0964-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-964 is not security or has no CVEs. patches: SUSE-2021-964,SUSE-SLE-Module-SAP-Applications-15-2021-964,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-964,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-964 SKIP SUSE-RU-2021:0965-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-965 is not security or has no CVEs. patches: SUSE-2021-965,SUSE-SLE-Module-Server-Applications-15-SP2-2021-965 SKIP SUSE-RU-2021:0967-1 as SUSE-Storage-6-2021-967 is not security or has no CVEs. patches: SUSE-2021-967,SUSE-SLE-Module-Basesystem-15-SP2-2021-967,SUSE-SLE-Product-HPC-15-2021-967,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-967,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-967,SUSE-SLE-Product-SLES-15-2021-967,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-967,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-967,SUSE-SLE-Product-SLES_SAP-15-2021-967,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-967,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-967,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-967,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-967,SUSE-Storage-6-2021-967 SKIP SUSE-RU-2021:0968-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-968 is not security or has no CVEs. patches: SUSE-2021-968,SUSE-SLE-INSTALLER-15-SP2-2021-968,SUSE-SLE-Module-Basesystem-15-SP2-2021-968 SKIP SUSE-RU-2021:0969-1 as SUSE-Storage-6-2021-969 is not security or has no CVEs. patches: SUSE-2021-969,SUSE-SLE-INSTALLER-15-SP1-2021-969,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-969,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-969,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-969,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-969,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-969,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-969,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-969,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-969,SUSE-Storage-6-2021-969 SKIP SUSE-RU-2021:0970-1 as SUSE-SLE-SERVER-12-SP5-2021-970 is not security or has no CVEs. patches: SUSE-2021-970,SUSE-SLE-SDK-12-SP5-2021-970,SUSE-SLE-SERVER-12-SP5-2021-970 SKIP SUSE-RU-2021:0977-1 as SUSE-2021-977 is not security or has no CVEs. patches: SUSE-2021-977,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-977 SKIP SUSE-RU-2021:0981-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-981 is not security or has no CVEs. patches: SUSE-2021-981,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-981,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-981 SKIP SUSE-RU-2021:0982-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-982 is not security or has no CVEs. patches: SUSE-2021-982,SUSE-SLE-Module-Basesystem-15-SP2-2021-982 SKIP SUSE-RU-2021:0983-1 as SUSE-SLE-SERVER-12-SP5-2021-983 is not security or has no CVEs. patches: SUSE-2021-983,SUSE-SLE-SERVER-12-SP5-2021-983 SKIP SUSE-RU-2021:0984-1 as SUSE-Storage-6-2021-984 is not security or has no CVEs. patches: SUSE-2021-984,SUSE-SLE-Module-Basesystem-15-SP2-2021-984,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-984,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-984,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-984,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-984,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-984,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-984,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-984,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-984,SUSE-Storage-6-2021-984 SKIP SUSE-RU-2021:0986-1 as SUSE-SLE-Product-WE-15-SP2-2021-986 is not security or has no CVEs. patches: SUSE-2021-986,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-986,SUSE-SLE-Product-WE-15-SP2-2021-986 SKIP SUSE-RU-2021:0991-1 as SUSE-SUSE-MicroOS-5.0-2021-991 is not security or has no CVEs. patches: SUSE-2021-991,SUSE-SLE-Module-Basesystem-15-SP2-2021-991,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-991,SUSE-SUSE-MicroOS-5.0-2021-991 SKIP SUSE-RU-2021:0994-1 as SUSE-SLE-Module-Public-Cloud-15-2021-994 is not security or has no CVEs. patches: SUSE-2021-994,SUSE-SLE-Module-Public-Cloud-15-2021-994 SKIP SUSE-RU-2021:0995-1 as SUSE-SLE-Module-HPC-15-SP2-2021-995 is not security or has no CVEs. patches: SUSE-2021-995,SUSE-SLE-Module-HPC-15-SP2-2021-995 SKIP SUSE-RU-2021:0996-1 as SUSE-Storage-6-2021-996 is not security or has no CVEs. patches: SUSE-2021-996,SUSE-SLE-Module-Basesystem-15-SP2-2021-996,SUSE-SLE-Module-Basesystem-15-SP3-2021-996,SUSE-SLE-Module-Server-Applications-15-SP2-2021-996,SUSE-SLE-Module-Server-Applications-15-SP3-2021-996,SUSE-SLE-Product-HPC-15-2021-996,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-996,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-996,SUSE-SLE-Product-SLES-15-2021-996,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-996,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-996,SUSE-SLE-Product-SLES_SAP-15-2021-996,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-996,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-996,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-996,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-996,SUSE-Storage-6-2021-996 SKIP SUSE-RU-2021:0997-1 as SUSE-SLE-SERVER-12-SP5-2021-997 is not security or has no CVEs. patches: SUSE-2021-997,SUSE-OpenStack-Cloud-9-2021-997,SUSE-OpenStack-Cloud-Crowbar-9-2021-997,SUSE-SLE-SAP-12-SP4-2021-997,SUSE-SLE-SERVER-12-SP4-LTSS-2021-997,SUSE-SLE-SERVER-12-SP5-2021-997 SKIP SUSE-RU-2021:1002-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1002 is not security or has no CVEs. patches: SUSE-2021-1002,SUSE-SLE-Module-Basesystem-15-SP2-2021-1002 SKIP SUSE-RU-2021:1003-1 as SUSE-SLE-SERVER-12-SP5-2021-1003 is not security or has no CVEs. patches: SUSE-2021-1003,SUSE-SLE-SDK-12-SP5-2021-1003,SUSE-SLE-SERVER-12-SP5-2021-1003 SKIP SUSE-RU-2021:1004-1 as SUSE-SUSE-MicroOS-5.0-2021-1004 is not security or has no CVEs. patches: SUSE-2021-1004,SUSE-SLE-Module-Basesystem-15-SP2-2021-1004,SUSE-SUSE-MicroOS-5.0-2021-1004 SKIP SUSE-RU-2021:1005-1 as SUSE-Storage-6-2021-1005 is not security or has no CVEs. patches: SUSE-2021-1005,SUSE-SLE-INSTALLER-15-SP1-2021-1005,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1005,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1005,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1005,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1005,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1005,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1005,SUSE-Storage-6-2021-1005 SKIP SUSE-RU-2021:1011-1 as SUSE-Storage-6-2021-1011 is not security or has no CVEs. patches: SUSE-2021-1011,SUSE-SLE-Product-HPC-15-2021-1011,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1011,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1011,SUSE-SLE-Product-SLES-15-2021-1011,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1011,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1011,SUSE-SLE-Product-SLES_SAP-15-2021-1011,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1011,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1011,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1011,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1011,SUSE-Storage-6-2021-1011 SKIP SUSE-RU-2021:1012-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1012 is not security or has no CVEs. patches: SUSE-2021-1012,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1012,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1012 SKIP SUSE-RU-2021:1013-1 as SUSE-SLE-Product-HA-15-SP2-2021-1013 is not security or has no CVEs. patches: SUSE-2021-1013,SUSE-SLE-Product-HA-15-SP2-2021-1013 SKIP SUSE-RU-2021:1014-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1014 is not security or has no CVEs. patches: SUSE-2021-1014,SUSE-SLE-Module-RT-15-SP2-2021-1014,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1014 SKIP SUSE-RU-2021:1015-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1015 is not security or has no CVEs. patches: SUSE-2021-1015,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1015 SKIP SUSE-RU-2021:1016-1 as SUSE-SLE-Module-RT-15-SP2-2021-1016 is not security or has no CVEs. patches: SUSE-2021-1016,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1016,SUSE-SLE-Module-RT-15-SP2-2021-1016 SKIP SUSE-RU-2021:1017-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1017 is not security or has no CVEs. patches: SUSE-2021-1017,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1017 SKIP SUSE-RU-2021:1018-1 as SUSE-SUSE-MicroOS-5.0-2021-1018 is not security or has no CVEs. patches: SUSE-2021-1018,SUSE-SLE-Module-Basesystem-15-SP2-2021-1018,SUSE-SUSE-MicroOS-5.0-2021-1018 SKIP SUSE-RU-2021:1019-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1019 is not security or has no CVEs. patches: SUSE-2021-1019,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1019 SKIP SUSE-RU-2021:1020-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1020 is not security or has no CVEs. patches: SUSE-2021-1020,SUSE-SLE-INSTALLER-15-SP2-2021-1020,SUSE-SLE-Module-Basesystem-15-SP2-2021-1020 SKIP SUSE-RU-2021:1021-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1021 is not security or has no CVEs. patches: SUSE-2021-1021,SUSE-SLE-Module-Basesystem-15-SP2-2021-1021,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1021 SKIP SUSE-RU-2021:1022-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1022 is not security or has no CVEs. patches: SUSE-2021-1022,SUSE-SLE-Module-Basesystem-15-SP2-2021-1022 SKIP SUSE-RU-2021:1024-1 as SUSE-SLE-SERVER-12-SP5-2021-1024 is not security or has no CVEs. patches: SUSE-2021-1024,SUSE-SLE-SDK-12-SP5-2021-1024,SUSE-SLE-SERVER-12-SP5-2021-1024 SKIP SUSE-RU-2021:1025-1 as SUSE-SLE-SERVER-12-SP5-2021-1025 is not security or has no CVEs. patches: SUSE-2021-1025,SUSE-SLE-SERVER-12-SP5-2021-1025 SKIP SUSE-RU-2021:1026-1 as SUSE-SLE-SERVER-12-SP5-2021-1026 is not security or has no CVEs. patches: SUSE-2021-1026,SUSE-SLE-SERVER-12-SP5-2021-1026 SKIP SUSE-RU-2021:1027-1 as SUSE-SLE-SERVER-12-SP5-2021-1027 is not security or has no CVEs. patches: SUSE-2021-1027,SUSE-SLE-SDK-12-SP5-2021-1027,SUSE-SLE-SERVER-12-SP5-2021-1027 SKIP SUSE-RU-2021:1100-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1100 is not security or has no CVEs. patches: SUSE-2021-1100,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1100 SKIP SUSE-RU-2021:1100-2 as SUSE-Storage-6-2021-1100 is not security or has no CVEs. patches: SUSE-2021-1100,SUSE-SLE-Product-HPC-15-2021-1100,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1100,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1100,SUSE-SLE-Product-SLES-15-2021-1100,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1100,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1100,SUSE-SLE-Product-SLES_SAP-15-2021-1100,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1100,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1100,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1100,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1100,SUSE-Storage-6-2021-1100 SKIP SUSE-RU-2021:1101-1 as SUSE-SUSE-MicroOS-5.0-2021-1101 is not security or has no CVEs. patches: SUSE-2021-1101,SUSE-SLE-Module-Basesystem-15-SP2-2021-1101,SUSE-SUSE-MicroOS-5.0-2021-1101 SKIP SUSE-RU-2021:1102-1 as SUSE-SLE-Product-HA-15-SP2-2021-1102 is not security or has no CVEs. patches: SUSE-2021-1102,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-1102,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1102,SUSE-SLE-Product-HA-15-SP1-2021-1102,SUSE-SLE-Product-HA-15-SP2-2021-1102 SKIP SUSE-RU-2021:1106-1 as SUSE-SLE-SERVER-12-SP5-2021-1106 is not security or has no CVEs. patches: SUSE-2021-1106,SUSE-SLE-SERVER-12-SP5-2021-1106 SKIP SUSE-RU-2021:1106-2 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-1106 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1106,SUSE-2021-1106,SUSE-OpenStack-Cloud-8-2021-1106,SUSE-OpenStack-Cloud-9-2021-1106,SUSE-OpenStack-Cloud-Crowbar-8-2021-1106,SUSE-OpenStack-Cloud-Crowbar-9-2021-1106,SUSE-SLE-SAP-12-SP3-2021-1106,SUSE-SLE-SAP-12-SP4-2021-1106,SUSE-SLE-SERVER-12-SP3-2021-1106,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1106 SKIP SUSE-RU-2021:1110-1 as SUSE-Storage-6-2021-1110 is not security or has no CVEs. patches: SUSE-2021-1110,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1110,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1110,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1110,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1110,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1110,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1110,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1110,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1110,SUSE-Storage-6-2021-1110 SKIP SUSE-RU-2021:1112-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-1112 is not security or has no CVEs. patches: SUSE-2021-1112,SUSE-OpenStack-Cloud-9-2021-1112,SUSE-OpenStack-Cloud-Crowbar-9-2021-1112,SUSE-SLE-SAP-12-SP4-2021-1112,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1112 SKIP SUSE-RU-2021:1114-1 as SUSE-Storage-6-2021-1114 is not security or has no CVEs. patches: SUSE-2021-1114,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1114,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1114,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1114,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1114,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1114,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1114,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1114,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1114,SUSE-Storage-6-2021-1114 SKIP SUSE-RU-2021:1115-1 as SUSE-Storage-6-2021-1115 is not security or has no CVEs. patches: SUSE-2021-1115,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1115,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1115,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1115,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1115,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1115,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1115,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1115,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1115,SUSE-Storage-6-2021-1115 SKIP SUSE-RU-2021:1117-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1117 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1117,SUSE-2021-1117,SUSE-OpenStack-Cloud-8-2021-1117,SUSE-OpenStack-Cloud-Crowbar-8-2021-1117,SUSE-SLE-SAP-12-SP3-2021-1117,SUSE-SLE-SERVER-12-SP3-2021-1117,SUSE-SLE-SERVER-12-SP3-BCL-2021-1117 SKIP SUSE-RU-2021:1119-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-1119 is not security or has no CVEs. patches: SUSE-2021-1119,SUSE-OpenStack-Cloud-9-2021-1119,SUSE-OpenStack-Cloud-Crowbar-9-2021-1119,SUSE-SLE-SAP-12-SP4-2021-1119,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1119 SKIP SUSE-RU-2021:1120-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1120 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1120,SUSE-2021-1120,SUSE-OpenStack-Cloud-8-2021-1120,SUSE-OpenStack-Cloud-Crowbar-8-2021-1120,SUSE-SLE-SAP-12-SP3-2021-1120,SUSE-SLE-SERVER-12-SP3-2021-1120,SUSE-SLE-SERVER-12-SP3-BCL-2021-1120 SKIP SUSE-RU-2021:1121-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-1121 is not security or has no CVEs. patches: SUSE-2021-1121,SUSE-OpenStack-Cloud-9-2021-1121,SUSE-OpenStack-Cloud-Crowbar-9-2021-1121,SUSE-SLE-SAP-12-SP4-2021-1121,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1121 SKIP SUSE-RU-2021:1122-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-1122 is not security or has no CVEs. patches: SUSE-2021-1122,SUSE-OpenStack-Cloud-7-2021-1122,SUSE-SLE-SERVER-12-SP2-BCL-2021-1122 SKIP SUSE-RU-2021:1127-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1127 is not security or has no CVEs. patches: SUSE-2021-1127,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1127 SKIP SUSE-RU-2021:1128-1 as SUSE-SLE-SERVER-12-SP5-2021-1128 is not security or has no CVEs. patches: SUSE-2021-1128,SUSE-SLE-HA-12-SP4-2021-1128,SUSE-SLE-HA-12-SP5-2021-1128,SUSE-SLE-SDK-12-SP5-2021-1128,SUSE-SLE-SERVER-12-SP5-2021-1128 SKIP SUSE-RU-2021:1129-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-1129 is not security or has no CVEs. patches: SUSE-2021-1129,SUSE-OpenStack-Cloud-7-2021-1129,SUSE-SLE-SERVER-12-SP2-BCL-2021-1129 SKIP SUSE-RU-2021:1130-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1130 is not security or has no CVEs. patches: SUSE-2021-1130,SUSE-SLE-Product-HPC-15-2021-1130,SUSE-SLE-Product-SLES-15-2021-1130,SUSE-SLE-Product-SLES_SAP-15-2021-1130 SKIP SUSE-RU-2021:1131-1 as SUSE-SLE-HA-12-SP5-2021-1131 is not security or has no CVEs. patches: SUSE-2021-1131,SUSE-SLE-HA-12-SP5-2021-1131 SKIP SUSE-RU-2021:1133-1 as SUSE-SLE-HA-12-SP3-2021-1133 is not security or has no CVEs. patches: SUSE-2021-1133,SUSE-SLE-HA-12-SP3-2021-1133 SKIP SUSE-RU-2021:1134-1 as SUSE-SLE-HA-12-SP4-2021-1134 is not security or has no CVEs. patches: SUSE-2021-1134,SUSE-SLE-HA-12-SP4-2021-1134 SKIP SUSE-RU-2021:1135-1 as SUSE-SLE-Product-HA-15-SP1-2021-1135 is not security or has no CVEs. patches: SUSE-2021-1135,SUSE-SLE-Product-HA-15-SP1-2021-1135 SKIP SUSE-RU-2021:1136-1 as SUSE-SLE-SERVER-12-SP5-2021-1136 is not security or has no CVEs. patches: SUSE-2021-1136,SUSE-SLE-SERVER-12-SP5-2021-1136 SKIP SUSE-RU-2021:1137-1 as SUSE-SLE-Module-Live-Patching-15-SP2-2021-1137 is not security or has no CVEs. patches: SUSE-2021-1137,SUSE-SLE-Live-Patching-12-2021-1137,SUSE-SLE-Live-Patching-12-SP3-2021-1137,SUSE-SLE-Live-Patching-12-SP4-2021-1137,SUSE-SLE-Live-Patching-12-SP5-2021-1137,SUSE-SLE-Module-Live-Patching-15-2021-1137,SUSE-SLE-Module-Live-Patching-15-SP1-2021-1137,SUSE-SLE-Module-Live-Patching-15-SP2-2021-1137 SKIP SUSE-RU-2021:1138-1 as SUSE-SLE-Product-HA-15-SP2-2021-1138 is not security or has no CVEs. patches: SUSE-2021-1138,SUSE-SLE-Product-HA-15-SP2-2021-1138 SKIP SUSE-RU-2021:1139-1 as SUSE-SLE-SERVER-12-SP5-2021-1139 is not security or has no CVEs. patches: SUSE-2021-1139,SUSE-SLE-SERVER-12-SP5-2021-1139 SKIP SUSE-RU-2021:1140-1 as SUSE-SLE-SERVER-12-SP5-2021-1140 is not security or has no CVEs. patches: SUSE-2021-1140,SUSE-SLE-SDK-12-SP5-2021-1140,SUSE-SLE-SERVER-12-SP5-2021-1140 SKIP SUSE-RU-2021:1141-1 as SUSE-SUSE-MicroOS-5.0-2021-1141 is not security or has no CVEs. patches: SUSE-2021-1141,SUSE-SLE-Module-Basesystem-15-SP2-2021-1141,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1141,SUSE-SLE-Module-Legacy-15-SP2-2021-1141,SUSE-SUSE-MicroOS-5.0-2021-1141 SKIP SUSE-RU-2021:1149-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1149 is not security or has no CVEs. patches: SUSE-2021-1149,SUSE-SLE-Product-HPC-15-2021-1149,SUSE-SLE-Product-SLES-15-2021-1149,SUSE-SLE-Product-SLES_SAP-15-2021-1149 SKIP SUSE-RU-2021:1154-1 as SUSE-SLE-SERVER-12-SP5-2021-1154 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1154,SUSE-2021-1154,SUSE-OpenStack-Cloud-8-2021-1154,SUSE-OpenStack-Cloud-9-2021-1154,SUSE-OpenStack-Cloud-Crowbar-8-2021-1154,SUSE-OpenStack-Cloud-Crowbar-9-2021-1154,SUSE-SLE-SAP-12-SP3-2021-1154,SUSE-SLE-SAP-12-SP4-2021-1154,SUSE-SLE-SERVER-12-SP2-BCL-2021-1154,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1154,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1154,SUSE-SLE-SERVER-12-SP3-2021-1154,SUSE-SLE-SERVER-12-SP3-BCL-2021-1154,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1154,SUSE-SLE-SERVER-12-SP5-2021-1154 SKIP SUSE-RU-2021:1155-1 as SUSE-Storage-6-2021-1155 is not security or has no CVEs. patches: SUSE-2021-1155,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1155,SUSE-SLE-Product-HPC-15-2021-1155,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1155,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1155,SUSE-SLE-Product-SLES-15-2021-1155,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1155,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1155,SUSE-SLE-Product-SLES_SAP-15-2021-1155,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1155,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1155,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1155,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1155,SUSE-Storage-6-2021-1155 SKIP SUSE-RU-2021:1169-1 as SUSE-SUSE-MicroOS-5.0-2021-1169 is not security or has no CVEs. patches: SUSE-2021-1169,SUSE-SLE-Module-Basesystem-15-SP2-2021-1169,SUSE-SUSE-MicroOS-5.0-2021-1169 SKIP SUSE-RU-2021:1170-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1170 is not security or has no CVEs. patches: SUSE-2021-1170,SUSE-SLE-INSTALLER-15-SP2-2021-1170,SUSE-SLE-Module-Basesystem-15-SP2-2021-1170 SKIP SUSE-RU-2021:1178-1 as SUSE-SLE-Module-RT-15-SP2-2021-1178 is not security or has no CVEs. patches: SUSE-2021-1178,SUSE-SLE-Module-RT-15-SP2-2021-1178 SKIP SUSE-RU-2021:1184-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1184 is not security or has no CVEs. patches: SUSE-2021-1184,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1184,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1184 SKIP SUSE-RU-2021:1185-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1185 is not security or has no CVEs. patches: SUSE-2021-1185,SUSE-SLE-Product-HPC-15-2021-1185,SUSE-SLE-Product-SLES-15-2021-1185,SUSE-SLE-Product-SLES_SAP-15-2021-1185 SKIP SUSE-RU-2021:1186-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1186 is not security or has no CVEs. patches: SUSE-2021-1186,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1186,SUSE-SLE-Product-HPC-15-2021-1186,SUSE-SLE-Product-SLES-15-2021-1186,SUSE-SLE-Product-SLES_SAP-15-2021-1186 SKIP SUSE-RU-2021:1191-1 as SUSE-SUSE-MicroOS-5.0-2021-1191 is not security or has no CVEs. patches: SUSE-2021-1191,SUSE-SLE-Module-Basesystem-15-SP2-2021-1191,SUSE-SUSE-MicroOS-5.0-2021-1191 SKIP SUSE-RU-2021:1192-1 as SUSE-Storage-6-2021-1192 is not security or has no CVEs. patches: SUSE-2021-1192,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1192,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1192,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1192,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1192,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1192,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1192,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1192,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1192,SUSE-Storage-6-2021-1192 SKIP SUSE-RU-2021:1194-1 as SUSE-SLE-SERVER-12-SP5-2021-1194 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1194,SUSE-2021-1194,SUSE-OpenStack-Cloud-8-2021-1194,SUSE-OpenStack-Cloud-9-2021-1194,SUSE-OpenStack-Cloud-Crowbar-8-2021-1194,SUSE-OpenStack-Cloud-Crowbar-9-2021-1194,SUSE-SLE-SAP-12-SP3-2021-1194,SUSE-SLE-SAP-12-SP4-2021-1194,SUSE-SLE-SERVER-12-SP2-BCL-2021-1194,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1194,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1194,SUSE-SLE-SERVER-12-SP3-2021-1194,SUSE-SLE-SERVER-12-SP3-BCL-2021-1194,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1194,SUSE-SLE-SERVER-12-SP5-2021-1194 SKIP SUSE-RU-2021:1195-1 as SUSE-SUSE-MicroOS-5.0-2021-1195 is not security or has no CVEs. patches: SUSE-2021-1195,SUSE-SUSE-MicroOS-5.0-2021-1195 SKIP SUSE-RU-2021:1196-1 as SUSE-SLE-Product-HA-15-2021-1196 is not security or has no CVEs. patches: SUSE-2021-1196,SUSE-SLE-Product-HA-15-2021-1196 SKIP SUSE-RU-2021:1197-1 as SUSE-SLE-Product-HA-15-SP1-2021-1197 is not security or has no CVEs. patches: SUSE-2021-1197,SUSE-SLE-Product-HA-15-SP1-2021-1197 SKIP SUSE-RU-2021:1198-1 as SUSE-SLE-HA-12-SP4-2021-1198 is not security or has no CVEs. patches: SUSE-2021-1198,SUSE-SLE-HA-12-SP4-2021-1198 SKIP SUSE-RU-2021:1199-1 as SUSE-SLE-HA-12-SP3-2021-1199 is not security or has no CVEs. patches: SUSE-2021-1199,SUSE-SLE-HA-12-SP3-2021-1199 SKIP SUSE-RU-2021:1200-1 as SUSE-SLE-Product-WE-15-SP2-2021-1200 is not security or has no CVEs. patches: SUSE-2021-1200,SUSE-SLE-Product-WE-15-SP2-2021-1200 SKIP SUSE-RU-2021:1201-1 as SUSE-Storage-7-2021-1201 is not security or has no CVEs. patches: SUSE-2021-1201,SUSE-Storage-7-2021-1201 SKIP SUSE-RU-2021:1202-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1202 is not security or has no CVEs. patches: SUSE-2021-1202,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1202 SKIP SUSE-RU-2021:1203-1 as SUSE-Storage-7-2021-1203 is not security or has no CVEs. patches: SUSE-2021-1203,SUSE-Storage-7-2021-1203 SKIP SUSE-RU-2021:1204-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1204 is not security or has no CVEs. patches: SUSE-2021-1204,SUSE-SLE-INSTALLER-15-SP2-2021-1204,SUSE-SLE-Module-Basesystem-15-SP2-2021-1204 SKIP SUSE-RU-2021:1205-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1205 is not security or has no CVEs. patches: SUSE-2021-1205,SUSE-SLE-Module-Basesystem-15-SP2-2021-1205,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1205 SKIP SUSE-RU-2021:1206-1 as SUSE-SLE-Module-Containers-15-SP2-2021-1206 is not security or has no CVEs. patches: SUSE-2021-1206,SUSE-SLE-Module-Containers-15-SP2-2021-1206 SKIP SUSE-RU-2021:1207-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1207 is not security or has no CVEs. patches: SUSE-2021-1207,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1207 SKIP SUSE-RU-2021:1208-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1208 is not security or has no CVEs. patches: SUSE-2021-1208,SUSE-SLE-Module-Basesystem-15-SP2-2021-1208 SKIP SUSE-RU-2021:1209-1 as SUSE-SLE-SERVER-12-SP5-2021-1209 is not security or has no CVEs. patches: SUSE-2021-1209,SUSE-SLE-SERVER-12-SP5-2021-1209 SKIP SUSE-RU-2021:1212-1 as SUSE-Storage-6-2021-1212 is not security or has no CVEs. patches: SUSE-2021-1212,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1212,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1212,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1212,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1212,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1212,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1212,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1212,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1212,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1212,SUSE-Storage-6-2021-1212 SKIP SUSE-RU-2021:1213-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1213 is not security or has no CVEs. patches: SUSE-2021-1213,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1213,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1213,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1213 SKIP SUSE-RU-2021:1214-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-1214 is not security or has no CVEs. patches: SUSE-2021-1214,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-1214,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-1214 ERROR: notice SUSE-RU-2021:1217-1 has no valid patches out of: SUSE-2021-1217,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2021-1217 ERROR: notice SUSE-RU-2021:1221-1 has no valid patches out of: SUSE-2021-1221,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2021-1221 SKIP SUSE-RU-2021:1223-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2021-1223 is not security or has no CVEs. patches: SUSE-2021-1223,SUSE-SLE-Manager-Tools-12-2021-1223,SUSE-SLE-Module-Adv-Systems-Management-12-2021-1223 SKIP SUSE-RU-2021:1224-1 as SUSE-SUSE-MicroOS-5.0-2021-1224 is not security or has no CVEs. patches: SUSE-2021-1224,SUSE-SLE-Module-Basesystem-15-SP2-2021-1224,SUSE-SLE-Module-Python2-15-SP2-2021-1224,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1224,SUSE-SUSE-MicroOS-5.0-2021-1224 SKIP SUSE-RU-2021:1225-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-1225 is not security or has no CVEs. patches: SUSE-2021-1225,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-1225,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-1225,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-1225 SKIP SUSE-RU-2021:1226-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1226 is not security or has no CVEs. patches: SUSE-2021-1226,SUSE-SLE-Product-HPC-15-2021-1226,SUSE-SLE-Product-SLES-15-2021-1226,SUSE-SLE-Product-SLES_SAP-15-2021-1226 SKIP SUSE-RU-2021:1228-1 as SUSE-SLE-Manager-Tools-12-2021-1228 is not security or has no CVEs. patches: SUSE-2021-1228,SUSE-SLE-Manager-Tools-12-2021-1228 SKIP SUSE-RU-2021:1229-1 as SUSE-Storage-6-2021-1229 is not security or has no CVEs. patches: SUSE-2021-1229,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1229,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1229,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1229,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1229,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1229,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1229,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1229,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1229,SUSE-Storage-6-2021-1229 SKIP SUSE-RU-2021:1230-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-1230 is not security or has no CVEs. patches: SUSE-2021-1230,SUSE-SLE-Manager-Tools-15-2021-1230,SUSE-SLE-Module-Basesystem-15-SP2-2021-1230,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-1230 SKIP SUSE-RU-2021:1231-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1231 is not security or has no CVEs. patches: SUSE-2021-1231,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-1231,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1231 SKIP SUSE-RU-2021:1232-1 as SUSE-SLE-Manager-Tools-15-2021-1232 is not security or has no CVEs. patches: SUSE-2021-1232,SUSE-SLE-Manager-Tools-15-2021-1232 SKIP SUSE-RU-2021:1234-1 as SUSE-Storage-6-2021-1234 is not security or has no CVEs. patches: SUSE-2021-1234,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1234,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1234,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1234,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1234,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1234,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1234,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1234,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1234,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1234,SUSE-SUSE-MicroOS-5.0-2021-1234,SUSE-Storage-6-2021-1234 SKIP SUSE-RU-2021:1235-1 as SUSE-SUSE-MicroOS-5.0-2021-1235 is not security or has no CVEs. patches: SUSE-2021-1235,SUSE-SLE-Module-Basesystem-15-SP2-2021-1235,SUSE-SUSE-MicroOS-5.0-2021-1235 SKIP SUSE-RU-2021:1236-1 as SUSE-Storage-6-2021-1236 is not security or has no CVEs. patches: SUSE-2021-1236,SUSE-SLE-Module-Basesystem-15-SP2-2021-1236,SUSE-SLE-Module-Basesystem-15-SP3-2021-1236,SUSE-SLE-Product-HPC-15-2021-1236,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1236,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1236,SUSE-SLE-Product-SLES-15-2021-1236,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1236,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1236,SUSE-SLE-Product-SLES_SAP-15-2021-1236,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1236,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1236,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1236,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1236,SUSE-Storage-6-2021-1236 SKIP SUSE-RU-2021:1246-1 as SUSE-SLE-SERVER-12-SP5-2021-1246 is not security or has no CVEs. patches: SUSE-2021-1246,SUSE-SLE-SDK-12-SP5-2021-1246,SUSE-SLE-SERVER-12-SP5-2021-1246 SKIP SUSE-RU-2021:1247-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-1247 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1247,SUSE-2021-1247,SUSE-OpenStack-Cloud-8-2021-1247,SUSE-OpenStack-Cloud-9-2021-1247,SUSE-OpenStack-Cloud-Crowbar-8-2021-1247,SUSE-OpenStack-Cloud-Crowbar-9-2021-1247,SUSE-SLE-SAP-12-SP3-2021-1247,SUSE-SLE-SAP-12-SP4-2021-1247,SUSE-SLE-SERVER-12-SP2-BCL-2021-1247,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1247,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1247,SUSE-SLE-SERVER-12-SP3-2021-1247,SUSE-SLE-SERVER-12-SP3-BCL-2021-1247,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1247 SKIP SUSE-RU-2021:1249-1 as SUSE-SLE-SERVER-12-SP5-2021-1249 is not security or has no CVEs. patches: SUSE-2021-1249,SUSE-SLE-SERVER-12-SP5-2021-1249 SKIP SUSE-RU-2021:1254-1 as SUSE-SLE-Product-HA-15-SP2-2021-1254 is not security or has no CVEs. patches: SUSE-2021-1254,SUSE-SLE-Product-HA-15-SP2-2021-1254 SKIP SUSE-RU-2021:1255-1 as SUSE-2021-1255 is not security or has no CVEs. patches: SUSE-2021-1255,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1255,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1255 SKIP SUSE-RU-2021:1256-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1256 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1256,SUSE-2021-1256,SUSE-OpenStack-Cloud-8-2021-1256,SUSE-OpenStack-Cloud-Crowbar-8-2021-1256,SUSE-SLE-SAP-12-SP3-2021-1256,SUSE-SLE-SERVER-12-SP3-2021-1256,SUSE-SLE-SERVER-12-SP3-BCL-2021-1256 SKIP SUSE-RU-2021:1257-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-1257 is not security or has no CVEs. patches: SUSE-2021-1257,SUSE-SLE-SERVER-12-SP2-BCL-2021-1257,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1257,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1257 SKIP SUSE-RU-2021:1259-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-1259 is not security or has no CVEs. patches: SUSE-2021-1259,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-1259 SKIP SUSE-RU-2021:1260-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1260 is not security or has no CVEs. patches: SUSE-2021-1260,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1260 SKIP SUSE-RU-2021:1261-1 as SUSE-SLE-HA-12-SP5-2021-1261 is not security or has no CVEs. patches: SUSE-2021-1261,SUSE-SLE-HA-12-SP5-2021-1261 SKIP SUSE-RU-2021:1262-1 as SUSE-SLE-HA-12-SP3-2021-1262 is not security or has no CVEs. patches: SUSE-2021-1262,SUSE-SLE-HA-12-SP3-2021-1262 SKIP SUSE-RU-2021:1263-1 as SUSE-SLE-SERVER-12-SP5-2021-1263 is not security or has no CVEs. patches: SUSE-2021-1263,SUSE-SLE-SERVER-12-SP5-2021-1263 SKIP SUSE-RU-2021:1264-1 as SUSE-SLE-RT-12-SP5-2021-1264 is not security or has no CVEs. patches: SUSE-2021-1264,SUSE-SLE-RT-12-SP5-2021-1264 SKIP SUSE-RU-2021:1269-1 as SUSE-SUSE-MicroOS-5.0-2021-1269 is not security or has no CVEs. patches: SUSE-2021-1269,SUSE-SLE-Module-Basesystem-15-SP2-2021-1269,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1269,SUSE-SUSE-MicroOS-5.0-2021-1269 SKIP SUSE-RU-2021:1270-1 as SUSE-Storage-6-2021-1270 is not security or has no CVEs. patches: SUSE-2021-1270,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1270,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1270,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1270,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1270,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1270,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1270,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1270,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1270,SUSE-Storage-6-2021-1270 SKIP SUSE-RU-2021:1271-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1271 is not security or has no CVEs. patches: SUSE-2021-1271,SUSE-SLE-Product-HPC-15-2021-1271,SUSE-SLE-Product-SLES-15-2021-1271,SUSE-SLE-Product-SLES_SAP-15-2021-1271 SKIP SUSE-RU-2021:1272-1 as SUSE-SLE-SERVER-12-SP5-2021-1272 is not security or has no CVEs. patches: SUSE-2021-1272,SUSE-OpenStack-Cloud-9-2021-1272,SUSE-OpenStack-Cloud-Crowbar-9-2021-1272,SUSE-SLE-SAP-12-SP4-2021-1272,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1272,SUSE-SLE-SERVER-12-SP5-2021-1272 SKIP SUSE-RU-2021:1279-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1279 is not security or has no CVEs. patches: SUSE-2021-1279,SUSE-SLE-Product-HPC-15-2021-1279,SUSE-SLE-Product-SLES-15-2021-1279,SUSE-SLE-Product-SLES_SAP-15-2021-1279 SKIP SUSE-RU-2021:1283-1 as SUSE-SLE-WE-12-SP5-2021-1283 is not security or has no CVEs. patches: SUSE-2021-1283,SUSE-SLE-Module-HPC-12-2021-1283,SUSE-SLE-SDK-12-SP5-2021-1283,SUSE-SLE-SERVER-12-SP5-2021-1283,SUSE-SLE-WE-12-SP5-2021-1283 SKIP SUSE-RU-2021:1284-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1284 is not security or has no CVEs. patches: SUSE-2021-1284,SUSE-SLE-Module-Basesystem-15-SP2-2021-1284 SKIP SUSE-RU-2021:1285-1 as SUSE-Storage-6-2021-1285 is not security or has no CVEs. patches: SUSE-2021-1285,SUSE-SLE-INSTALLER-15-SP1-2021-1285,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1285,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1285,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1285,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1285,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1285,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1285,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1285,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1285,SUSE-Storage-6-2021-1285 SKIP SUSE-RU-2021:1286-1 as SUSE-SLE-Product-SLES-15-SP2-2021-1286 is not security or has no CVEs. patches: SUSE-2021-1286,SUSE-SLE-Product-SLES-15-SP2-2021-1286 SKIP SUSE-RU-2021:1287-1 as SUSE-SLE-RT-12-SP5-2021-1287 is not security or has no CVEs. patches: SUSE-2021-1287,SUSE-SLE-RT-12-SP5-2021-1287 SKIP SUSE-RU-2021:1288-1 as SUSE-SLE-SERVER-12-SP5-2021-1288 is not security or has no CVEs. patches: SUSE-2021-1288,SUSE-SLE-SDK-12-SP5-2021-1288,SUSE-SLE-SERVER-12-SP5-2021-1288 SKIP SUSE-RU-2021:1289-1 as SUSE-SUSE-MicroOS-5.0-2021-1289 is not security or has no CVEs. patches: SUSE-2021-1289,SUSE-SLE-Module-Basesystem-15-SP2-2021-1289,SUSE-SLE-Module-Basesystem-15-SP3-2021-1289,SUSE-SUSE-MicroOS-5.0-2021-1289 SKIP SUSE-RU-2021:1290-1 as SUSE-SLE-SERVER-12-SP5-2021-1290 is not security or has no CVEs. patches: SUSE-2021-1290,SUSE-SLE-SERVER-12-SP5-2021-1290 SKIP SUSE-RU-2021:1291-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1291 is not security or has no CVEs. patches: SUSE-2021-1291,SUSE-SLE-Module-Basesystem-15-SP2-2021-1291 SKIP SUSE-RU-2021:1293-1 as SUSE-SLE-Module-Public-Cloud-15-2021-1293 is not security or has no CVEs. patches: SUSE-2021-1293,SUSE-SLE-Module-Public-Cloud-15-2021-1293 SKIP SUSE-RU-2021:1294-1 as SUSE-SLE-SERVER-12-SP5-2021-1294 is not security or has no CVEs. patches: SUSE-2021-1294,SUSE-SLE-SERVER-12-SP5-2021-1294 SKIP SUSE-RU-2021:1295-1 as SUSE-SUSE-MicroOS-5.0-2021-1295 is not security or has no CVEs. patches: SUSE-2021-1295,SUSE-SLE-Module-Basesystem-15-SP2-2021-1295,SUSE-SUSE-MicroOS-5.0-2021-1295 SKIP SUSE-RU-2021:1297-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1297 is not security or has no CVEs. patches: SUSE-2021-1297,SUSE-SLE-Module-Basesystem-15-SP2-2021-1297 SKIP SUSE-RU-2021:1297-2 as SUSE-Storage-6-2021-1297 is not security or has no CVEs. patches: SUSE-2021-1297,SUSE-SLE-Product-HPC-15-2021-1297,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1297,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1297,SUSE-SLE-Product-SLES-15-2021-1297,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1297,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1297,SUSE-SLE-Product-SLES_SAP-15-2021-1297,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1297,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1297,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1297,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1297,SUSE-Storage-6-2021-1297 SKIP SUSE-RU-2021:1297-3 as SUSE-SLE-Product-SLES_SAP-15-2021-1297 is not security or has no CVEs. patches: SUSE-2021-1297,SUSE-SLE-Product-SLES_SAP-15-2021-1297 SKIP SUSE-RU-2021:1298-1 as SUSE-SUSE-MicroOS-5.0-2021-1298 is not security or has no CVEs. patches: SUSE-2021-1298,SUSE-SLE-Module-Basesystem-15-SP2-2021-1298,SUSE-SUSE-MicroOS-5.0-2021-1298 SKIP SUSE-RU-2021:1302-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1302 is not security or has no CVEs. patches: SUSE-2021-1302,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1302 SKIP SUSE-RU-2021:1303-1 as SUSE-SLE-HA-12-SP5-2021-1303 is not security or has no CVEs. patches: SUSE-2021-1303,SUSE-SLE-HA-12-SP4-2021-1303,SUSE-SLE-HA-12-SP5-2021-1303 SKIP SUSE-RU-2021:1308-1 as SUSE-SLE-HA-12-SP5-2021-1308 is not security or has no CVEs. patches: SUSE-2021-1308,SUSE-SLE-HA-12-SP4-2021-1308,SUSE-SLE-HA-12-SP5-2021-1308 SKIP SUSE-RU-2021:1309-1 as SUSE-SUSE-MicroOS-5.0-2021-1309 is not security or has no CVEs. patches: SUSE-2021-1309,SUSE-SLE-Module-Basesystem-15-SP2-2021-1309,SUSE-SLE-Module-Basesystem-15-SP3-2021-1309,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1309,SUSE-SLE-Product-WE-15-SP2-2021-1309,SUSE-SLE-Product-WE-15-SP3-2021-1309,SUSE-SUSE-MicroOS-5.0-2021-1309 SKIP SUSE-RU-2021:1312-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1312 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1312,SUSE-2021-1312,SUSE-OpenStack-Cloud-8-2021-1312,SUSE-OpenStack-Cloud-Crowbar-8-2021-1312,SUSE-SLE-SAP-12-SP3-2021-1312,SUSE-SLE-SERVER-12-SP3-2021-1312,SUSE-SLE-SERVER-12-SP3-BCL-2021-1312 SKIP SUSE-RU-2021:1316-1 as SUSE-SLE-SERVER-12-SP5-2021-1316 is not security or has no CVEs. patches: SUSE-2021-1316,SUSE-SLE-SDK-12-SP5-2021-1316,SUSE-SLE-SERVER-12-SP5-2021-1316 SKIP SUSE-RU-2021:1317-1 as SUSE-SLE-SERVER-12-SP5-2021-1317 is not security or has no CVEs. patches: SUSE-2021-1317,SUSE-SLE-SERVER-12-SP5-2021-1317 SKIP SUSE-RU-2021:1319-1 as SUSE-SLE-SERVER-12-SP5-2021-1319 is not security or has no CVEs. patches: SUSE-2021-1319,SUSE-SLE-SDK-12-SP5-2021-1319,SUSE-SLE-SERVER-12-SP5-2021-1319 SKIP SUSE-RU-2021:1320-1 as SUSE-SLE-Product-WE-15-SP2-2021-1320 is not security or has no CVEs. patches: SUSE-2021-1320,SUSE-SLE-Module-Basesystem-15-SP2-2021-1320,SUSE-SLE-Module-Basesystem-15-SP3-2021-1320,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1320,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1320,SUSE-SLE-Product-WE-15-SP2-2021-1320,SUSE-SLE-Product-WE-15-SP3-2021-1320 SKIP SUSE-RU-2021:1321-1 as SUSE-SLE-Product-WE-15-SP2-2021-1321 is not security or has no CVEs. patches: SUSE-2021-1321,SUSE-SLE-Module-Basesystem-15-SP2-2021-1321,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1321,SUSE-SLE-Product-WE-15-SP2-2021-1321 SKIP SUSE-RU-2021:1323-1 as SUSE-SLE-SDK-12-SP5-2021-1323 is not security or has no CVEs. patches: SUSE-2021-1323,SUSE-SLE-HA-12-SP3-2021-1323,SUSE-SLE-HA-12-SP4-2021-1323,SUSE-SLE-HA-12-SP5-2021-1323,SUSE-SLE-SDK-12-SP5-2021-1323 SKIP SUSE-RU-2021:1326-1 as SUSE-SUSE-MicroOS-5.0-2021-1326 is not security or has no CVEs. patches: SUSE-2021-1326,SUSE-SUSE-MicroOS-5.0-2021-1326 SKIP SUSE-RU-2021:1327-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1327 is not security or has no CVEs. patches: SUSE-2021-1327,SUSE-SLE-Module-SAP-Applications-15-2021-1327,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1327,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1327 SKIP SUSE-RU-2021:1328-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1328 is not security or has no CVEs. patches: SUSE-2021-1328,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1328 SKIP SUSE-RU-2021:1329-1 as SUSE-SLE-SAP-12-SP5-2021-1329 is not security or has no CVEs. patches: SUSE-2021-1329,SUSE-SLE-SAP-12-SP3-2021-1329,SUSE-SLE-SAP-12-SP4-2021-1329,SUSE-SLE-SAP-12-SP5-2021-1329 SKIP SUSE-RU-2021:1330-1 as SUSE-SLE-SAP-12-SP5-2021-1330 is not security or has no CVEs. patches: SUSE-2021-1330,SUSE-SLE-SAP-12-SP3-2021-1330,SUSE-SLE-SAP-12-SP4-2021-1330,SUSE-SLE-SAP-12-SP5-2021-1330 SKIP SUSE-RU-2021:1331-1 as SUSE-SLE-SAP-12-SP5-2021-1331 is not security or has no CVEs. patches: SUSE-2021-1331,SUSE-SLE-SAP-12-SP3-2021-1331,SUSE-SLE-SAP-12-SP4-2021-1331,SUSE-SLE-SAP-12-SP5-2021-1331 SKIP SUSE-RU-2021:1332-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1332 is not security or has no CVEs. patches: SUSE-2021-1332,SUSE-SLE-Module-SAP-Applications-15-2021-1332,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1332 SKIP SUSE-RU-2021:1333-1 as SUSE-SLE-SAP-12-SP5-2021-1333 is not security or has no CVEs. patches: SUSE-2021-1333,SUSE-SLE-SAP-12-SP3-2021-1333,SUSE-SLE-SAP-12-SP4-2021-1333,SUSE-SLE-SAP-12-SP5-2021-1333 SKIP SUSE-RU-2021:1334-1 as SUSE-SLE-SERVER-12-SP5-2021-1334 is not security or has no CVEs. patches: SUSE-2021-1334,SUSE-SLE-SERVER-12-SP5-2021-1334 SKIP SUSE-RU-2021:1335-1 as SUSE-SLE-Product-HA-15-SP2-2021-1335 is not security or has no CVEs. patches: SUSE-2021-1335,SUSE-SLE-Product-HA-15-2021-1335,SUSE-SLE-Product-HA-15-SP1-2021-1335,SUSE-SLE-Product-HA-15-SP2-2021-1335,SUSE-SLE-Product-HA-15-SP3-2021-1335 SKIP SUSE-RU-2021:1336-1 as SUSE-SLE-SERVER-12-SP5-2021-1336 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1336,SUSE-2021-1336,SUSE-OpenStack-Cloud-8-2021-1336,SUSE-OpenStack-Cloud-9-2021-1336,SUSE-OpenStack-Cloud-Crowbar-8-2021-1336,SUSE-OpenStack-Cloud-Crowbar-9-2021-1336,SUSE-SLE-SAP-12-SP3-2021-1336,SUSE-SLE-SAP-12-SP4-2021-1336,SUSE-SLE-SDK-12-SP5-2021-1336,SUSE-SLE-SERVER-12-SP2-BCL-2021-1336,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1336,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1336,SUSE-SLE-SERVER-12-SP3-2021-1336,SUSE-SLE-SERVER-12-SP3-BCL-2021-1336,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1336,SUSE-SLE-SERVER-12-SP5-2021-1336 SKIP SUSE-RU-2021:1400-1 as SUSE-SLE-SERVER-12-SP5-2021-1400 is not security or has no CVEs. patches: SUSE-2021-1400,SUSE-SLE-SDK-12-SP5-2021-1400,SUSE-SLE-SERVER-12-SP5-2021-1400 SKIP SUSE-RU-2021:1402-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1402 is not security or has no CVEs. patches: SUSE-2021-1402,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1402,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1402 SKIP SUSE-RU-2021:1403-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1403 is not security or has no CVEs. patches: SUSE-2021-1403,SUSE-SLE-Module-Public-Cloud-12-2021-1403 SKIP SUSE-RU-2021:1404-1 as SUSE-SLE-Product-WE-15-SP2-2021-1404 is not security or has no CVEs. patches: SUSE-2021-1404,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1404,SUSE-SLE-Product-WE-15-SP2-2021-1404 SKIP SUSE-RU-2021:1405-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1405 is not security or has no CVEs. patches: SUSE-2021-1405,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1405,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1405 SKIP SUSE-RU-2021:1407-1 as SUSE-Storage-6-2021-1407 is not security or has no CVEs. patches: SUSE-2021-1407,SUSE-SLE-Module-Basesystem-15-SP2-2021-1407,SUSE-SLE-Module-Basesystem-15-SP3-2021-1407,SUSE-SLE-Product-HPC-15-2021-1407,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1407,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1407,SUSE-SLE-Product-SLES-15-2021-1407,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1407,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1407,SUSE-SLE-Product-SLES_SAP-15-2021-1407,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1407,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1407,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1407,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1407,SUSE-SUSE-MicroOS-5.0-2021-1407,SUSE-Storage-6-2021-1407 SKIP SUSE-RU-2021:1410-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1410 is not security or has no CVEs. patches: SUSE-2021-1410,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1410,SUSE-SLE-Module-RT-15-SP3-2021-1410 SKIP SUSE-RU-2021:1413-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1413 is not security or has no CVEs. patches: SUSE-2021-1413,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1413,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1413 SKIP SUSE-RU-2021:1415-1 as SUSE-SLE-Product-WE-15-SP2-2021-1415 is not security or has no CVEs. patches: SUSE-2021-1415,SUSE-SLE-Module-Basesystem-15-SP2-2021-1415,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1415,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1415,SUSE-SLE-Product-WE-15-SP2-2021-1415 SKIP SUSE-RU-2021:1416-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1416 is not security or has no CVEs. patches: SUSE-2021-1416,SUSE-SLE-Module-Basesystem-15-SP2-2021-1416,SUSE-SLE-Module-Basesystem-15-SP3-2021-1416 SKIP SUSE-RU-2021:1417-1 as SUSE-SLE-Module-Legacy-15-SP2-2021-1417 is not security or has no CVEs. patches: SUSE-2021-1417,SUSE-SLE-Module-Legacy-15-SP2-2021-1417,SUSE-SLE-Module-Legacy-15-SP3-2021-1417 SKIP SUSE-RU-2021:1418-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2021-1418 is not security or has no CVEs. patches: SUSE-2021-1418,SUSE-OpenStack-Cloud-9-2021-1418,SUSE-OpenStack-Cloud-Crowbar-9-2021-1418,SUSE-SLE-SAP-12-SP4-2021-1418,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1418,SUSE-SLE-SERVER-INSTALLER-12-SP4-2021-1418 SKIP SUSE-RU-2021:1419-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1419 is not security or has no CVEs. patches: SUSE-2021-1419,SUSE-SLE-Module-Basesystem-15-SP2-2021-1419,SUSE-SLE-Module-Basesystem-15-SP3-2021-1419 SKIP SUSE-RU-2021:1420-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1420 is not security or has no CVEs. patches: SUSE-2021-1420,SUSE-SLE-INSTALLER-15-SP2-2021-1420,SUSE-SLE-Module-Basesystem-15-SP2-2021-1420 SKIP SUSE-RU-2021:1421-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1421 is not security or has no CVEs. patches: SUSE-2021-1421,SUSE-SLE-Module-Basesystem-15-SP2-2021-1421 SKIP SUSE-RU-2021:1422-1 as SUSE-SLE-SERVER-12-SP5-2021-1422 is not security or has no CVEs. patches: SUSE-2021-1422,SUSE-SLE-SERVER-12-SP5-2021-1422 SKIP SUSE-RU-2021:1423-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1423 is not security or has no CVEs. patches: SUSE-2021-1423,SUSE-SLE-Module-Basesystem-15-SP2-2021-1423 SKIP SUSE-RU-2021:1424-1 as SUSE-SUSE-MicroOS-5.0-2021-1424 is not security or has no CVEs. patches: SUSE-2021-1424,SUSE-SLE-Module-Basesystem-15-SP2-2021-1424,SUSE-SLE-Module-Basesystem-15-SP3-2021-1424,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1424,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1424,SUSE-SUSE-MicroOS-5.0-2021-1424 SKIP SUSE-RU-2021:1426-1 as SUSE-SUSE-MicroOS-5.0-2021-1426 is not security or has no CVEs. patches: SUSE-2021-1426,SUSE-SLE-INSTALLER-15-SP2-2021-1426,SUSE-SLE-Module-Basesystem-15-SP2-2021-1426,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1426,SUSE-SUSE-MicroOS-5.0-2021-1426 SKIP SUSE-RU-2021:1427-1 as SUSE-Storage-6-2021-1427 is not security or has no CVEs. patches: SUSE-2021-1427,SUSE-SLE-Module-Basesystem-15-SP2-2021-1427,SUSE-SLE-Product-HPC-15-2021-1427,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1427,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1427,SUSE-SLE-Product-SLES-15-2021-1427,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1427,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1427,SUSE-SLE-Product-SLES_SAP-15-2021-1427,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1427,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1427,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1427,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1427,SUSE-Storage-6-2021-1427 SKIP SUSE-RU-2021:1428-1 as SUSE-SUSE-MicroOS-5.0-2021-1428 is not security or has no CVEs. patches: SUSE-2021-1428,SUSE-SLE-Module-Basesystem-15-SP2-2021-1428,SUSE-SUSE-MicroOS-5.0-2021-1428 SKIP SUSE-RU-2021:1434-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1434 is not security or has no CVEs. patches: SUSE-2021-1434,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1434,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1434 SKIP SUSE-RU-2021:1436-1 as SUSE-SLE-SERVER-12-SP5-2021-1436 is not security or has no CVEs. patches: SUSE-2021-1436,SUSE-SLE-SERVER-12-SP5-2021-1436 SKIP SUSE-RU-2021:1437-1 as SUSE-SLE-SERVER-12-SP5-2021-1437 is not security or has no CVEs. patches: SUSE-2021-1437,SUSE-SLE-SERVER-12-SP5-2021-1437 SKIP SUSE-RU-2021:1446-1 as SUSE-SUSE-MicroOS-5.0-2021-1446 is not security or has no CVEs. patches: SUSE-2021-1446,SUSE-SLE-Module-Basesystem-15-SP2-2021-1446,SUSE-SUSE-MicroOS-5.0-2021-1446 SKIP SUSE-RU-2021:1448-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1448 is not security or has no CVEs. patches: SUSE-2021-1448,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1448,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1448 SKIP SUSE-RU-2021:1449-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1449 is not security or has no CVEs. patches: SUSE-2021-1449,SUSE-SLE-Module-Basesystem-15-SP2-2021-1449,SUSE-SLE-Module-Basesystem-15-SP3-2021-1449 SKIP SUSE-RU-2021:1450-1 as SUSE-SLE-SERVER-12-SP5-2021-1450 is not security or has no CVEs. patches: SUSE-2021-1450,SUSE-SLE-SDK-12-SP5-2021-1450,SUSE-SLE-SERVER-12-SP5-2021-1450 SKIP SUSE-RU-2021:1451-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1451 is not security or has no CVEs. patches: SUSE-2021-1451,SUSE-SLE-Module-Basesystem-15-SP2-2021-1451,SUSE-SLE-Module-Basesystem-15-SP3-2021-1451,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1451,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1451 SKIP SUSE-RU-2021:1456-1 as SUSE-Storage-6-2021-1456 is not security or has no CVEs. patches: SUSE-2021-1456,SUSE-SLE-Module-Basesystem-15-SP2-2021-1456,SUSE-SLE-Module-Basesystem-15-SP3-2021-1456,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1456,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1456,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1456,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1456,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1456,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1456,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1456,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1456,SUSE-Storage-6-2021-1456 SKIP SUSE-RU-2021:1457-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1457 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1457,SUSE-2021-1457,SUSE-OpenStack-Cloud-8-2021-1457,SUSE-OpenStack-Cloud-Crowbar-8-2021-1457,SUSE-SLE-SAP-12-SP3-2021-1457,SUSE-SLE-SERVER-12-SP2-BCL-2021-1457,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1457,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1457,SUSE-SLE-SERVER-12-SP3-2021-1457,SUSE-SLE-SERVER-12-SP3-BCL-2021-1457 SKIP SUSE-RU-2021:1459-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1459 is not security or has no CVEs. patches: SUSE-2021-1459,SUSE-SLE-Product-HPC-15-2021-1459,SUSE-SLE-Product-SLES_SAP-15-2021-1459 SKIP SUSE-RU-2021:14599-1 as slehasp4-libdlm-14599 is not security or has no CVEs. patches: slehasp4-libdlm-14599 ERROR: notice SUSE-RU-2021:14607-1 has no valid patches out of: SKIP SUSE-RU-2021:1461-1 as SUSE-SLE-SERVER-12-SP5-2021-1461 is not security or has no CVEs. patches: SUSE-2021-1461,SUSE-OpenStack-Cloud-9-2021-1461,SUSE-OpenStack-Cloud-Crowbar-9-2021-1461,SUSE-SLE-SAP-12-SP4-2021-1461,SUSE-SLE-SDK-12-SP5-2021-1461,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1461,SUSE-SLE-SERVER-12-SP5-2021-1461 ERROR: notice SUSE-RU-2021:14611-1 has no valid patches out of: suse-ubu184ct-client-tools-202101-14611 ERROR: notice SUSE-RU-2021:14612-1 has no valid patches out of: suse-ubu164ct-client-tools-202101-14612 ERROR: notice SUSE-RU-2021:14614-1 has no valid patches out of: suse-ubu204ct-client-tools-202101-14614 SKIP SUSE-RU-2021:14616-1 as slesctsp4-client-tools-202101-14616 is not security or has no CVEs. patches: slesctsp3-client-tools-202101-14616,slesctsp4-client-tools-202101-14616 SKIP SUSE-RU-2021:1462-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1462 is not security or has no CVEs. patches: SUSE-2021-1462,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1462,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1462,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1462 ERROR: notice SUSE-RU-2021:14620-1 has no valid patches out of: slesctsp3-client-tools-beta-202101-14620,slesctsp4-client-tools-beta-202101-14620 ERROR: notice SUSE-RU-2021:14625-1 has no valid patches out of: suse-ubu164ct-client-tools-beta-202101-14625 SKIP SUSE-RU-2021:1463-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1463 is not security or has no CVEs. patches: SUSE-2021-1463,SUSE-SLE-Module-Basesystem-15-SP2-2021-1463 SKIP SUSE-RU-2021:14635-1 as slessp4-microcode_ctl-14635 is not security or has no CVEs. patches: sleposp3-microcode_ctl-14635,slessp4-microcode_ctl-14635 SKIP SUSE-RU-2021:1464-1 as SUSE-SLE-Product-SLES-15-SP2-2021-1464 is not security or has no CVEs. patches: SUSE-2021-1464,SUSE-SLE-INSTALLER-15-SP2-2021-1464,SUSE-SLE-Product-SLES-15-SP2-2021-1464 SKIP SUSE-RU-2021:14642-1 as slessp4-apparmor-14642 is not security or has no CVEs. patches: sleposp3-apparmor-14642,slessp4-apparmor-14642 ERROR: notice SUSE-RU-2021:14651-1 has no valid patches out of: suse-ubu164ct-client-tools-beta-202102-14651 ERROR: notice SUSE-RU-2021:14654-1 has no valid patches out of: suse-ubu184ct-client-tools-beta-202102-14654 ERROR: notice SUSE-RU-2021:14655-1 has no valid patches out of: slesctsp3-client-tools-beta-202102-14655,slesctsp4-client-tools-beta-202102-14655 ERROR: notice SUSE-RU-2021:14656-1 has no valid patches out of: suse-ubu204ct-client-tools-beta-202102-14656 ERROR: notice SUSE-RU-2021:14671-1 has no valid patches out of: suse-ubu204ct-client-tools-202103-14671 ERROR: notice SUSE-RU-2021:14672-1 has no valid patches out of: suse-ubu164ct-client-tools-202103-14672 SKIP SUSE-RU-2021:14674-1 as slesctsp4-client-tools-202103-14674 is not security or has no CVEs. patches: slesctsp3-client-tools-202103-14674,slesctsp4-client-tools-202103-14674 ERROR: notice SUSE-RU-2021:14675-1 has no valid patches out of: suse-ubu184ct-client-tools-202103-14675 SKIP SUSE-RU-2021:14687-1 as slessp4-oracleasm-14687 is not security or has no CVEs. patches: slessp4-oracleasm-14687 SKIP SUSE-RU-2021:14688-1 as slehasp4-drbd-14688 is not security or has no CVEs. patches: slehasp4-drbd-14688 SKIP SUSE-RU-2021:14689-1 as slessp4-crash-14689 is not security or has no CVEs. patches: slessp4-crash-14689 ERROR: notice SUSE-RU-2021:14694-1 has no valid patches out of: suse-ubu164ct-client-tools-202103-14694 ERROR: notice SUSE-RU-2021:14695-1 has no valid patches out of: suse-ubu204ct-client-tools-202103-14695 ERROR: notice SUSE-RU-2021:14698-1 has no valid patches out of: suse-ubu184ct-client-tools-202103-14698 SKIP SUSE-RU-2021:14699-1 as slesctsp4-client-tools-202103-14699 is not security or has no CVEs. patches: slesctsp3-client-tools-202103-14699,slesctsp4-client-tools-202103-14699 SKIP SUSE-RU-2021:14701-1 as slessp4-iscsitarget-14701 is not security or has no CVEs. patches: slessp4-iscsitarget-14701 SKIP SUSE-RU-2021:14711-1 as slessp4-supportutils-14711 is not security or has no CVEs. patches: sleposp3-supportutils-14711,slessp4-supportutils-14711 ERROR: notice SUSE-RU-2021:14717-1 has no valid patches out of: suse-ubu164ct-client-tools-beta-202104-14717 ERROR: notice SUSE-RU-2021:14718-1 has no valid patches out of: suse-ubu184ct-client-tools-beta-202104-14718 ERROR: notice SUSE-RU-2021:14719-1 has no valid patches out of: suse-ubu204ct-client-tools-beta-202104-14719 ERROR: notice SUSE-RU-2021:14721-1 has no valid patches out of: slesctsp3-client-tools-beta-202104-14721,slesctsp4-client-tools-beta-202104-14721 SKIP SUSE-RU-2021:14725-1 as slessp4-tomcat6-14725 is not security or has no CVEs. patches: sleposp3-tomcat6-14725,slessp4-tomcat6-14725 SKIP SUSE-RU-2021:14730-1 as slessp4-apparmor-profiles-14730 is not security or has no CVEs. patches: sleposp3-apparmor-profiles-14730,slessp4-apparmor-profiles-14730 SKIP SUSE-RU-2021:14746-1 as slessp4-clamav-14746 is not security or has no CVEs. patches: secsp3-clamav-14746,sleposp3-clamav-14746,slessp4-clamav-14746 SKIP SUSE-RU-2021:1476-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1476 is not security or has no CVEs. patches: SUSE-2021-1476,SUSE-SLE-Module-Basesystem-15-SP2-2021-1476,SUSE-SLE-Module-Basesystem-15-SP3-2021-1476 SKIP SUSE-RU-2021:14765-1 as slessp4-udev-14765 is not security or has no CVEs. patches: slessp4-udev-14765 SKIP SUSE-RU-2021:14767-1 as slessp4-sendmail-14767 is not security or has no CVEs. patches: secsp3-sendmail-14767,sleposp3-sendmail-14767,slessp4-sendmail-14767 ERROR: notice SUSE-RU-2021:14778-1 has no valid patches out of: suse-ubu204ct-client-tools-202107-14778 ERROR: notice SUSE-RU-2021:14779-1 has no valid patches out of: suse-ubu184ct-client-tools-202107-14779 SKIP SUSE-RU-2021:1478-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1478 is not security or has no CVEs. patches: SUSE-2021-1478,SUSE-SLE-Module-Basesystem-15-SP2-2021-1478,SUSE-SLE-Module-Basesystem-15-SP3-2021-1478 SKIP SUSE-RU-2021:14781-1 as slesctsp4-client-tools-202107-14781 is not security or has no CVEs. patches: slesctsp3-client-tools-202107-14781,slesctsp4-client-tools-202107-14781 SKIP SUSE-RU-2021:14784-1 as slessp4-cpio-14784 is not security or has no CVEs. patches: sleposp3-cpio-14784,slessp4-cpio-14784 SKIP SUSE-RU-2021:14786-1 as slessp4-cpio-14786 is not security or has no CVEs. patches: sleposp3-cpio-14786,slessp4-cpio-14786 SKIP SUSE-RU-2021:1479-1 as SUSE-SUSE-MicroOS-5.0-2021-1479 is not security or has no CVEs. patches: SUSE-2021-1479,SUSE-SLE-Module-Basesystem-15-SP2-2021-1479,SUSE-SUSE-MicroOS-5.0-2021-1479 SKIP SUSE-RU-2021:14799-1 as slessp4-mdadm-14799 is not security or has no CVEs. patches: slessp4-mdadm-14799 SKIP SUSE-RU-2021:1480-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-1480 is not security or has no CVEs. patches: SUSE-2021-1480,SUSE-SLE-SERVER-12-SP5-2021-1480,SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-1480 ERROR: notice SUSE-RU-2021:14803-1 has no valid patches out of: suse-ubu184ct-client-tools-202109-14803 ERROR: notice SUSE-RU-2021:14805-1 has no valid patches out of: suse-ubu204ct-client-tools-202109-14805 SKIP SUSE-RU-2021:14806-1 as slesctsp4-client-tools-202109-14806 is not security or has no CVEs. patches: slesctsp3-client-tools-202109-14806,slesctsp4-client-tools-202109-14806 SKIP SUSE-RU-2021:14808-1 as slessp4-shim-14808 is not security or has no CVEs. patches: slessp4-shim-14808 SKIP SUSE-RU-2021:14809-1 as slessp4-openssl-certs-14809 is not security or has no CVEs. patches: sleposp3-openssl-certs-14809,slessp4-openssl-certs-14809 SKIP SUSE-RU-2021:1481-1 as SUSE-SUSE-MicroOS-5.0-2021-1481 is not security or has no CVEs. patches: SUSE-2021-1481,SUSE-SLE-Module-Basesystem-15-SP2-2021-1481,SUSE-SLE-Module-Basesystem-15-SP3-2021-1481,SUSE-SLE-Product-HA-15-SP2-2021-1481,SUSE-SLE-Product-HA-15-SP3-2021-1481,SUSE-SUSE-MicroOS-5.0-2021-1481 SKIP SUSE-RU-2021:14812-1 as slessp4-ghostscript-library-14812 is not security or has no CVEs. patches: sleposp3-ghostscript-library-14812,slessp4-ghostscript-library-14812 SKIP SUSE-RU-2021:14816-1 as slessp4-rsync-14816 is not security or has no CVEs. patches: sleposp3-rsync-14816,slessp4-rsync-14816 SKIP SUSE-RU-2021:14817-1 as slessp4-firefox-buildtools-14817 is not security or has no CVEs. patches: slessp4-firefox-buildtools-14817 SKIP SUSE-RU-2021:1482-1 as SUSE-Storage-6-2021-1482 is not security or has no CVEs. patches: SUSE-2021-1482,SUSE-SLE-INSTALLER-15-SP1-2021-1482,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1482,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1482,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1482,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1482,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1482,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1482,SUSE-Storage-6-2021-1482 SKIP SUSE-RU-2021:14824-1 as slessp4-kdump-14824 is not security or has no CVEs. patches: slessp4-kdump-14824 SKIP SUSE-RU-2021:1483-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1483 is not security or has no CVEs. patches: SUSE-2021-1483,SUSE-SLE-Module-SAP-Applications-15-2021-1483,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1483 SKIP SUSE-RU-2021:14830-1 as slessp4-MozillaFirefox-14830 is not security or has no CVEs. patches: slessp4-MozillaFirefox-14830 SKIP SUSE-RU-2021:1484-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1484 is not security or has no CVEs. patches: SUSE-2021-1484,SUSE-SLE-Module-Public-Cloud-12-2021-1484 SKIP SUSE-RU-2021:1485-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1485 is not security or has no CVEs. patches: SUSE-2021-1485,SUSE-SLE-Module-Public-Cloud-12-2021-1485 SKIP SUSE-RU-2021:14851-1 as slessp4-net-snmp-14851 is not security or has no CVEs. patches: secsp3-net-snmp-14851,sleposp3-net-snmp-14851,slessp4-net-snmp-14851 SKIP SUSE-RU-2021:14852-1 as slessp4-libsatsolver-14852 is not security or has no CVEs. patches: sleposp3-libsatsolver-14852,slessp4-libsatsolver-14852 ERROR: notice SUSE-RU-2021:14853-1 has no valid patches out of: suse-ubu184ct-client-tools-202111-14853 ERROR: notice SUSE-RU-2021:14855-1 has no valid patches out of: suse-ubu204ct-client-tools-202111-14855 SKIP SUSE-RU-2021:14856-1 as slesctsp4-client-tools-202111-14856 is not security or has no CVEs. patches: slesctsp3-client-tools-202111-14856,slesctsp4-client-tools-202111-14856 SKIP SUSE-RU-2021:14862-1 as slessp4-libzypp-14862 is not security or has no CVEs. patches: sleposp3-libzypp-14862,slessp4-libzypp-14862 SKIP SUSE-RU-2021:1487-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1487 is not security or has no CVEs. patches: SUSE-2021-1487,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1487,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1487 SKIP SUSE-RU-2021:1502-1 as SUSE-2021-1502 is not security or has no CVEs. patches: SUSE-2021-1502,SUSE-SLE-Manager-Tools-15-2021-1502 SKIP SUSE-RU-2021:1503-1 as SUSE-2021-1503 is not security or has no CVEs. patches: SUSE-2021-1503,SUSE-SLE-Manager-Tools-12-2021-1503 ERROR: notice SUSE-RU-2021:1505-1 has no valid patches out of: SUSE-2021-1505,SUSE-Debian-9.0-CLIENT-TOOLS-BETA-x86_64-2021-1505 ERROR: notice SUSE-RU-2021:1506-1 has no valid patches out of: SUSE-2021-1506,SUSE-Debian-10-CLIENT-TOOLS-BETA-x86_64-2021-1506 SKIP SUSE-RU-2021:1510-1 as SUSE-2021-1510 is not security or has no CVEs. patches: SUSE-2021-1510,SUSE-SLE-Manager-Tools-12-2021-1510 SKIP SUSE-RU-2021:1511-1 as SUSE-2021-1511 is not security or has no CVEs. patches: SUSE-2021-1511,SUSE-SLE-Manager-Tools-15-2021-1511 SKIP SUSE-RU-2021:1513-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1513 is not security or has no CVEs. patches: SUSE-2021-1513,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1513 SKIP SUSE-RU-2021:1514-1 as SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1514 is not security or has no CVEs. patches: SUSE-2021-1514,SUSE-SLE-Module-Basesystem-15-SP2-2021-1514,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1514 SKIP SUSE-RU-2021:1516-1 as SUSE-SUSE-MicroOS-5.0-2021-1516 is not security or has no CVEs. patches: SUSE-2021-1516,SUSE-SUSE-MicroOS-5.0-2021-1516 SKIP SUSE-RU-2021:1519-1 as SUSE-SLE-SERVER-12-SP5-2021-1519 is not security or has no CVEs. patches: SUSE-2021-1519,SUSE-SLE-SERVER-12-SP5-2021-1519 SKIP SUSE-RU-2021:1520-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1520 is not security or has no CVEs. patches: SUSE-2021-1520,SUSE-SLE-Module-Basesystem-15-SP2-2021-1520 SKIP SUSE-RU-2021:1522-1 as SUSE-SLE-RT-12-SP5-2021-1522 is not security or has no CVEs. patches: SUSE-2021-1522,SUSE-SLE-RT-12-SP5-2021-1522 SKIP SUSE-RU-2021:1525-1 as SUSE-Storage-7-2021-1525 is not security or has no CVEs. patches: SUSE-2021-1525,SUSE-Storage-7-2021-1525 SKIP SUSE-RU-2021:1526-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1526 is not security or has no CVEs. patches: SUSE-2021-1526,SUSE-SLE-Module-Basesystem-15-SP3-2021-1526 SKIP SUSE-RU-2021:1527-1 as SUSE-Storage-6-2021-1527 is not security or has no CVEs. patches: SUSE-2021-1527,SUSE-SLE-Module-Basesystem-15-SP2-2021-1527,SUSE-SLE-Product-HPC-15-2021-1527,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1527,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1527,SUSE-SLE-Product-SLES-15-2021-1527,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1527,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1527,SUSE-SLE-Product-SLES_SAP-15-2021-1527,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1527,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1527,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1527,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1527,SUSE-SUSE-MicroOS-5.0-2021-1527,SUSE-Storage-6-2021-1527 SKIP SUSE-RU-2021:1528-1 as SUSE-SUSE-MicroOS-5.0-2021-1528 is not security or has no CVEs. patches: SUSE-2021-1528,SUSE-SLE-Module-Basesystem-15-SP2-2021-1528,SUSE-SLE-Module-Basesystem-15-SP3-2021-1528,SUSE-SUSE-MicroOS-5.0-2021-1528 SKIP SUSE-RU-2021:1529-1 as SUSE-SLE-SERVER-12-SP5-2021-1529 is not security or has no CVEs. patches: SUSE-2021-1529,SUSE-SLE-SDK-12-SP5-2021-1529,SUSE-SLE-SERVER-12-SP5-2021-1529 SKIP SUSE-RU-2021:1530-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1530 is not security or has no CVEs. patches: SUSE-2021-1530,SUSE-SLE-Module-SAP-Applications-15-2021-1530,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1530 SKIP SUSE-RU-2021:1531-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1531 is not security or has no CVEs. patches: SUSE-2021-1531,SUSE-SLE-Module-SAP-Applications-15-2021-1531,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1531 SKIP SUSE-RU-2021:1532-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1532 is not security or has no CVEs. patches: SUSE-2021-1532,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1532,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1532 SKIP SUSE-RU-2021:1533-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1533 is not security or has no CVEs. patches: SUSE-2021-1533,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1533,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1533 SKIP SUSE-RU-2021:1534-1 as SUSE-SUSE-MicroOS-5.0-2021-1534 is not security or has no CVEs. patches: SUSE-2021-1534,SUSE-SLE-Module-Basesystem-15-SP2-2021-1534,SUSE-SUSE-MicroOS-5.0-2021-1534 SKIP SUSE-RU-2021:1535-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1535 is not security or has no CVEs. patches: SUSE-2021-1535,SUSE-SLE-Module-Basesystem-15-SP2-2021-1535,SUSE-SLE-Module-Basesystem-15-SP3-2021-1535,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1535,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1535 SKIP SUSE-RU-2021:1536-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1536 is not security or has no CVEs. patches: SUSE-2021-1536,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1536,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1536 SKIP SUSE-RU-2021:1537-1 as SUSE-SLE-Product-HA-15-2021-1537 is not security or has no CVEs. patches: SUSE-2021-1537,SUSE-SLE-Product-HA-15-2021-1537 SKIP SUSE-RU-2021:1538-1 as SUSE-SLE-SERVER-12-SP5-2021-1538 is not security or has no CVEs. patches: SUSE-2021-1538,SUSE-SLE-SERVER-12-SP5-2021-1538 SKIP SUSE-RU-2021:1539-1 as SUSE-SLE-SERVER-12-SP5-2021-1539 is not security or has no CVEs. patches: SUSE-2021-1539,SUSE-SLE-SERVER-12-SP5-2021-1539 SKIP SUSE-RU-2021:1540-1 as SUSE-SLE-SERVER-12-SP5-2021-1540 is not security or has no CVEs. patches: SUSE-2021-1540,SUSE-SLE-SERVER-12-SP5-2021-1540 SKIP SUSE-RU-2021:1541-1 as SUSE-SLE-WE-12-SP5-2021-1541 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1541,SUSE-2021-1541,SUSE-OpenStack-Cloud-8-2021-1541,SUSE-OpenStack-Cloud-9-2021-1541,SUSE-OpenStack-Cloud-Crowbar-8-2021-1541,SUSE-OpenStack-Cloud-Crowbar-9-2021-1541,SUSE-SLE-SAP-12-SP3-2021-1541,SUSE-SLE-SAP-12-SP4-2021-1541,SUSE-SLE-SDK-12-SP5-2021-1541,SUSE-SLE-SERVER-12-SP2-BCL-2021-1541,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1541,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1541,SUSE-SLE-SERVER-12-SP3-2021-1541,SUSE-SLE-SERVER-12-SP3-BCL-2021-1541,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1541,SUSE-SLE-SERVER-12-SP5-2021-1541,SUSE-SLE-WE-12-SP5-2021-1541 SKIP SUSE-RU-2021:1542-1 as SUSE-SLE-Module-Containers-12-2021-1542 is not security or has no CVEs. patches: SUSE-2021-1542,SUSE-SLE-Module-Containers-12-2021-1542 SKIP SUSE-RU-2021:1543-1 as SUSE-SUSE-MicroOS-5.0-2021-1543 is not security or has no CVEs. patches: SUSE-2021-1543,SUSE-SUSE-MicroOS-5.0-2021-1543 SKIP SUSE-RU-2021:1544-1 as SUSE-SUSE-MicroOS-5.0-2021-1544 is not security or has no CVEs. patches: SUSE-2021-1544,SUSE-SLE-INSTALLER-15-SP2-2021-1544,SUSE-SLE-Module-Basesystem-15-SP2-2021-1544,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1544,SUSE-SUSE-MicroOS-5.0-2021-1544 SKIP SUSE-RU-2021:1545-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1545 is not security or has no CVEs. patches: SUSE-2021-1545,SUSE-SLE-Module-Basesystem-15-SP2-2021-1545,SUSE-SLE-Module-Basesystem-15-SP3-2021-1545,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1545,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1545,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1545,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1545 SKIP SUSE-RU-2021:1546-1 as SUSE-SLE-SERVER-12-SP5-2021-1546 is not security or has no CVEs. patches: SUSE-2021-1546,SUSE-SLE-SERVER-12-SP5-2021-1546 SKIP SUSE-RU-2021:1547-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1547 is not security or has no CVEs. patches: SUSE-2021-1547,SUSE-SLE-Module-Basesystem-15-SP2-2021-1547,SUSE-SLE-Module-Basesystem-15-SP3-2021-1547,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1547,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1547 SKIP SUSE-RU-2021:1548-1 as SUSE-SLE-SERVER-12-SP5-2021-1548 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1548,SUSE-2021-1548,SUSE-OpenStack-Cloud-7-2021-1548,SUSE-OpenStack-Cloud-8-2021-1548,SUSE-OpenStack-Cloud-9-2021-1548,SUSE-OpenStack-Cloud-Crowbar-8-2021-1548,SUSE-OpenStack-Cloud-Crowbar-9-2021-1548,SUSE-SLE-SAP-12-SP3-2021-1548,SUSE-SLE-SAP-12-SP4-2021-1548,SUSE-SLE-SERVER-12-SP2-BCL-2021-1548,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1548,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1548,SUSE-SLE-SERVER-12-SP3-2021-1548,SUSE-SLE-SERVER-12-SP3-BCL-2021-1548,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1548,SUSE-SLE-SERVER-12-SP5-2021-1548 SKIP SUSE-RU-2021:1549-1 as SUSE-SUSE-MicroOS-5.0-2021-1549 is not security or has no CVEs. patches: SUSE-2021-1549,SUSE-SLE-Module-Basesystem-15-SP2-2021-1549,SUSE-SLE-Module-Basesystem-15-SP3-2021-1549,SUSE-SUSE-MicroOS-5.0-2021-1549 SKIP SUSE-RU-2021:1550-1 as SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1550 is not security or has no CVEs. patches: SUSE-2021-1550,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1550,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1550 SKIP SUSE-RU-2021:1551-1 as SUSE-SLE-SERVER-12-SP5-2021-1551 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1551,SUSE-2021-1551,SUSE-OpenStack-Cloud-8-2021-1551,SUSE-OpenStack-Cloud-9-2021-1551,SUSE-OpenStack-Cloud-Crowbar-8-2021-1551,SUSE-OpenStack-Cloud-Crowbar-9-2021-1551,SUSE-SLE-SAP-12-SP3-2021-1551,SUSE-SLE-SAP-12-SP4-2021-1551,SUSE-SLE-SERVER-12-SP2-BCL-2021-1551,SUSE-SLE-SERVER-12-SP2-LTSS-ERICSSON-2021-1551,SUSE-SLE-SERVER-12-SP2-LTSS-SAP-2021-1551,SUSE-SLE-SERVER-12-SP3-2021-1551,SUSE-SLE-SERVER-12-SP3-BCL-2021-1551,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1551,SUSE-SLE-SERVER-12-SP5-2021-1551 SKIP SUSE-RU-2021:1552-1 as SUSE-SLE-Product-WE-15-SP3-2021-1552 is not security or has no CVEs. patches: SUSE-2021-1552,SUSE-SLE-Module-Basesystem-15-SP2-2021-1552,SUSE-SLE-Module-Basesystem-15-SP3-2021-1552,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1552,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1552,SUSE-SLE-Product-WE-15-SP2-2021-1552,SUSE-SLE-Product-WE-15-SP3-2021-1552 SKIP SUSE-RU-2021:1553-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1553 is not security or has no CVEs. patches: SUSE-2021-1553,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1553,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1553 SKIP SUSE-RU-2021:1555-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-1555 is not security or has no CVEs. patches: SUSE-2021-1555,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1555 SKIP SUSE-RU-2021:1562-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1562 is not security or has no CVEs. patches: SUSE-2021-1562,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1562,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1562 SKIP SUSE-RU-2021:1563-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1563 is not security or has no CVEs. patches: SUSE-2021-1563,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1563,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1563 SKIP SUSE-RU-2021:1565-1 as SUSE-SUSE-MicroOS-5.0-2021-1565 is not security or has no CVEs. patches: SUSE-2021-1565,SUSE-SLE-Module-Basesystem-15-SP2-2021-1565,SUSE-SLE-Module-Basesystem-15-SP3-2021-1565,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1565,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1565,SUSE-SUSE-MicroOS-5.0-2021-1565 SKIP SUSE-RU-2021:1566-1 as SUSE-SUSE-MicroOS-5.0-2021-1566 is not security or has no CVEs. patches: SUSE-2021-1566,SUSE-SLE-Module-Basesystem-15-SP2-2021-1566,SUSE-SUSE-MicroOS-5.0-2021-1566 SKIP SUSE-RU-2021:1566-2 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1566 is not security or has no CVEs. patches: SUSE-2021-1566,SUSE-SLE-Module-Basesystem-15-SP3-2021-1566 SKIP SUSE-RU-2021:1567-1 as SUSE-Storage-7-2021-1567 is not security or has no CVEs. patches: SUSE-2021-1567,SUSE-Storage-7-2021-1567 SKIP SUSE-RU-2021:1568-1 as SUSE-SUSE-MicroOS-5.0-2021-1568 is not security or has no CVEs. patches: SUSE-2021-1568,SUSE-SLE-INSTALLER-15-SP2-2021-1568,SUSE-SLE-Module-Basesystem-15-SP2-2021-1568,SUSE-SUSE-MicroOS-5.0-2021-1568 SKIP SUSE-RU-2021:1569-1 as SUSE-SLE-Product-WE-15-SP2-2021-1569 is not security or has no CVEs. patches: SUSE-2021-1569,SUSE-SLE-Product-WE-15-SP2-2021-1569 SKIP SUSE-RU-2021:1570-1 as SUSE-Storage-6-2021-1570 is not security or has no CVEs. patches: SUSE-2021-1570,SUSE-SLE-Module-Basesystem-15-SP2-2021-1570,SUSE-SLE-Module-Basesystem-15-SP3-2021-1570,SUSE-SLE-Module-Python2-15-SP2-2021-1570,SUSE-SLE-Module-Python2-15-SP3-2021-1570,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1570,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1570,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1570,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1570,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1570,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1570,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1570,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1570,SUSE-Storage-6-2021-1570 SKIP SUSE-RU-2021:1581-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1581 is not security or has no CVEs. patches: SUSE-2021-1581,SUSE-SLE-Module-Basesystem-15-SP2-2021-1581 SKIP SUSE-RU-2021:1582-1 as SUSE-SUSE-MicroOS-5.0-2021-1582 is not security or has no CVEs. patches: SUSE-2021-1582,SUSE-SLE-Module-Basesystem-15-SP2-2021-1582,SUSE-SLE-Module-Basesystem-15-SP3-2021-1582,SUSE-SLE-Product-HA-15-SP2-2021-1582,SUSE-SLE-Product-HA-15-SP3-2021-1582,SUSE-SUSE-MicroOS-5.0-2021-1582 SKIP SUSE-RU-2021:1583-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1583 is not security or has no CVEs. patches: SUSE-2021-1583,SUSE-SLE-Module-Basesystem-15-SP2-2021-1583,SUSE-SLE-Module-Basesystem-15-SP3-2021-1583,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1583,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1583 SKIP SUSE-RU-2021:1584-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-1584 is not security or has no CVEs. patches: SUSE-2021-1584,SUSE-OpenStack-Cloud-9-2021-1584,SUSE-OpenStack-Cloud-Crowbar-9-2021-1584,SUSE-SLE-SAP-12-SP4-2021-1584,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1584 SKIP SUSE-RU-2021:1585-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1585 is not security or has no CVEs. patches: SUSE-2021-1585,SUSE-SLE-Module-Public-Cloud-12-2021-1585 SKIP SUSE-RU-2021:1586-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1586 is not security or has no CVEs. patches: SUSE-2021-1586,SUSE-SLE-Module-Public-Cloud-12-2021-1586 SKIP SUSE-RU-2021:1587-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1587 is not security or has no CVEs. patches: SUSE-2021-1587,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1587,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1587,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1587 SKIP SUSE-RU-2021:1588-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1588 is not security or has no CVEs. patches: SUSE-2021-1588,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1588,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1588,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1588 SKIP SUSE-RU-2021:1589-1 as SUSE-SUSE-MicroOS-5.0-2021-1589 is not security or has no CVEs. patches: SUSE-2021-1589,SUSE-SLE-Module-Basesystem-15-SP2-2021-1589,SUSE-SUSE-MicroOS-5.0-2021-1589 SKIP SUSE-RU-2021:1590-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1590 is not security or has no CVEs. patches: SUSE-2021-1590,SUSE-SLE-INSTALLER-15-2021-1590,SUSE-SLE-Product-SLES-15-2021-1590,SUSE-SLE-Product-SLES_SAP-15-2021-1590 SKIP SUSE-RU-2021:1600-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1600 is not security or has no CVEs. patches: SUSE-2021-1600,SUSE-SLE-Module-Basesystem-15-SP2-2021-1600,SUSE-SLE-Module-Basesystem-15-SP3-2021-1600 SKIP SUSE-RU-2021:1601-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1601 is not security or has no CVEs. patches: SUSE-2021-1601,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1601,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1601 SKIP SUSE-RU-2021:1602-1 as SUSE-Storage-6-2021-1602 is not security or has no CVEs. patches: SUSE-2021-1602,SUSE-SLE-INSTALLER-15-SP1-2021-1602,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1602,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1602,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1602,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1602,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1602,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1602,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1602,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1602,SUSE-Storage-6-2021-1602 SKIP SUSE-RU-2021:1603-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1603 is not security or has no CVEs. patches: SUSE-2021-1603,SUSE-SLE-Module-Basesystem-15-SP2-2021-1603,SUSE-SLE-Module-Basesystem-15-SP3-2021-1603 SKIP SUSE-RU-2021:1604-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1604 is not security or has no CVEs. patches: SUSE-2021-1604,SUSE-SLE-Module-Basesystem-15-SP2-2021-1604,SUSE-SLE-Module-Basesystem-15-SP3-2021-1604 SKIP SUSE-RU-2021:1607-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1607 is not security or has no CVEs. patches: SUSE-2021-1607,SUSE-SLE-Module-RT-15-SP2-2021-1607,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1607 SKIP SUSE-RU-2021:1608-1 as SUSE-SLE-SERVER-12-SP5-2021-1608 is not security or has no CVEs. patches: SUSE-2021-1608,SUSE-SLE-SERVER-12-SP5-2021-1608 SKIP SUSE-RU-2021:1609-1 as SUSE-Storage-6-2021-1609 is not security or has no CVEs. patches: SUSE-2021-1609,SUSE-SLE-INSTALLER-15-SP1-2021-1609,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1609,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1609,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1609,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1609,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1609,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1609,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1609,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1609,SUSE-Storage-6-2021-1609 SKIP SUSE-RU-2021:1610-1 as SUSE-SLE-Product-HA-15-2021-1610 is not security or has no CVEs. patches: SUSE-2021-1610,SUSE-SLE-Product-HA-15-2021-1610 SKIP SUSE-RU-2021:1611-1 as SUSE-SLE-HA-12-SP5-2021-1611 is not security or has no CVEs. patches: SUSE-2021-1611,SUSE-SLE-HA-12-SP4-2021-1611,SUSE-SLE-HA-12-SP5-2021-1611 SKIP SUSE-RU-2021:1612-1 as SUSE-SUSE-MicroOS-5.0-2021-1612 is not security or has no CVEs. patches: SUSE-2021-1612,SUSE-SLE-Module-Basesystem-15-SP2-2021-1612,SUSE-SLE-Module-Basesystem-15-SP3-2021-1612,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1612,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1612,SUSE-SLE-Module-Legacy-15-SP2-2021-1612,SUSE-SLE-Module-Legacy-15-SP3-2021-1612,SUSE-SUSE-MicroOS-5.0-2021-1612 SKIP SUSE-RU-2021:1618-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1618 is not security or has no CVEs. patches: SUSE-2021-1618,SUSE-SLE-Module-Basesystem-15-SP2-2021-1618,SUSE-SLE-Module-Basesystem-15-SP3-2021-1618,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1618,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1618,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1618,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1618,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1618,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1618 SKIP SUSE-RU-2021:1619-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1619 is not security or has no CVEs. patches: SUSE-2021-1619,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1619,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1619 SKIP SUSE-RU-2021:1620-1 as SUSE-SLE-SAP-12-SP5-2021-1620 is not security or has no CVEs. patches: SUSE-2021-1620,SUSE-SLE-SAP-12-SP3-2021-1620,SUSE-SLE-SAP-12-SP4-2021-1620,SUSE-SLE-SAP-12-SP5-2021-1620 SKIP SUSE-RU-2021:1626-1 as SUSE-SLE-SAP-12-SP5-2021-1626 is not security or has no CVEs. patches: SUSE-2021-1626,SUSE-SLE-SAP-12-SP3-2021-1626,SUSE-SLE-SAP-12-SP4-2021-1626,SUSE-SLE-SAP-12-SP5-2021-1626 SKIP SUSE-RU-2021:1627-1 as SUSE-SLE-Product-HA-15-SP2-2021-1627 is not security or has no CVEs. patches: SUSE-2021-1627,SUSE-SLE-Product-HA-15-SP2-2021-1627 SKIP SUSE-RU-2021:1628-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1628 is not security or has no CVEs. patches: SUSE-2021-1628,SUSE-SLE-INSTALLER-15-SP2-2021-1628,SUSE-SLE-Module-Basesystem-15-SP2-2021-1628 SKIP SUSE-RU-2021:1629-1 as SUSE-SLE-SERVER-12-SP5-2021-1629 is not security or has no CVEs. patches: SUSE-2021-1629,SUSE-SLE-SERVER-12-SP5-2021-1629 SKIP SUSE-RU-2021:1630-1 as SUSE-SLE-Product-HA-15-SP3-2021-1630 is not security or has no CVEs. patches: SUSE-2021-1630,SUSE-SLE-Product-HA-15-SP2-2021-1630,SUSE-SLE-Product-HA-15-SP3-2021-1630 SKIP SUSE-RU-2021:1631-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1631 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1631,SUSE-2021-1631,SUSE-OpenStack-Cloud-8-2021-1631,SUSE-OpenStack-Cloud-Crowbar-8-2021-1631,SUSE-SLE-SAP-12-SP3-2021-1631,SUSE-SLE-SERVER-12-SP3-2021-1631,SUSE-SLE-SERVER-12-SP3-BCL-2021-1631 SKIP SUSE-RU-2021:1632-1 as SUSE-SLE-Product-HA-15-2021-1632 is not security or has no CVEs. patches: SUSE-2021-1632,SUSE-SLE-Product-HA-15-2021-1632 SKIP SUSE-RU-2021:1633-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-1633 is not security or has no CVEs. patches: SUSE-2021-1633,SUSE-SLE-SDK-12-SP5-2021-1633,SUSE-SLE-SERVER-12-SP5-2021-1633,SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-1633 SKIP SUSE-RU-2021:1634-1 as SUSE-SLE-SERVER-12-SP5-2021-1634 is not security or has no CVEs. patches: SUSE-2021-1634,SUSE-SLE-SERVER-12-SP5-2021-1634 SKIP SUSE-RU-2021:1635-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1635 is not security or has no CVEs. patches: SUSE-2021-1635,SUSE-SLE-Module-Basesystem-15-SP2-2021-1635 SKIP SUSE-RU-2021:1640-1 as SUSE-SLE-Product-WE-15-SP3-2021-1640 is not security or has no CVEs. patches: SUSE-2021-1640,SUSE-SLE-Module-Basesystem-15-SP2-2021-1640,SUSE-SLE-Module-Basesystem-15-SP3-2021-1640,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1640,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1640,SUSE-SLE-Product-WE-15-SP2-2021-1640,SUSE-SLE-Product-WE-15-SP3-2021-1640 SKIP SUSE-RU-2021:1643-1 as SUSE-Storage-6-2021-1643 is not security or has no CVEs. patches: SUSE-2021-1643,SUSE-SLE-Module-Basesystem-15-SP2-2021-1643,SUSE-SLE-Module-Basesystem-15-SP3-2021-1643,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1643,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1643,SUSE-SLE-Product-HPC-15-2021-1643,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1643,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1643,SUSE-SLE-Product-SLES-15-2021-1643,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1643,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1643,SUSE-SLE-Product-SLES_SAP-15-2021-1643,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1643,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1643,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1643,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1643,SUSE-SUSE-MicroOS-5.0-2021-1643,SUSE-Storage-6-2021-1643 SKIP SUSE-RU-2021:1644-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-1644 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1644,SUSE-2021-1644,SUSE-OpenStack-Cloud-8-2021-1644,SUSE-OpenStack-Cloud-Crowbar-8-2021-1644,SUSE-SLE-SAP-12-SP3-2021-1644,SUSE-SLE-SERVER-12-SP3-2021-1644,SUSE-SLE-SERVER-12-SP3-BCL-2021-1644 SKIP SUSE-RU-2021:1656-1 as SUSE-Storage-7-2021-1656 is not security or has no CVEs. patches: SUSE-2021-1656,SUSE-Storage-7-2021-1656 SKIP SUSE-RU-2021:1657-1 as SUSE-SLE-Product-HA-15-SP1-2021-1657 is not security or has no CVEs. patches: SUSE-2021-1657,SUSE-SLE-Product-HA-15-SP1-2021-1657 SKIP SUSE-RU-2021:1659-1 as SUSE-SLE-Product-HPC-15-SP2-2021-1659 is not security or has no CVEs. patches: SUSE-2021-1659,SUSE-SLE-Module-HPC-15-SP2-2021-1659,SUSE-SLE-Product-HPC-15-SP2-2021-1659 SKIP SUSE-RU-2021:1660-1 as SUSE-SUSE-MicroOS-5.0-2021-1660 is not security or has no CVEs. patches: SUSE-2021-1660,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1660,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1660,SUSE-SUSE-MicroOS-5.0-2021-1660 SKIP SUSE-RU-2021:1661-1 as SUSE-SLE-SERVER-12-SP5-2021-1661 is not security or has no CVEs. patches: SUSE-2021-1661,SUSE-SLE-SERVER-12-SP5-2021-1661 SKIP SUSE-RU-2021:1662-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1662 is not security or has no CVEs. patches: SUSE-2021-1662,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1662,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1662,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1662 SKIP SUSE-RU-2021:1663-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1663 is not security or has no CVEs. patches: SUSE-2021-1663,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1663,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1663,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1663 SKIP SUSE-RU-2021:1667-1 as SUSE-SLE-SERVER-12-SP5-2021-1667 is not security or has no CVEs. patches: SUSE-2021-1667,SUSE-SLE-SDK-12-SP5-2021-1667,SUSE-SLE-SERVER-12-SP5-2021-1667 SKIP SUSE-RU-2021:1668-1 as SUSE-SLE-Product-HA-15-SP2-2021-1668 is not security or has no CVEs. patches: SUSE-2021-1668,SUSE-SLE-Product-HA-15-SP2-2021-1668 SKIP SUSE-RU-2021:1669-1 as SUSE-SUSE-MicroOS-5.0-2021-1669 is not security or has no CVEs. patches: SUSE-2021-1669,SUSE-SLE-Module-Basesystem-15-SP2-2021-1669,SUSE-SLE-Module-Basesystem-15-SP3-2021-1669,SUSE-SUSE-MicroOS-5.0-2021-1669 SKIP SUSE-RU-2021:1672-1 as SUSE-Storage-6-2021-1672 is not security or has no CVEs. patches: SUSE-2021-1672,SUSE-SLE-Module-Basesystem-15-SP2-2021-1672,SUSE-SLE-Product-HPC-15-2021-1672,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1672,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1672,SUSE-SLE-Product-SLES-15-2021-1672,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1672,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1672,SUSE-SLE-Product-SLES_SAP-15-2021-1672,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1672,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1672,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1672,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1672,SUSE-SUSE-MicroOS-5.0-2021-1672,SUSE-Storage-6-2021-1672 SKIP SUSE-RU-2021:1673-1 as SUSE-SLE-SERVER-12-SP5-2021-1673 is not security or has no CVEs. patches: SUSE-2021-1673,SUSE-SLE-SERVER-12-SP5-2021-1673 SKIP SUSE-RU-2021:1674-1 as SUSE-SLE-Manager-Tools-15-2021-1674 is not security or has no CVEs. patches: SUSE-2021-1674,SUSE-SLE-Manager-Tools-15-2021-1674 SKIP SUSE-RU-2021:1675-1 as SUSE-SUSE-MicroOS-5.0-2021-1675 is not security or has no CVEs. patches: SUSE-2021-1675,SUSE-SLE-Module-Basesystem-15-SP2-2021-1675,SUSE-SLE-Module-Basesystem-15-SP3-2021-1675,SUSE-SUSE-MicroOS-5.0-2021-1675 SKIP SUSE-RU-2021:1676-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1676 is not security or has no CVEs. patches: SUSE-2021-1676,SUSE-SLE-Module-SAP-Applications-15-2021-1676,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1676 SKIP SUSE-RU-2021:1677-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1677 is not security or has no CVEs. patches: SUSE-2021-1677,SUSE-SLE-Module-Basesystem-15-SP2-2021-1677,SUSE-SLE-Module-Basesystem-15-SP3-2021-1677 SKIP SUSE-RU-2021:1678-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1678 is not security or has no CVEs. patches: SUSE-2021-1678,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1678,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1678 SKIP SUSE-RU-2021:1679-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1679 is not security or has no CVEs. patches: SUSE-2021-1679,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1679,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1679 SKIP SUSE-RU-2021:1680-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1680 is not security or has no CVEs. patches: SUSE-2021-1680,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1680,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1680 SKIP SUSE-RU-2021:1681-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1681 is not security or has no CVEs. patches: SUSE-2021-1681,SUSE-SLE-Module-SAP-Applications-15-2021-1681,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1681,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1681,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1681 SKIP SUSE-RU-2021:1682-1 as SUSE-SLE-Product-HA-15-SP1-2021-1682 is not security or has no CVEs. patches: SUSE-2021-1682,SUSE-SLE-Product-HA-15-SP1-2021-1682 SKIP SUSE-RU-2021:1683-1 as SUSE-SLE-SERVER-12-SP5-2021-1683 is not security or has no CVEs. patches: SUSE-2021-1683,SUSE-SLE-SDK-12-SP5-2021-1683,SUSE-SLE-SERVER-12-SP5-2021-1683 SKIP SUSE-RU-2021:1687-1 as SUSE-2021-1687 is not security or has no CVEs. patches: SUSE-2021-1687,SUSE-SLE-Manager-Tools-12-2021-1687 SKIP SUSE-RU-2021:1689-1 as SUSE-2021-1689 is not security or has no CVEs. patches: SUSE-2021-1689,SUSE-SLE-Manager-Tools-15-2021-1689 SKIP SUSE-RU-2021:1696-1 as SUSE-SUSE-MicroOS-5.0-2021-1696 is not security or has no CVEs. patches: SUSE-2021-1696,SUSE-SLE-Module-Basesystem-15-SP2-2021-1696,SUSE-SUSE-MicroOS-5.0-2021-1696 SKIP SUSE-RU-2021:1697-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1697 is not security or has no CVEs. patches: SUSE-2021-1697,SUSE-SLE-Module-Basesystem-15-SP2-2021-1697 SKIP SUSE-RU-2021:1698-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1698 is not security or has no CVEs. patches: SUSE-2021-1698,SUSE-SLE-Module-SAP-Applications-15-2021-1698,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-1698,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-1698,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-1698 SKIP SUSE-RU-2021:1699-1 as SUSE-SLE-SERVER-12-SP5-2021-1699 is not security or has no CVEs. patches: SUSE-2021-1699,SUSE-SLE-SERVER-12-SP5-2021-1699 SKIP SUSE-RU-2021:1700-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1700 is not security or has no CVEs. patches: SUSE-2021-1700,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1700,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1700,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1700 SKIP SUSE-RU-2021:1701-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1701 is not security or has no CVEs. patches: SUSE-2021-1701,SUSE-SLE-Module-Public-Cloud-12-2021-1701 SKIP SUSE-RU-2021:1702-1 as SUSE-SUSE-MicroOS-5.0-2021-1702 is not security or has no CVEs. patches: SUSE-2021-1702,SUSE-SLE-Module-Basesystem-15-SP2-2021-1702,SUSE-SUSE-MicroOS-5.0-2021-1702 SKIP SUSE-RU-2021:1752-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1752 is not security or has no CVEs. patches: SUSE-2021-1752,SUSE-SLE-Module-Basesystem-15-SP2-2021-1752,SUSE-SLE-Module-Basesystem-15-SP3-2021-1752 SKIP SUSE-RU-2021:1753-1 as SUSE-SLE-Module-RT-15-SP3-2021-1753 is not security or has no CVEs. patches: SUSE-2021-1753,SUSE-SLE-Module-RT-15-SP2-2021-1753,SUSE-SLE-Module-RT-15-SP3-2021-1753 SKIP SUSE-RU-2021:1754-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-1754 is not security or has no CVEs. patches: SUSE-2021-1754,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1754,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1754 SKIP SUSE-RU-2021:1756-1 as SUSE-SUSE-MicroOS-5.0-2021-1756 is not security or has no CVEs. patches: SUSE-2021-1756,SUSE-SLE-Module-Basesystem-15-SP2-2021-1756,SUSE-SUSE-MicroOS-5.0-2021-1756 SKIP SUSE-RU-2021:1757-1 as SUSE-SLE-Product-SLES_SAP-15-2021-1757 is not security or has no CVEs. patches: SUSE-2021-1757,SUSE-SLE-INSTALLER-15-2021-1757,SUSE-SLE-Product-HPC-15-2021-1757,SUSE-SLE-Product-SLES-15-2021-1757,SUSE-SLE-Product-SLES_SAP-15-2021-1757 SKIP SUSE-RU-2021:1770-1 as SUSE-SLE-Product-HA-15-SP1-2021-1770 is not security or has no CVEs. patches: SUSE-2021-1770,SUSE-SLE-Product-HA-15-SP1-2021-1770 SKIP SUSE-RU-2021:1772-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1772 is not security or has no CVEs. patches: SUSE-2021-1772,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1772,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1772 SKIP SUSE-RU-2021:1773-1 as SUSE-SUSE-MicroOS-5.0-2021-1773 is not security or has no CVEs. patches: SUSE-2021-1773,SUSE-SLE-Module-Basesystem-15-SP2-2021-1773,SUSE-SLE-Module-Basesystem-15-SP3-2021-1773,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1773,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1773,SUSE-SUSE-MicroOS-5.0-2021-1773 SKIP SUSE-RU-2021:1774-1 as SUSE-SLE-SERVER-12-SP5-2021-1774 is not security or has no CVEs. patches: SUSE-2021-1774,SUSE-OpenStack-Cloud-9-2021-1774,SUSE-OpenStack-Cloud-Crowbar-9-2021-1774,SUSE-SLE-SAP-12-SP4-2021-1774,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1774,SUSE-SLE-SERVER-12-SP5-2021-1774 SKIP SUSE-RU-2021:1775-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1775 is not security or has no CVEs. patches: SUSE-2021-1775,SUSE-SLE-INSTALLER-15-SP2-2021-1775,SUSE-SLE-Module-Basesystem-15-SP2-2021-1775 SKIP SUSE-RU-2021:1794-1 as SUSE-SUSE-MicroOS-5.0-2021-1794 is not security or has no CVEs. patches: SUSE-2021-1794,SUSE-SLE-Module-Basesystem-15-SP2-2021-1794,SUSE-SLE-Module-Basesystem-15-SP3-2021-1794,SUSE-SUSE-MicroOS-5.0-2021-1794 SKIP SUSE-RU-2021:1795-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1795 is not security or has no CVEs. patches: SUSE-2021-1795,SUSE-SLE-Module-Basesystem-15-SP2-2021-1795,SUSE-SLE-Module-Basesystem-15-SP3-2021-1795 SKIP SUSE-RU-2021:1796-1 as SUSE-SLE-SERVER-12-SP5-2021-1796 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-1796,SUSE-2021-1796,SUSE-OpenStack-Cloud-8-2021-1796,SUSE-OpenStack-Cloud-9-2021-1796,SUSE-OpenStack-Cloud-Crowbar-8-2021-1796,SUSE-OpenStack-Cloud-Crowbar-9-2021-1796,SUSE-SLE-Module-Toolchain-12-2021-1796,SUSE-SLE-SAP-12-SP3-2021-1796,SUSE-SLE-SAP-12-SP4-2021-1796,SUSE-SLE-SERVER-12-SP2-BCL-2021-1796,SUSE-SLE-SERVER-12-SP3-2021-1796,SUSE-SLE-SERVER-12-SP3-BCL-2021-1796,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1796,SUSE-SLE-SERVER-12-SP5-2021-1796 SKIP SUSE-RU-2021:1797-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1797 is not security or has no CVEs. patches: SUSE-2021-1797,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1797,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1797 SKIP SUSE-RU-2021:1798-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1798 is not security or has no CVEs. patches: SUSE-2021-1798,SUSE-SLE-Module-Basesystem-15-SP2-2021-1798,SUSE-SLE-Module-Basesystem-15-SP3-2021-1798,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1798,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1798 SKIP SUSE-RU-2021:1799-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1799 is not security or has no CVEs. patches: SUSE-2021-1799,SUSE-SLE-Module-Basesystem-15-SP3-2021-1799,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1799 SKIP SUSE-RU-2021:1800-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1800 is not security or has no CVEs. patches: SUSE-2021-1800,SUSE-SLE-Module-Basesystem-15-SP3-2021-1800 SKIP SUSE-RU-2021:1801-1 as SUSE-SUSE-MicroOS-5.0-2021-1801 is not security or has no CVEs. patches: SUSE-2021-1801,SUSE-SLE-Module-Basesystem-15-SP2-2021-1801,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1801,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1801,SUSE-SUSE-MicroOS-5.0-2021-1801 SKIP SUSE-RU-2021:1803-1 as SUSE-SLE-HA-12-SP4-2021-1803 is not security or has no CVEs. patches: SUSE-2021-1803,SUSE-SLE-HA-12-SP4-2021-1803 SKIP SUSE-RU-2021:1804-1 as SUSE-SLE-Module-Public-Cloud-12-2021-1804 is not security or has no CVEs. patches: SUSE-2021-1804,SUSE-SLE-Module-Containers-12-2021-1804,SUSE-SLE-Module-Public-Cloud-12-2021-1804 SKIP SUSE-RU-2021:1805-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1805 is not security or has no CVEs. patches: SUSE-2021-1805,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-1805,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1805,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1805 SKIP SUSE-RU-2021:1805-2 as SUSE-SLE-Module-Public-Cloud-15-2021-1805 is not security or has no CVEs. patches: SUSE-2021-1805,SUSE-SLE-Module-Public-Cloud-15-2021-1805 SKIP SUSE-RU-2021:1817-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1817 is not security or has no CVEs. patches: SUSE-2021-1817,SUSE-SLE-Module-Basesystem-15-SP3-2021-1817 SKIP SUSE-RU-2021:1818-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1818 is not security or has no CVEs. patches: SUSE-2021-1818,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1818 SKIP SUSE-RU-2021:1827-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1827 is not security or has no CVEs. patches: SUSE-2021-1827,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1827,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1827 SKIP SUSE-RU-2021:1833-1 as SUSE-SUSE-MicroOS-5.0-2021-1833 is not security or has no CVEs. patches: SUSE-2021-1833,SUSE-SLE-INSTALLER-15-SP2-2021-1833,SUSE-SLE-Module-Basesystem-15-SP2-2021-1833,SUSE-SLE-Module-Basesystem-15-SP3-2021-1833,SUSE-SUSE-MicroOS-5.0-2021-1833 SKIP SUSE-RU-2021:1836-1 as SUSE-SUSE-MicroOS-5.0-2021-1836 is not security or has no CVEs. patches: SUSE-2021-1836,SUSE-SLE-Module-Basesystem-15-SP2-2021-1836,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1836,SUSE-SUSE-MicroOS-5.0-2021-1836 SKIP SUSE-RU-2021:1846-1 as SUSE-SUSE-MicroOS-5.0-2021-1846 is not security or has no CVEs. patches: SUSE-2021-1846,SUSE-SLE-Module-Basesystem-15-SP2-2021-1846,SUSE-SLE-Module-Basesystem-15-SP3-2021-1846,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1846,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1846,SUSE-SUSE-MicroOS-5.0-2021-1846 SKIP SUSE-RU-2021:1848-1 as SUSE-SLE-Product-WE-15-SP3-2021-1848 is not security or has no CVEs. patches: SUSE-2021-1848,SUSE-SLE-Product-WE-15-SP2-2021-1848,SUSE-SLE-Product-WE-15-SP3-2021-1848 SKIP SUSE-RU-2021:1849-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1849 is not security or has no CVEs. patches: SUSE-2021-1849,SUSE-SLE-Module-Basesystem-15-SP2-2021-1849,SUSE-SLE-Module-Basesystem-15-SP3-2021-1849,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1849,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1849 SKIP SUSE-RU-2021:1850-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1850 is not security or has no CVEs. patches: SUSE-2021-1850,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1850,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1850 SKIP SUSE-RU-2021:1851-1 as SUSE-Storage-6-2021-1851 is not security or has no CVEs. patches: SUSE-2021-1851,SUSE-Storage-6-2021-1851 SKIP SUSE-RU-2021:1852-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1852 is not security or has no CVEs. patches: SUSE-2021-1852,SUSE-SLE-Module-Basesystem-15-SP3-2021-1852,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1852 SKIP SUSE-RU-2021:1853-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1853 is not security or has no CVEs. patches: SUSE-2021-1853,SUSE-SLE-Module-Basesystem-15-SP3-2021-1853 SKIP SUSE-RU-2021:1861-1 as SUSE-Storage-6-2021-1861 is not security or has no CVEs. patches: SUSE-2021-1861,SUSE-SLE-Module-Basesystem-15-SP2-2021-1861,SUSE-SLE-Module-Basesystem-15-SP3-2021-1861,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1861,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1861,SUSE-SLE-Product-HPC-15-2021-1861,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1861,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1861,SUSE-SLE-Product-SLES-15-2021-1861,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1861,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1861,SUSE-SLE-Product-SLES_SAP-15-2021-1861,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1861,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1861,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1861,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1861,SUSE-SUSE-MicroOS-5.0-2021-1861,SUSE-Storage-6-2021-1861 SKIP SUSE-RU-2021:18619-1 as SUSE-SUSE-MicroOS-5.0-2021-18619 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-SP2-2021-18619,SUSE-SLE-Module-Development-Tools-15-SP2-2021-18619,SUSE-SLE-Module-Legacy-15-SP2-2021-18619,SUSE-SLE-Module-Live-Patching-15-SP2-2021-18619,SUSE-SLE-Product-HA-15-SP2-2021-18619,SUSE-SLE-Product-WE-15-SP2-2021-18619,SUSE-SUSE-MicroOS-5.0-2021-18619 SKIP SUSE-RU-2021:1862-1 as SUSE-SLE-Product-HA-15-SP3-2021-1862 is not security or has no CVEs. patches: SUSE-2021-1862,SUSE-SLE-Product-HA-15-SP3-2021-1862 SKIP SUSE-RU-2021:1872-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1872 is not security or has no CVEs. patches: SUSE-2021-1872,SUSE-SLE-INSTALLER-15-SP3-2021-1872,SUSE-SLE-Module-Basesystem-15-SP3-2021-1872 SKIP SUSE-RU-2021:1877-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1877 is not security or has no CVEs. patches: SUSE-2021-1877,SUSE-SLE-Module-Basesystem-15-SP2-2021-1877,SUSE-SLE-Module-Basesystem-15-SP3-2021-1877 SKIP SUSE-RU-2021:1879-1 as SUSE-SUSE-MicroOS-5.0-2021-1879 is not security or has no CVEs. patches: SUSE-2021-1879,SUSE-SLE-INSTALLER-15-SP2-2021-1879,SUSE-SLE-Module-Basesystem-15-SP2-2021-1879,SUSE-SLE-Module-Basesystem-15-SP3-2021-1879,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1879,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1879,SUSE-SUSE-MicroOS-5.0-2021-1879 SKIP SUSE-RU-2021:1882-1 as SUSE-Storage-6-2021-1882 is not security or has no CVEs. patches: SUSE-2021-1882,SUSE-SLE-Module-Basesystem-15-SP2-2021-1882,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1882,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1882,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1882,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1882,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1882,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1882,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1882,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1882,SUSE-SUSE-MicroOS-5.0-2021-1882,SUSE-Storage-6-2021-1882 SKIP SUSE-RU-2021:1883-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1883 is not security or has no CVEs. patches: SUSE-2021-1883,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1883,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1883 SKIP SUSE-RU-2021:1898-1 as SUSE-SUSE-MicroOS-5.0-2021-1898 is not security or has no CVEs. patches: SUSE-2021-1898,SUSE-SLE-Module-Basesystem-15-SP2-2021-1898,SUSE-SUSE-MicroOS-5.0-2021-1898 SKIP SUSE-RU-2021:1907-1 as SUSE-SUSE-MicroOS-5.0-2021-1907 is not security or has no CVEs. patches: SUSE-2021-1907,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1907,SUSE-SUSE-MicroOS-5.0-2021-1907 SKIP SUSE-RU-2021:1908-1 as SUSE-SLE-HA-12-SP3-2021-1908 is not security or has no CVEs. patches: SUSE-2021-1908,SUSE-SLE-HA-12-SP3-2021-1908 SKIP SUSE-RU-2021:1909-1 as SUSE-SLE-HA-12-SP5-2021-1909 is not security or has no CVEs. patches: SUSE-2021-1909,SUSE-SLE-HA-12-SP4-2021-1909,SUSE-SLE-HA-12-SP5-2021-1909 SKIP SUSE-RU-2021:1910-1 as SUSE-SUSE-MicroOS-5.0-2021-1910 is not security or has no CVEs. patches: SUSE-2021-1910,SUSE-SLE-Module-Basesystem-15-SP2-2021-1910,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1910,SUSE-SLE-Module-Server-Applications-15-SP2-2021-1910,SUSE-SUSE-MicroOS-5.0-2021-1910 SKIP SUSE-RU-2021:1920-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1920 is not security or has no CVEs. patches: SUSE-2021-1920,SUSE-SLE-Module-Basesystem-15-SP3-2021-1920 SKIP SUSE-RU-2021:1922-1 as SUSE-SLE-SERVER-12-SP5-2021-1922 is not security or has no CVEs. patches: SUSE-2021-1922,SUSE-SLE-SDK-12-SP5-2021-1922,SUSE-SLE-SERVER-12-SP5-2021-1922 SKIP SUSE-RU-2021:1923-1 as SUSE-Storage-6-2021-1923 is not security or has no CVEs. patches: SUSE-2021-1923,SUSE-SLE-Module-Basesystem-15-SP2-2021-1923,SUSE-SLE-Module-Basesystem-15-SP3-2021-1923,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1923,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1923,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1923,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1923,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1923,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1923,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1923,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1923,SUSE-SUSE-MicroOS-5.0-2021-1923,SUSE-Storage-6-2021-1923 SKIP SUSE-RU-2021:1924-1 as SUSE-SLE-SAP-12-SP5-2021-1924 is not security or has no CVEs. patches: SUSE-2021-1924,SUSE-SLE-SAP-12-SP3-2021-1924,SUSE-SLE-SAP-12-SP4-2021-1924,SUSE-SLE-SAP-12-SP5-2021-1924 SKIP SUSE-RU-2021:1925-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1925 is not security or has no CVEs. patches: SUSE-2021-1925,SUSE-SLE-Module-Basesystem-15-SP3-2021-1925 SKIP SUSE-RU-2021:1926-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-1926 is not security or has no CVEs. patches: SUSE-2021-1926,SUSE-SLE-Module-Basesystem-15-SP2-2021-1926,SUSE-SLE-Module-Basesystem-15-SP3-2021-1926,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1926,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1926 SKIP SUSE-RU-2021:1934-1 as SUSE-SLE-Product-WE-15-SP3-2021-1934 is not security or has no CVEs. patches: SUSE-2021-1934,SUSE-SLE-Module-Basesystem-15-SP2-2021-1934,SUSE-SLE-Module-Basesystem-15-SP3-2021-1934,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1934,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1934,SUSE-SLE-Product-WE-15-SP2-2021-1934,SUSE-SLE-Product-WE-15-SP3-2021-1934 SKIP SUSE-RU-2021:1935-1 as SUSE-SUSE-MicroOS-5.0-2021-1935 is not security or has no CVEs. patches: SUSE-2021-1935,SUSE-SLE-Module-Basesystem-15-SP2-2021-1935,SUSE-SLE-Module-Basesystem-15-SP3-2021-1935,SUSE-SUSE-MicroOS-5.0-2021-1935 SKIP SUSE-RU-2021:1936-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1936 is not security or has no CVEs. patches: SUSE-2021-1936,SUSE-SLE-Module-Basesystem-15-SP3-2021-1936 SKIP SUSE-RU-2021:1937-1 as SUSE-SUSE-MicroOS-5.0-2021-1937 is not security or has no CVEs. patches: SUSE-2021-1937,SUSE-SLE-Module-Basesystem-15-SP2-2021-1937,SUSE-SLE-Module-Basesystem-15-SP3-2021-1937,SUSE-SUSE-MicroOS-5.0-2021-1937 SKIP SUSE-RU-2021:1941-1 as SUSE-SUSE-MicroOS-5.0-2021-1941 is not security or has no CVEs. patches: SUSE-2021-1941,SUSE-SLE-Module-Basesystem-15-SP2-2021-1941,SUSE-SLE-Module-Basesystem-15-SP3-2021-1941,SUSE-SUSE-MicroOS-5.0-2021-1941 SKIP SUSE-RU-2021:1946-1 as SUSE-SUSE-MicroOS-5.0-2021-1946 is not security or has no CVEs. patches: SUSE-2021-1946,SUSE-SLE-Module-Basesystem-15-SP2-2021-1946,SUSE-SLE-Module-Basesystem-15-SP3-2021-1946,SUSE-SUSE-MicroOS-5.0-2021-1946 SKIP SUSE-RU-2021:1949-1 as SUSE-SLE-Product-WE-15-SP2-2021-1949 is not security or has no CVEs. patches: SUSE-2021-1949,SUSE-SLE-Product-WE-15-SP2-2021-1949 SKIP SUSE-RU-2021:1950-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1950 is not security or has no CVEs. patches: SUSE-2021-1950,SUSE-SLE-Manager-Tools-15-2021-1950,SUSE-SLE-Module-Basesystem-15-SP2-2021-1950,SUSE-SLE-Module-Basesystem-15-SP3-2021-1950,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-1950,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-1950,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-1950,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-1950 SKIP SUSE-RU-2021:1953-1 as SUSE-SUSE-MicroOS-5.0-2021-1953 is not security or has no CVEs. patches: SUSE-2021-1953,SUSE-SLE-Module-Basesystem-15-SP2-2021-1953,SUSE-SUSE-MicroOS-5.0-2021-1953 SKIP SUSE-RU-2021:1955-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1955 is not security or has no CVEs. patches: SUSE-2021-1955,SUSE-SLE-Module-Basesystem-15-SP2-2021-1955,SUSE-SLE-Module-Basesystem-15-SP3-2021-1955,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1955,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1955 SKIP SUSE-RU-2021:1964-1 as SUSE-SLE-SERVER-12-SP5-2021-1964 is not security or has no CVEs. patches: SUSE-2021-1964,SUSE-SLE-SERVER-12-SP5-2021-1964 ERROR: notice SUSE-RU-2021:1965-1 has no valid patches out of: SUSE-2021-1965,SUSE-SLE-Module-Basesystem-15-SP3-2021-1965 SKIP SUSE-RU-2021:1966-1 as SUSE-SLE-SAP-12-SP5-2021-1966 is not security or has no CVEs. patches: SUSE-2021-1966,SUSE-SLE-SAP-12-SP3-2021-1966,SUSE-SLE-SAP-12-SP4-2021-1966,SUSE-SLE-SAP-12-SP5-2021-1966 SKIP SUSE-RU-2021:1973-1 as SUSE-SUSE-MicroOS-5.0-2021-1973 is not security or has no CVEs. patches: SUSE-2021-1973,SUSE-SLE-Module-Basesystem-15-SP2-2021-1973,SUSE-SLE-Module-Basesystem-15-SP3-2021-1973,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-1973,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-1973,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1973,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1973,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1973,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1973,SUSE-SLE-Product-WE-15-SP2-2021-1973,SUSE-SLE-Product-WE-15-SP3-2021-1973,SUSE-SUSE-MicroOS-5.0-2021-1973 SKIP SUSE-RU-2021:1974-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1974 is not security or has no CVEs. patches: SUSE-2021-1974,SUSE-SLE-Module-Basesystem-15-SP3-2021-1974 SKIP SUSE-RU-2021:1982-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1982 is not security or has no CVEs. patches: SUSE-2021-1982,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1982,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1982 SKIP SUSE-RU-2021:1983-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-1983 is not security or has no CVEs. patches: SUSE-2021-1983,SUSE-SLE-Module-Server-Applications-15-SP3-2021-1983 SKIP SUSE-RU-2021:1984-1 as SUSE-SLE-Product-HA-15-SP3-2021-1984 is not security or has no CVEs. patches: SUSE-2021-1984,SUSE-SLE-Product-HA-15-SP3-2021-1984 SKIP SUSE-RU-2021:1985-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-1985 is not security or has no CVEs. patches: SUSE-2021-1985,SUSE-SLE-INSTALLER-15-SP2-2021-1985,SUSE-SLE-Module-Basesystem-15-SP2-2021-1985 SKIP SUSE-RU-2021:1986-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1986 is not security or has no CVEs. patches: SUSE-2021-1986,SUSE-SLE-Module-Basesystem-15-SP3-2021-1986 SKIP SUSE-RU-2021:1987-1 as SUSE-Storage-6-2021-1987 is not security or has no CVEs. patches: SUSE-2021-1987,SUSE-SLE-Product-HA-15-SP1-2021-1987,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1987,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1987,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1987,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1987,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1987,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1987,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1987,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1987,SUSE-Storage-6-2021-1987 SKIP SUSE-RU-2021:1992-1 as SUSE-Storage-6-2021-1992 is not security or has no CVEs. patches: SUSE-2021-1992,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1992,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1992,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1992,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1992,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1992,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1992,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1992,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1992,SUSE-Storage-6-2021-1992 SKIP SUSE-RU-2021:1997-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-1997 is not security or has no CVEs. patches: SUSE-2021-1997,SUSE-SLE-Module-Basesystem-15-SP3-2021-1997 SKIP SUSE-RU-2021:2000-1 as SUSE-SLE-Module-Web-Scripting-15-SP3-2021-2000 is not security or has no CVEs. patches: SUSE-2021-2000,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-2000,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-2000 SKIP SUSE-RU-2021:2001-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2001 is not security or has no CVEs. patches: SUSE-2021-2001,SUSE-SLE-Module-Basesystem-15-SP2-2021-2001,SUSE-SLE-Module-Basesystem-15-SP3-2021-2001,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2001 SKIP SUSE-RU-2021:2002-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2002 is not security or has no CVEs. patches: SUSE-2021-2002,SUSE-SLE-Module-Basesystem-15-SP3-2021-2002,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2002 SKIP SUSE-RU-2021:2009-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2009 is not security or has no CVEs. patches: SUSE-2021-2009,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2009 SKIP SUSE-RU-2021:2076-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2076 is not security or has no CVEs. patches: SUSE-2021-2076,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2076,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2076 SKIP SUSE-RU-2021:2078-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2078 is not security or has no CVEs. patches: SUSE-2021-2078,SUSE-SLE-INSTALLER-15-SP2-2021-2078,SUSE-SLE-Module-Basesystem-15-SP2-2021-2078 SKIP SUSE-RU-2021:2079-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2079 is not security or has no CVEs. patches: SUSE-2021-2079,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2079,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2079 SKIP SUSE-RU-2021:2081-1 as SUSE-SLE-Product-HA-15-SP2-2021-2081 is not security or has no CVEs. patches: SUSE-2021-2081,SUSE-SLE-Product-HA-15-2021-2081,SUSE-SLE-Product-HA-15-SP1-2021-2081,SUSE-SLE-Product-HA-15-SP2-2021-2081 SKIP SUSE-RU-2021:2086-1 as SUSE-SLE-SERVER-12-SP5-2021-2086 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2086,SUSE-2021-2086,SUSE-OpenStack-Cloud-8-2021-2086,SUSE-OpenStack-Cloud-9-2021-2086,SUSE-OpenStack-Cloud-Crowbar-8-2021-2086,SUSE-OpenStack-Cloud-Crowbar-9-2021-2086,SUSE-SLE-SAP-12-SP3-2021-2086,SUSE-SLE-SAP-12-SP4-2021-2086,SUSE-SLE-SDK-12-SP5-2021-2086,SUSE-SLE-SERVER-12-SP2-BCL-2021-2086,SUSE-SLE-SERVER-12-SP3-2021-2086,SUSE-SLE-SERVER-12-SP3-BCL-2021-2086,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2086,SUSE-SLE-SERVER-12-SP5-2021-2086 SKIP SUSE-RU-2021:2087-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2087 is not security or has no CVEs. patches: SUSE-2021-2087,SUSE-SLE-Module-Basesystem-15-SP2-2021-2087,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2087,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2087 SKIP SUSE-RU-2021:2088-1 as SUSE-SLE-Product-SLED-15-SP3-2021-2088 is not security or has no CVEs. patches: SUSE-2021-2088,SUSE-SLE-Product-SLED-15-SP3-2021-2088 SKIP SUSE-RU-2021:2089-1 as SUSE-SLE-Product-WE-15-SP3-2021-2089 is not security or has no CVEs. patches: SUSE-2021-2089,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2089,SUSE-SLE-Product-WE-15-SP3-2021-2089 SKIP SUSE-RU-2021:2091-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2091 is not security or has no CVEs. patches: SUSE-2021-2091,SUSE-SLE-Module-Basesystem-15-SP2-2021-2091,SUSE-SLE-Module-Basesystem-15-SP3-2021-2091 SKIP SUSE-RU-2021:2093-1 as SUSE-Storage-7-2021-2093 is not security or has no CVEs. patches: SUSE-2021-2093,SUSE-SLE-Module-Basesystem-15-SP2-2021-2093,SUSE-SLE-Module-Basesystem-15-SP3-2021-2093,SUSE-SUSE-MicroOS-5.0-2021-2093,SUSE-Storage-7-2021-2093 SKIP SUSE-RU-2021:2094-1 as SUSE-SLE-SERVER-12-SP5-2021-2094 is not security or has no CVEs. patches: SUSE-2021-2094,SUSE-SLE-SERVER-12-SP5-2021-2094 SKIP SUSE-RU-2021:2095-1 as SUSE-SLE-Module-Legacy-15-SP3-2021-2095 is not security or has no CVEs. patches: SUSE-2021-2095,SUSE-SLE-Module-Legacy-15-SP2-2021-2095,SUSE-SLE-Module-Legacy-15-SP3-2021-2095 SKIP SUSE-RU-2021:2096-1 as SUSE-SUSE-MicroOS-5.0-2021-2096 is not security or has no CVEs. patches: SUSE-2021-2096,SUSE-SLE-Module-Basesystem-15-SP2-2021-2096,SUSE-SLE-Module-Basesystem-15-SP3-2021-2096,SUSE-SLE-Module-Python2-15-SP2-2021-2096,SUSE-SLE-Module-Python2-15-SP3-2021-2096,SUSE-SUSE-MicroOS-5.0-2021-2096 SKIP SUSE-RU-2021:2097-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-2097 is not security or has no CVEs. patches: SUSE-2021-2097,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2021-2097,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2021-2097,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-2097 SKIP SUSE-RU-2021:2098-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2098 is not security or has no CVEs. patches: SUSE-2021-2098,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2098 SKIP SUSE-RU-2021:2099-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-2099 is not security or has no CVEs. patches: SUSE-2021-2099,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-2099,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-2099,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-2099 SKIP SUSE-RU-2021:2101-1 as SUSE-SLE-SERVER-12-SP5-2021-2101 is not security or has no CVEs. patches: SUSE-2021-2101,SUSE-SLE-Manager-Tools-12-2021-2101,SUSE-SLE-SERVER-12-SP5-2021-2101 SKIP SUSE-RU-2021:2103-1 as SUSE-SLE-Product-SLES_SAP-15-2021-2103 is not security or has no CVEs. patches: SUSE-2021-2103,SUSE-SLE-Manager-Tools-15-2021-2103,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2103,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2103,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2103,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2103,SUSE-SLE-Product-HPC-15-2021-2103,SUSE-SLE-Product-SLES-15-2021-2103,SUSE-SLE-Product-SLES_SAP-15-2021-2103 SKIP SUSE-RU-2021:2107-1 as SUSE-Storage-6-2021-2107 is not security or has no CVEs. patches: SUSE-2021-2107,SUSE-SLE-Module-Basesystem-15-SP2-2021-2107,SUSE-SLE-Module-Basesystem-15-SP3-2021-2107,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-2107,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-2107,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2107,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2107,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2107,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2107,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2107,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2107,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2107,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2107,SUSE-Storage-6-2021-2107 SKIP SUSE-RU-2021:2114-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-2114 is not security or has no CVEs. patches: SUSE-2021-2114,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-2114 SKIP SUSE-RU-2021:2115-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2115 is not security or has no CVEs. patches: SUSE-2021-2115,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2115,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2115,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2115 SKIP SUSE-RU-2021:2116-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2116 is not security or has no CVEs. patches: SUSE-2021-2116,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2116 SKIP SUSE-RU-2021:2126-1 as SUSE-SLE-Product-SLES-15-SP3-2021-2126 is not security or has no CVEs. patches: SUSE-2021-2126,SUSE-SLE-INSTALLER-15-SP3-2021-2126,SUSE-SLE-Product-SLES-15-SP3-2021-2126 SKIP SUSE-RU-2021:2128-1 as SUSE-SLE-HA-12-SP3-2021-2128 is not security or has no CVEs. patches: SUSE-2021-2128,SUSE-SLE-HA-12-SP3-2021-2128 SKIP SUSE-RU-2021:2129-1 as SUSE-SLE-SDK-12-SP5-2021-2129 is not security or has no CVEs. patches: SUSE-2021-2129,SUSE-SLE-HA-12-SP5-2021-2129,SUSE-SLE-SDK-12-SP5-2021-2129 SKIP SUSE-RU-2021:2131-1 as SUSE-SLE-SERVER-12-SP5-2021-2131 is not security or has no CVEs. patches: SUSE-2021-2131,SUSE-SLE-SDK-12-SP5-2021-2131,SUSE-SLE-SERVER-12-SP5-2021-2131 SKIP SUSE-RU-2021:2134-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2134 is not security or has no CVEs. patches: SUSE-2021-2134,SUSE-SLE-Module-SAP-Applications-15-2021-2134,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2134 SKIP SUSE-RU-2021:2138-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2138 is not security or has no CVEs. patches: SUSE-2021-2138,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2138 SKIP SUSE-RU-2021:2139-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2139 is not security or has no CVEs. patches: SUSE-2021-2139,SUSE-SLE-Module-SAP-Applications-15-2021-2139,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2139 SKIP SUSE-RU-2021:2140-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2140 is not security or has no CVEs. patches: SUSE-2021-2140,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-2140,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2140 SKIP SUSE-RU-2021:2141-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2141 is not security or has no CVEs. patches: SUSE-2021-2141,SUSE-SLE-Module-Basesystem-15-SP3-2021-2141,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2141 SKIP SUSE-RU-2021:2142-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2142 is not security or has no CVEs. patches: SUSE-2021-2142,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2142 SKIP SUSE-RU-2021:2144-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2144 is not security or has no CVEs. patches: SUSE-2021-2144,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2144,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2144 SKIP SUSE-RU-2021:2146-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2146 is not security or has no CVEs. patches: SUSE-2021-2146,SUSE-SLE-Module-Basesystem-15-SP3-2021-2146,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2146,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2146 SKIP SUSE-RU-2021:2148-1 as SUSE-SLE-Product-HA-15-SP3-2021-2148 is not security or has no CVEs. patches: SUSE-2021-2148,SUSE-SLE-Product-HA-15-SP3-2021-2148 SKIP SUSE-RU-2021:2149-1 as SUSE-Storage-6-2021-2149 is not security or has no CVEs. patches: SUSE-2021-2149,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-2149,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2149,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2149,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2149,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2149,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2149,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2149,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2149,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2149,SUSE-Storage-6-2021-2149 SKIP SUSE-RU-2021:2150-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2150 is not security or has no CVEs. patches: SUSE-2021-2150,SUSE-SLE-Module-Basesystem-15-SP3-2021-2150 SKIP SUSE-RU-2021:2154-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2154 is not security or has no CVEs. patches: SUSE-2021-2154,SUSE-SLE-Module-Basesystem-15-SP3-2021-2154,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2154,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2154,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2154 SKIP SUSE-RU-2021:2160-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2160 is not security or has no CVEs. patches: SUSE-2021-2160,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2160,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2160 SKIP SUSE-RU-2021:2162-1 as SUSE-SLE-Product-WE-15-SP2-2021-2162 is not security or has no CVEs. patches: SUSE-2021-2162,SUSE-SLE-Product-WE-15-SP2-2021-2162 SKIP SUSE-RU-2021:2165-1 as openSUSE-SLE-15.3-2021-2165 is not security or has no CVEs. patches: SUSE-2021-2165,openSUSE-SLE-15.3-2021-2165 SKIP SUSE-RU-2021:2166-1 as SUSE-2021-2166 is not security or has no CVEs. patches: SUSE-2021-2166,openSUSE-SLE-15.3-2021-2166 SKIP SUSE-RU-2021:2167-1 as SUSE-Storage-6-2021-2167 is not security or has no CVEs. patches: SUSE-2021-2167,SUSE-Storage-6-2021-2167 SKIP SUSE-RU-2021:2168-1 as SUSE-Storage-7-2021-2168 is not security or has no CVEs. patches: SUSE-2021-2168,SUSE-Storage-7-2021-2168 SKIP SUSE-RU-2021:2169-1 as SUSE-SLE-Product-WE-15-SP3-2021-2169 is not security or has no CVEs. patches: SUSE-2021-2169,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2169,SUSE-SLE-Product-WE-15-SP2-2021-2169,SUSE-SLE-Product-WE-15-SP3-2021-2169 SKIP SUSE-RU-2021:2169-2 as openSUSE-SLE-15.3-2021-2169 is not security or has no CVEs. patches: SUSE-2021-2169,openSUSE-SLE-15.3-2021-2169 SKIP SUSE-RU-2021:2170-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-2170 is not security or has no CVEs. patches: SUSE-2021-2170,SUSE-SLE-INSTALLER-15-SP2-2021-2170,SUSE-SLE-Module-Basesystem-15-SP2-2021-2170,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2170 SKIP SUSE-RU-2021:2171-1 as SUSE-SUSE-MicroOS-5.0-2021-2171 is not security or has no CVEs. patches: SUSE-2021-2171,SUSE-SLE-Module-Basesystem-15-SP2-2021-2171,SUSE-SLE-Module-Basesystem-15-SP3-2021-2171,SUSE-SUSE-MicroOS-5.0-2021-2171 SKIP SUSE-RU-2021:2173-1 as SUSE-SUSE-MicroOS-5.0-2021-2173 is not security or has no CVEs. patches: SUSE-2021-2173,SUSE-SLE-Module-Basesystem-15-SP2-2021-2173,SUSE-SLE-Module-Basesystem-15-SP3-2021-2173,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2173,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2173,SUSE-SUSE-MicroOS-5.0-2021-2173 SKIP SUSE-RU-2021:2178-1 as SUSE-SUSE-MicroOS-5.0-2021-2178 is not security or has no CVEs. patches: SUSE-2021-2178,SUSE-SLE-Module-Basesystem-15-SP2-2021-2178,SUSE-SLE-Module-Basesystem-15-SP3-2021-2178,SUSE-SUSE-MicroOS-5.0-2021-2178 SKIP SUSE-RU-2021:2179-1 as SUSE-SUSE-MicroOS-5.0-2021-2179 is not security or has no CVEs. patches: SUSE-2021-2179,SUSE-SLE-Module-Basesystem-15-SP2-2021-2179,SUSE-SLE-Module-Basesystem-15-SP3-2021-2179,SUSE-SUSE-MicroOS-5.0-2021-2179 SKIP SUSE-RU-2021:2181-1 as SUSE-SLE-SERVER-12-SP5-2021-2181 is not security or has no CVEs. patches: SUSE-2021-2181,SUSE-SLE-SERVER-12-SP5-2021-2181 SKIP SUSE-RU-2021:2182-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2182 is not security or has no CVEs. patches: SUSE-2021-2182,SUSE-SLE-Module-Basesystem-15-SP2-2021-2182,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2182 SKIP SUSE-RU-2021:2183-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2183 is not security or has no CVEs. patches: SUSE-2021-2183,SUSE-SLE-Module-Basesystem-15-SP2-2021-2183 SKIP SUSE-RU-2021:2185-1 as SUSE-SLE-SERVER-12-SP5-2021-2185 is not security or has no CVEs. patches: SUSE-2021-2185,SUSE-OpenStack-Cloud-9-2021-2185,SUSE-OpenStack-Cloud-Crowbar-9-2021-2185,SUSE-SLE-SAP-12-SP4-2021-2185,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2185,SUSE-SLE-SERVER-12-SP5-2021-2185 SKIP SUSE-RU-2021:2187-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2187 is not security or has no CVEs. patches: SUSE-2021-2187,SUSE-SLE-Module-Basesystem-15-SP2-2021-2187 SKIP SUSE-RU-2021:2188-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2188 is not security or has no CVEs. patches: SUSE-2021-2188,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2188 SKIP SUSE-RU-2021:2189-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2189 is not security or has no CVEs. patches: SUSE-2021-2189,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2189 SKIP SUSE-RU-2021:2190-1 as SUSE-SUSE-MicroOS-5.0-2021-2190 is not security or has no CVEs. patches: SUSE-2021-2190,SUSE-SUSE-MicroOS-5.0-2021-2190 SKIP SUSE-RU-2021:2191-1 as SUSE-SUSE-MicroOS-5.0-2021-2191 is not security or has no CVEs. patches: SUSE-2021-2191,SUSE-SUSE-MicroOS-5.0-2021-2191 SKIP SUSE-RU-2021:2192-1 as SUSE-SUSE-MicroOS-5.0-2021-2192 is not security or has no CVEs. patches: SUSE-2021-2192,SUSE-SUSE-MicroOS-5.0-2021-2192 SKIP SUSE-RU-2021:2193-1 as SUSE-SUSE-MicroOS-5.0-2021-2193 is not security or has no CVEs. patches: SUSE-2021-2193,SUSE-SLE-Module-Basesystem-15-SP2-2021-2193,SUSE-SLE-Module-Basesystem-15-SP3-2021-2193,SUSE-SUSE-MicroOS-5.0-2021-2193 SKIP SUSE-RU-2021:2197-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2197 is not security or has no CVEs. patches: SUSE-2021-2197,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2197 SKIP SUSE-RU-2021:2199-1 as SUSE-SLE-Live-Patching-12-SP5-2021-2199 is not security or has no CVEs. patches: SUSE-2021-2199,SUSE-SLE-Live-Patching-12-2021-2199,SUSE-SLE-Live-Patching-12-SP3-2021-2199,SUSE-SLE-Live-Patching-12-SP4-2021-2199,SUSE-SLE-Live-Patching-12-SP5-2021-2199 SKIP SUSE-RU-2021:2200-1 as SUSE-Storage-6-2021-2200 is not security or has no CVEs. patches: SUSE-2021-2200,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2200,SUSE-SLE-Product-HPC-15-2021-2200,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2200,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2200,SUSE-SLE-Product-SLES-15-2021-2200,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2200,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2200,SUSE-SLE-Product-SLES_SAP-15-2021-2200,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2200,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2200,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2200,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2200,SUSE-Storage-6-2021-2200 SKIP SUSE-RU-2021:2201-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2201 is not security or has no CVEs. patches: SUSE-2021-2201,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2201 SKIP SUSE-RU-2021:2203-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2203 is not security or has no CVEs. patches: SUSE-2021-2203,SUSE-SLE-Module-Basesystem-15-SP3-2021-2203,SUSE-SLE-Module-Legacy-15-SP3-2021-2203,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2203 SKIP SUSE-RU-2021:2204-1 as SUSE-SLE-SAP-12-SP5-2021-2204 is not security or has no CVEs. patches: SUSE-2021-2204,SUSE-SLE-SAP-12-SP3-2021-2204,SUSE-SLE-SAP-12-SP4-2021-2204,SUSE-SLE-SAP-12-SP5-2021-2204 SKIP SUSE-RU-2021:2205-1 as SUSE-Storage-6-2021-2205 is not security or has no CVEs. patches: SUSE-2021-2205,SUSE-SLE-Module-Basesystem-15-SP2-2021-2205,SUSE-SLE-Module-Basesystem-15-SP3-2021-2205,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2205,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2205,SUSE-SLE-Module-Legacy-15-SP2-2021-2205,SUSE-SLE-Module-Legacy-15-SP3-2021-2205,SUSE-SLE-Product-HPC-15-2021-2205,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2205,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2205,SUSE-SLE-Product-SLES-15-2021-2205,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2205,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2205,SUSE-SLE-Product-SLES_SAP-15-2021-2205,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2205,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2205,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2205,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2205,SUSE-SUSE-MicroOS-5.0-2021-2205,SUSE-Storage-6-2021-2205 SKIP SUSE-RU-2021:2206-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2206 is not security or has no CVEs. patches: SUSE-2021-2206,SUSE-SLE-Module-Basesystem-15-SP2-2021-2206 SKIP SUSE-RU-2021:2207-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2207 is not security or has no CVEs. patches: SUSE-2021-2207,SUSE-SLE-Module-Basesystem-15-SP3-2021-2207 SKIP SUSE-RU-2021:2210-1 as SUSE-SUSE-MicroOS-5.0-2021-2210 is not security or has no CVEs. patches: SUSE-2021-2210,SUSE-SLE-Module-Basesystem-15-SP2-2021-2210,SUSE-SLE-Module-Basesystem-15-SP3-2021-2210,SUSE-SLE-Product-HA-15-SP2-2021-2210,SUSE-SLE-Product-HA-15-SP3-2021-2210,SUSE-SUSE-MicroOS-5.0-2021-2210 SKIP SUSE-RU-2021:2215-1 as SUSE-Storage-6-2021-2215 is not security or has no CVEs. patches: SUSE-2021-2215,SUSE-SLE-Module-Basesystem-15-SP2-2021-2215,SUSE-SLE-Module-Basesystem-15-SP3-2021-2215,SUSE-SLE-Product-HPC-15-2021-2215,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2215,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2215,SUSE-SLE-Product-SLES-15-2021-2215,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2215,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2215,SUSE-SLE-Product-SLES_SAP-15-2021-2215,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2215,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2215,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2215,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2215,SUSE-Storage-6-2021-2215 SKIP SUSE-RU-2021:2217-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2217 is not security or has no CVEs. patches: SUSE-2021-2217,SUSE-SLE-Module-SAP-Applications-15-2021-2217,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2217,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-2217,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2217 SKIP SUSE-RU-2021:2218-1 as SUSE-SLE-SAP-12-SP5-2021-2218 is not security or has no CVEs. patches: SUSE-2021-2218,SUSE-SLE-SAP-12-SP3-2021-2218,SUSE-SLE-SAP-12-SP4-2021-2218,SUSE-SLE-SAP-12-SP5-2021-2218 SKIP SUSE-RU-2021:2219-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2021-2219 is not security or has no CVEs. patches: SUSE-2021-2219,SUSE-SLE-Module-Live-Patching-15-2021-2219,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2219,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2219,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2219 SKIP SUSE-RU-2021:2220-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2220 is not security or has no CVEs. patches: SUSE-2021-2220,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2220,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2220 SKIP SUSE-RU-2021:2221-1 as SUSE-SLE-Product-HA-15-SP3-2021-2221 is not security or has no CVEs. patches: SUSE-2021-2221,SUSE-SLE-Product-HA-15-SP3-2021-2221 SKIP SUSE-RU-2021:2222-1 as SUSE-Storage-6-2021-2222 is not security or has no CVEs. patches: SUSE-2021-2222,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2222,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2222,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2222,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2222,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2222,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2222,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2222,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2222,SUSE-Storage-6-2021-2222 SKIP SUSE-RU-2021:2223-1 as SUSE-SUSE-MicroOS-5.0-2021-2223 is not security or has no CVEs. patches: SUSE-2021-2223,SUSE-SLE-Module-Basesystem-15-SP2-2021-2223,SUSE-SLE-Module-Basesystem-15-SP3-2021-2223,SUSE-SUSE-MicroOS-5.0-2021-2223 SKIP SUSE-RU-2021:2223-2 as SUSE-Storage-6-2021-2223 is not security or has no CVEs. patches: SUSE-2021-2223,SUSE-SLE-Product-HPC-15-2021-2223,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2223,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2223,SUSE-SLE-Product-SLES-15-2021-2223,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2223,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2223,SUSE-SLE-Product-SLES_SAP-15-2021-2223,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2223,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2223,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2223,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2223,SUSE-Storage-6-2021-2223 SKIP SUSE-RU-2021:2224-1 as SUSE-SUSE-MicroOS-5.0-2021-2224 is not security or has no CVEs. patches: SUSE-2021-2224,SUSE-SLE-Module-Basesystem-15-SP2-2021-2224,SUSE-SLE-Module-Basesystem-15-SP3-2021-2224,SUSE-SUSE-MicroOS-5.0-2021-2224 SKIP SUSE-RU-2021:2226-1 as SUSE-SLE-SERVER-12-SP5-2021-2226 is not security or has no CVEs. patches: SUSE-2021-2226,SUSE-SLE-SERVER-12-SP5-2021-2226 SKIP SUSE-RU-2021:2228-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2228 is not security or has no CVEs. patches: SUSE-2021-2228,SUSE-SLE-Module-Basesystem-15-SP3-2021-2228,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2228,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2228 SKIP SUSE-RU-2021:2229-1 as SUSE-SLE-Product-SLES-15-SP2-2021-2229 is not security or has no CVEs. patches: SUSE-2021-2229,SUSE-SLE-Product-HPC-15-SP2-2021-2229,SUSE-SLE-Product-RT-15-SP2-2021-2229,SUSE-SLE-Product-SLED-15-SP2-2021-2229,SUSE-SLE-Product-SLES-15-SP2-2021-2229 SKIP SUSE-RU-2021:2231-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2231 is not security or has no CVEs. patches: SUSE-2021-2231,SUSE-SLE-INSTALLER-15-SP3-2021-2231,SUSE-SLE-Module-Basesystem-15-SP3-2021-2231 SKIP SUSE-RU-2021:2232-1 as SUSE-SLE-SERVER-12-SP5-2021-2232 is not security or has no CVEs. patches: SUSE-2021-2232,SUSE-SLE-SERVER-12-SP5-2021-2232 SKIP SUSE-RU-2021:2233-1 as SUSE-SUSE-MicroOS-5.0-2021-2233 is not security or has no CVEs. patches: SUSE-2021-2233,SUSE-SLE-Module-Basesystem-15-SP2-2021-2233,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2233,SUSE-SUSE-MicroOS-5.0-2021-2233 SKIP SUSE-RU-2021:2234-1 as SUSE-SLE-Module-Legacy-15-SP3-2021-2234 is not security or has no CVEs. patches: SUSE-2021-2234,SUSE-SLE-Module-Legacy-15-SP2-2021-2234,SUSE-SLE-Module-Legacy-15-SP3-2021-2234 SKIP SUSE-RU-2021:2235-1 as SUSE-SUSE-MicroOS-5.0-2021-2235 is not security or has no CVEs. patches: SUSE-2021-2235,SUSE-SLE-INSTALLER-15-SP2-2021-2235,SUSE-SLE-Module-Basesystem-15-SP2-2021-2235,SUSE-SUSE-MicroOS-5.0-2021-2235 SKIP SUSE-RU-2021:2243-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-2243 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2243,SUSE-2021-2243,SUSE-OpenStack-Cloud-8-2021-2243,SUSE-OpenStack-Cloud-9-2021-2243,SUSE-OpenStack-Cloud-Crowbar-8-2021-2243,SUSE-OpenStack-Cloud-Crowbar-9-2021-2243,SUSE-SLE-SAP-12-SP3-2021-2243,SUSE-SLE-SAP-12-SP4-2021-2243,SUSE-SLE-SERVER-12-SP2-BCL-2021-2243,SUSE-SLE-SERVER-12-SP3-2021-2243,SUSE-SLE-SERVER-12-SP3-BCL-2021-2243,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2243 SKIP SUSE-RU-2021:2244-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2244 is not security or has no CVEs. patches: SUSE-2021-2244,SUSE-SLE-Module-Basesystem-15-SP3-2021-2244 SKIP SUSE-RU-2021:2245-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2245 is not security or has no CVEs. patches: SUSE-2021-2245,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2245,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2245 SKIP SUSE-RU-2021:2246-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2246 is not security or has no CVEs. patches: SUSE-2021-2246,SUSE-SLE-Module-Basesystem-15-SP2-2021-2246 SKIP SUSE-RU-2021:2251-1 as SUSE-SLE-Module-Containers-15-SP2-2021-2251 is not security or has no CVEs. patches: SUSE-2021-2251,SUSE-SLE-Module-Containers-15-SP2-2021-2251 SKIP SUSE-RU-2021:2254-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2254 is not security or has no CVEs. patches: SUSE-2021-2254,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2254,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2254,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2254 SKIP SUSE-RU-2021:2255-1 as SUSE-SLE-Product-WE-15-SP3-2021-2255 is not security or has no CVEs. patches: SUSE-2021-2255,SUSE-SLE-Module-Basesystem-15-SP2-2021-2255,SUSE-SLE-Module-Basesystem-15-SP3-2021-2255,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2255,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2255,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2255,SUSE-SLE-Product-WE-15-SP2-2021-2255,SUSE-SLE-Product-WE-15-SP3-2021-2255 SKIP SUSE-RU-2021:2256-1 as SUSE-SLE-SERVER-12-SP5-2021-2256 is not security or has no CVEs. patches: SUSE-2021-2256,SUSE-SLE-SERVER-12-SP5-2021-2256 SKIP SUSE-RU-2021:2258-1 as SUSE-Storage-6-2021-2258 is not security or has no CVEs. patches: SUSE-2021-2258,SUSE-SLE-Module-Containers-15-SP2-2021-2258,SUSE-SLE-Module-Containers-15-SP3-2021-2258,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2258,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2258,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2258,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2258,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2258,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2258,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2258,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2258,SUSE-Storage-6-2021-2258 SKIP SUSE-RU-2021:2259-1 as SUSE-SLE-SERVER-12-SP5-2021-2259 is not security or has no CVEs. patches: SUSE-2021-2259,SUSE-SLE-SERVER-12-SP5-2021-2259 SKIP SUSE-RU-2021:2260-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2260 is not security or has no CVEs. patches: SUSE-2021-2260,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2260 SKIP SUSE-RU-2021:2261-1 as SUSE-SUSE-MicroOS-5.0-2021-2261 is not security or has no CVEs. patches: SUSE-2021-2261,SUSE-SLE-Module-Basesystem-15-SP2-2021-2261,SUSE-SLE-Module-Basesystem-15-SP3-2021-2261,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2261,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2261,SUSE-SLE-Product-WE-15-SP2-2021-2261,SUSE-SLE-Product-WE-15-SP3-2021-2261,SUSE-SUSE-MicroOS-5.0-2021-2261 SKIP SUSE-RU-2021:2262-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-2262 is not security or has no CVEs. patches: SUSE-2021-2262,SUSE-OpenStack-Cloud-9-2021-2262,SUSE-OpenStack-Cloud-Crowbar-9-2021-2262,SUSE-SLE-SAP-12-SP4-2021-2262,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2262 SKIP SUSE-RU-2021:2263-1 as SUSE-SLE-WE-12-SP5-2021-2263 is not security or has no CVEs. patches: SUSE-2021-2263,SUSE-SLE-SDK-12-SP5-2021-2263,SUSE-SLE-SERVER-12-SP5-2021-2263,SUSE-SLE-WE-12-SP5-2021-2263 SKIP SUSE-RU-2021:2264-1 as SUSE-SLE-Product-HA-15-SP2-2021-2264 is not security or has no CVEs. patches: SUSE-2021-2264,SUSE-SLE-Product-HA-15-SP2-2021-2264 SKIP SUSE-RU-2021:2265-1 as SUSE-Storage-6-2021-2265 is not security or has no CVEs. patches: SUSE-2021-2265,SUSE-SLE-Module-Basesystem-15-SP2-2021-2265,SUSE-SLE-Module-Basesystem-15-SP3-2021-2265,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2265,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2265,SUSE-SLE-Product-HPC-15-2021-2265,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2265,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2265,SUSE-SLE-Product-SLES-15-2021-2265,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2265,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2265,SUSE-SLE-Product-SLES_SAP-15-2021-2265,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2265,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2265,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2265,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2265,SUSE-Storage-6-2021-2265 SKIP SUSE-RU-2021:2266-1 as SUSE-Storage-6-2021-2266 is not security or has no CVEs. patches: SUSE-2021-2266,SUSE-SLE-Module-Basesystem-15-SP2-2021-2266,SUSE-SLE-Module-Basesystem-15-SP3-2021-2266,SUSE-SLE-Product-HPC-15-2021-2266,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2266,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2266,SUSE-SLE-Product-SLES-15-2021-2266,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2266,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2266,SUSE-SLE-Product-SLES_SAP-15-2021-2266,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2266,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2266,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2266,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2266,SUSE-Storage-6-2021-2266 SKIP SUSE-RU-2021:2267-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2267 is not security or has no CVEs. patches: SUSE-2021-2267,SUSE-SLE-Module-Basesystem-15-SP3-2021-2267 SKIP SUSE-RU-2021:2268-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2268 is not security or has no CVEs. patches: SUSE-2021-2268,SUSE-SLE-Module-Basesystem-15-SP3-2021-2268 SKIP SUSE-RU-2021:2269-1 as SUSE-Storage-7-2021-2269 is not security or has no CVEs. patches: SUSE-2021-2269,SUSE-Storage-7-2021-2269 SKIP SUSE-RU-2021:2270-1 as SUSE-Storage-6-2021-2270 is not security or has no CVEs. patches: SUSE-2021-2270,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2270,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2270,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2270,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2270,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2270,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2270,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2270,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2270,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2270,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2270,SUSE-Storage-6-2021-2270 SKIP SUSE-RU-2021:2271-1 as SUSE-SLE-Product-WE-15-SP3-2021-2271 is not security or has no CVEs. patches: SUSE-2021-2271,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2271,SUSE-SLE-Product-WE-15-SP2-2021-2271,SUSE-SLE-Product-WE-15-SP3-2021-2271 SKIP SUSE-RU-2021:2272-1 as SUSE-SLE-Product-HA-15-SP3-2021-2272 is not security or has no CVEs. patches: SUSE-2021-2272,SUSE-SLE-Product-HA-15-SP3-2021-2272 SKIP SUSE-RU-2021:2273-1 as SUSE-SUSE-MicroOS-5.0-2021-2273 is not security or has no CVEs. patches: SUSE-2021-2273,SUSE-SLE-INSTALLER-15-SP2-2021-2273,SUSE-SLE-Module-Basesystem-15-SP2-2021-2273,SUSE-SLE-Module-Basesystem-15-SP3-2021-2273,SUSE-SUSE-MicroOS-5.0-2021-2273 SKIP SUSE-RU-2021:2275-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2275 is not security or has no CVEs. patches: SUSE-2021-2275,SUSE-SLE-INSTALLER-15-SP3-2021-2275,SUSE-SLE-Module-Basesystem-15-SP3-2021-2275 SKIP SUSE-RU-2021:2276-1 as SUSE-Storage-6-2021-2276 is not security or has no CVEs. patches: SUSE-2021-2276,SUSE-SLE-Product-HPC-15-2021-2276,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2276,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2276,SUSE-SLE-Product-SLES-15-2021-2276,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2276,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2276,SUSE-SLE-Product-SLES_SAP-15-2021-2276,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2276,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2276,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2276,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2276,SUSE-Storage-6-2021-2276 SKIP SUSE-RU-2021:2277-1 as SUSE-SLE-Product-WE-15-SP3-2021-2277 is not security or has no CVEs. patches: SUSE-2021-2277,SUSE-SLE-Module-Basesystem-15-SP2-2021-2277,SUSE-SLE-Module-Basesystem-15-SP3-2021-2277,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2277,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2277,SUSE-SLE-Product-WE-15-SP2-2021-2277,SUSE-SLE-Product-WE-15-SP3-2021-2277 SKIP SUSE-RU-2021:2278-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2278 is not security or has no CVEs. patches: SUSE-2021-2278,SUSE-SLE-Module-Basesystem-15-SP2-2021-2278 SKIP SUSE-RU-2021:2279-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-2279 is not security or has no CVEs. patches: SUSE-2021-2279,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2279 SKIP SUSE-RU-2021:2281-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2281 is not security or has no CVEs. patches: SUSE-2021-2281,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2281,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2281 SKIP SUSE-RU-2021:2282-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2282 is not security or has no CVEs. patches: SUSE-2021-2282,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2282,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2282 SKIP SUSE-RU-2021:2283-1 as SUSE-SLE-Product-WE-15-SP3-2021-2283 is not security or has no CVEs. patches: SUSE-2021-2283,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2283,SUSE-SLE-Product-WE-15-SP2-2021-2283,SUSE-SLE-Product-WE-15-SP3-2021-2283 SKIP SUSE-RU-2021:2284-1 as SUSE-SLE-SERVER-12-SP5-2021-2284 is not security or has no CVEs. patches: SUSE-2021-2284,SUSE-SLE-HA-12-SP5-2021-2284,SUSE-SLE-SDK-12-SP5-2021-2284,SUSE-SLE-SERVER-12-SP5-2021-2284 SKIP SUSE-RU-2021:2285-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2285 is not security or has no CVEs. patches: SUSE-2021-2285,SUSE-SLE-Module-Basesystem-15-SP3-2021-2285 SKIP SUSE-RU-2021:2286-1 as SUSE-SUSE-MicroOS-5.0-2021-2286 is not security or has no CVEs. patches: SUSE-2021-2286,SUSE-SLE-Module-Basesystem-15-SP2-2021-2286,SUSE-SLE-Module-Basesystem-15-SP3-2021-2286,SUSE-SUSE-MicroOS-5.0-2021-2286 SKIP SUSE-RU-2021:2287-1 as SUSE-SLE-Product-WE-15-SP3-2021-2287 is not security or has no CVEs. patches: SUSE-2021-2287,SUSE-SLE-Module-Basesystem-15-SP2-2021-2287,SUSE-SLE-Module-Basesystem-15-SP3-2021-2287,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2287,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2287,SUSE-SLE-Product-WE-15-SP2-2021-2287,SUSE-SLE-Product-WE-15-SP3-2021-2287 SKIP SUSE-RU-2021:2288-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2288 is not security or has no CVEs. patches: SUSE-2021-2288,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2288 SKIP SUSE-RU-2021:2289-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2289 is not security or has no CVEs. patches: SUSE-2021-2289,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2289,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2289 SKIP SUSE-RU-2021:2290-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2290 is not security or has no CVEs. patches: SUSE-2021-2290,SUSE-SLE-Module-Basesystem-15-SP2-2021-2290,SUSE-SLE-Module-Basesystem-15-SP3-2021-2290,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2290,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2290,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2290,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2290 SKIP SUSE-RU-2021:2298-1 as SUSE-SLE-Module-HPC-15-SP2-2021-2298 is not security or has no CVEs. patches: SUSE-2021-2298,SUSE-SLE-Module-HPC-15-SP2-2021-2298 SKIP SUSE-RU-2021:2300-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2300 is not security or has no CVEs. patches: SUSE-2021-2300,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2300,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2300 SKIP SUSE-RU-2021:2301-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-2301 is not security or has no CVEs. patches: SUSE-2021-2301,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-2301,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-2301,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-2301 SKIP SUSE-RU-2021:2306-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2306 is not security or has no CVEs. patches: SUSE-2021-2306,SUSE-SLE-Module-Basesystem-15-SP3-2021-2306 SKIP SUSE-RU-2021:2307-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2307 is not security or has no CVEs. patches: SUSE-2021-2307,SUSE-SLE-Module-Basesystem-15-SP3-2021-2307 SKIP SUSE-RU-2021:2308-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2308 is not security or has no CVEs. patches: SUSE-2021-2308,SUSE-SLE-Module-Basesystem-15-SP3-2021-2308 SKIP SUSE-RU-2021:2311-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2311 is not security or has no CVEs. patches: SUSE-2021-2311,SUSE-SLE-Module-Basesystem-15-SP3-2021-2311 SKIP SUSE-RU-2021:2312-1 as SUSE-SLE-SERVER-12-SP5-2021-2312 is not security or has no CVEs. patches: SUSE-2021-2312,SUSE-SLE-SERVER-12-SP5-2021-2312 SKIP SUSE-RU-2021:2314-1 as SUSE-SUSE-MicroOS-5.0-2021-2314 is not security or has no CVEs. patches: SUSE-2021-2314,SUSE-SLE-Module-Basesystem-15-SP2-2021-2314,SUSE-SLE-Module-Basesystem-15-SP3-2021-2314,SUSE-SUSE-MicroOS-5.0-2021-2314 SKIP SUSE-RU-2021:2315-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2315 is not security or has no CVEs. patches: SUSE-2021-2315,SUSE-SLE-Module-Basesystem-15-SP2-2021-2315,SUSE-SLE-Module-Basesystem-15-SP3-2021-2315 SKIP SUSE-RU-2021:2316-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2316 is not security or has no CVEs. patches: SUSE-2021-2316,SUSE-SLE-Module-Basesystem-15-SP3-2021-2316 SKIP SUSE-RU-2021:2317-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2317 is not security or has no CVEs. patches: SUSE-2021-2317,SUSE-SLE-Module-Basesystem-15-SP2-2021-2317 SKIP SUSE-RU-2021:2318-1 as SUSE-SLE-SERVER-12-SP5-2021-2318 is not security or has no CVEs. patches: SUSE-2021-2318,SUSE-SLE-SERVER-12-SP5-2021-2318 SKIP SUSE-RU-2021:2350-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-2350 is not security or has no CVEs. patches: SUSE-2021-2350,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2350 SKIP SUSE-RU-2021:2351-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2351 is not security or has no CVEs. patches: SUSE-2021-2351,SUSE-SLE-Module-Basesystem-15-SP2-2021-2351,SUSE-SLE-Module-Basesystem-15-SP3-2021-2351 SKIP SUSE-RU-2021:2374-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2374 is not security or has no CVEs. patches: SUSE-2021-2374,SUSE-SLE-Module-Basesystem-15-SP3-2021-2374 SKIP SUSE-RU-2021:2385-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2385 is not security or has no CVEs. patches: SUSE-2021-2385,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2385 SKIP SUSE-RU-2021:2391-1 as SUSE-SLE-SERVER-12-SP5-2021-2391 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2391,SUSE-2021-2391,SUSE-OpenStack-Cloud-8-2021-2391,SUSE-SLE-SDK-12-SP5-2021-2391,SUSE-SLE-SERVER-12-SP5-2021-2391 SKIP SUSE-RU-2021:2394-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2394 is not security or has no CVEs. patches: SUSE-2021-2394,SUSE-SLE-Module-Basesystem-15-SP3-2021-2394 SKIP SUSE-RU-2021:2395-1 as SUSE-SUSE-MicroOS-5.0-2021-2395 is not security or has no CVEs. patches: SUSE-2021-2395,SUSE-SLE-Module-Basesystem-15-SP2-2021-2395,SUSE-SLE-Module-Basesystem-15-SP3-2021-2395,SUSE-SUSE-MicroOS-5.0-2021-2395 SKIP SUSE-RU-2021:2399-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-2399 is not security or has no CVEs. patches: SUSE-2021-2399,SUSE-SLE-Module-Certifications-15-SP3-2021-2399,SUSE-SLE-Product-HPC-15-SP3-2021-2399,SUSE-SLE-Product-RT-15-SP3-2021-2399,SUSE-SLE-Product-SLED-15-SP3-2021-2399,SUSE-SLE-Product-SLES-15-SP3-2021-2399,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2021-2399,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2021-2399,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-2399 SKIP SUSE-RU-2021:2400-1 as SUSE-SLE-SERVER-12-SP5-2021-2400 is not security or has no CVEs. patches: SUSE-2021-2400,SUSE-SLE-SERVER-12-SP5-2021-2400 SKIP SUSE-RU-2021:2401-1 as SUSE-SLE-Module-Public-Cloud-15-2021-2401 is not security or has no CVEs. patches: SUSE-2021-2401,SUSE-SLE-Module-Public-Cloud-15-2021-2401 SKIP SUSE-RU-2021:2417-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2417 is not security or has no CVEs. patches: SUSE-2021-2417,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2417 SKIP SUSE-RU-2021:2418-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2418 is not security or has no CVEs. patches: SUSE-2021-2418,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2418 SKIP SUSE-RU-2021:2420-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2420 is not security or has no CVEs. patches: SUSE-2021-2420,SUSE-SLE-Module-Basesystem-15-SP3-2021-2420 SKIP SUSE-RU-2021:2436-1 as SUSE-SLE-Product-WE-15-SP3-2021-2436 is not security or has no CVEs. patches: SUSE-2021-2436,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2436,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2436,SUSE-SLE-Product-WE-15-SP2-2021-2436,SUSE-SLE-Product-WE-15-SP3-2021-2436 SKIP SUSE-RU-2021:2444-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2444 is not security or has no CVEs. patches: SUSE-2021-2444,SUSE-SLE-Module-Basesystem-15-SP2-2021-2444,SUSE-SLE-Module-Basesystem-15-SP3-2021-2444,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2444,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2444 SKIP SUSE-RU-2021:2445-1 as SUSE-SLE-Product-HA-15-SP1-2021-2445 is not security or has no CVEs. patches: SUSE-2021-2445,SUSE-SLE-Product-HA-15-SP1-2021-2445 SKIP SUSE-RU-2021:2446-1 as SUSE-SLE-Product-HA-15-2021-2446 is not security or has no CVEs. patches: SUSE-2021-2446,SUSE-SLE-Product-HA-15-2021-2446 SKIP SUSE-RU-2021:2447-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2447 is not security or has no CVEs. patches: SUSE-2021-2447,SUSE-SLE-Manager-Tools-15-2021-2447,SUSE-SLE-Module-Basesystem-15-SP2-2021-2447,SUSE-SLE-Module-Basesystem-15-SP3-2021-2447,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-2447,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2447,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2447,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-2447,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2447,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2447 SKIP SUSE-RU-2021:2449-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-2449 is not security or has no CVEs. patches: SUSE-2021-2449,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2449 SKIP SUSE-RU-2021:2450-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2450 is not security or has no CVEs. patches: SUSE-2021-2450,SUSE-SLE-INSTALLER-15-SP2-2021-2450,SUSE-SLE-Module-Basesystem-15-SP2-2021-2450 SKIP SUSE-RU-2021:2455-1 as SUSE-SLE-Module-Web-Scripting-15-SP3-2021-2455 is not security or has no CVEs. patches: SUSE-2021-2455,SUSE-SLE-Module-Web-Scripting-15-SP2-2021-2455,SUSE-SLE-Module-Web-Scripting-15-SP3-2021-2455 SKIP SUSE-RU-2021:2456-1 as SUSE-SUSE-MicroOS-5.0-2021-2456 is not security or has no CVEs. patches: SUSE-2021-2456,SUSE-SLE-Module-Basesystem-15-SP2-2021-2456,SUSE-SLE-Module-Basesystem-15-SP3-2021-2456,SUSE-SUSE-MicroOS-5.0-2021-2456 SKIP SUSE-RU-2021:2463-1 as SUSE-SUSE-MicroOS-5.0-2021-2463 is not security or has no CVEs. patches: SUSE-2021-2463,SUSE-SLE-Module-Basesystem-15-SP2-2021-2463,SUSE-SLE-Module-Basesystem-15-SP3-2021-2463,SUSE-SLE-Module-Python2-15-SP2-2021-2463,SUSE-SLE-Module-Python2-15-SP3-2021-2463,SUSE-SUSE-MicroOS-5.0-2021-2463 SKIP SUSE-RU-2021:2464-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2464 is not security or has no CVEs. patches: SUSE-2021-2464,SUSE-SLE-Module-Basesystem-15-SP3-2021-2464 SKIP SUSE-RU-2021:2465-1 as SUSE-Storage-6-2021-2465 is not security or has no CVEs. patches: SUSE-2021-2465,SUSE-SLE-Module-Basesystem-15-SP2-2021-2465,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2465,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2465,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2465,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2465,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2465,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2465,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2465,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2465,SUSE-SUSE-MicroOS-5.0-2021-2465,SUSE-Storage-6-2021-2465 SKIP SUSE-RU-2021:2466-1 as SUSE-SLE-Product-SLES_SAP-15-2021-2466 is not security or has no CVEs. patches: SUSE-2021-2466,SUSE-SLE-Product-HPC-15-2021-2466,SUSE-SLE-Product-SLES_SAP-15-2021-2466 SKIP SUSE-RU-2021:2467-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2467 is not security or has no CVEs. patches: SUSE-2021-2467,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2467,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2467 SKIP SUSE-RU-2021:2468-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2468 is not security or has no CVEs. patches: SUSE-2021-2468,SUSE-SLE-Module-Basesystem-15-SP2-2021-2468 SKIP SUSE-RU-2021:2475-1 as SUSE-Storage-6-2021-2475 is not security or has no CVEs. patches: SUSE-2021-2475,SUSE-SLE-Module-Basesystem-15-SP2-2021-2475,SUSE-SLE-Module-Basesystem-15-SP3-2021-2475,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2475,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2475,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2475,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2475,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2475,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2475,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2475,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2475,SUSE-Storage-6-2021-2475 SKIP SUSE-RU-2021:2476-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2476 is not security or has no CVEs. patches: SUSE-2021-2476,SUSE-SLE-Module-Basesystem-15-SP3-2021-2476 SKIP SUSE-RU-2021:2477-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2477 is not security or has no CVEs. patches: SUSE-2021-2477,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-2477,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2477,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2477 SKIP SUSE-RU-2021:2481-1 as SUSE-SUSE-MicroOS-5.0-2021-2481 is not security or has no CVEs. patches: SUSE-2021-2481,SUSE-SLE-Module-Basesystem-15-SP2-2021-2481,SUSE-SLE-Module-Basesystem-15-SP3-2021-2481,SUSE-SUSE-MicroOS-5.0-2021-2481 SKIP SUSE-RU-2021:2482-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2482 is not security or has no CVEs. patches: SUSE-2021-2482,SUSE-SLE-INSTALLER-15-SP3-2021-2482,SUSE-SLE-Module-Basesystem-15-SP3-2021-2482 SKIP SUSE-RU-2021:2483-1 as SUSE-SLE-SDK-12-SP5-2021-2483 is not security or has no CVEs. patches: SUSE-2021-2483,SUSE-SLE-SDK-12-SP5-2021-2483 SKIP SUSE-RU-2021:2547-1 as SUSE-SLE-Product-HA-15-SP3-2021-2547 is not security or has no CVEs. patches: SUSE-2021-2547,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2547,SUSE-SLE-Product-HA-15-SP3-2021-2547 SKIP SUSE-RU-2021:2548-1 as SUSE-SLE-Product-HA-15-SP2-2021-2548 is not security or has no CVEs. patches: SUSE-2021-2548,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-2548,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2548,SUSE-SLE-Product-HA-15-SP1-2021-2548,SUSE-SLE-Product-HA-15-SP2-2021-2548 SKIP SUSE-RU-2021:2549-1 as SUSE-SLE-Product-WE-15-SP2-2021-2549 is not security or has no CVEs. patches: SUSE-2021-2549,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2549,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2549,SUSE-SLE-Product-WE-15-SP2-2021-2549 SKIP SUSE-RU-2021:2550-1 as SUSE-SLE-Product-HA-15-SP2-2021-2550 is not security or has no CVEs. patches: SUSE-2021-2550,SUSE-SLE-Product-HA-15-2021-2550,SUSE-SLE-Product-HA-15-SP1-2021-2550,SUSE-SLE-Product-HA-15-SP2-2021-2550 SKIP SUSE-RU-2021:2551-1 as SUSE-SLE-Product-HA-15-SP2-2021-2551 is not security or has no CVEs. patches: SUSE-2021-2551,SUSE-SLE-Product-HA-15-SP2-2021-2551 SKIP SUSE-RU-2021:2552-1 as SUSE-SLE-HA-12-SP5-2021-2552 is not security or has no CVEs. patches: SUSE-2021-2552,SUSE-SLE-HA-12-SP4-2021-2552,SUSE-SLE-HA-12-SP5-2021-2552 SKIP SUSE-RU-2021:2553-1 as SUSE-SLE-Product-SLES-15-SP3-2021-2553 is not security or has no CVEs. patches: SUSE-2021-2553,SUSE-SLE-INSTALLER-15-SP3-2021-2553,SUSE-SLE-Product-SLES-15-SP3-2021-2553 SKIP SUSE-RU-2021:2556-1 as SUSE-SLE-HA-12-SP5-2021-2556 is not security or has no CVEs. patches: SUSE-2021-2556,SUSE-SLE-HA-12-SP4-2021-2556,SUSE-SLE-HA-12-SP5-2021-2556 SKIP SUSE-RU-2021:2557-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2557 is not security or has no CVEs. patches: SUSE-2021-2557,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2557 SKIP SUSE-RU-2021:2558-1 as SUSE-SLE-Module-Python2-15-SP3-2021-2558 is not security or has no CVEs. patches: SUSE-2021-2558,SUSE-SLE-Module-Basesystem-15-SP3-2021-2558,SUSE-SLE-Module-Python2-15-SP3-2021-2558 SKIP SUSE-RU-2021:2568-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2568 is not security or has no CVEs. patches: SUSE-2021-2568,SUSE-SLE-Module-Basesystem-15-SP3-2021-2568,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2568 SKIP SUSE-RU-2021:2569-1 as SUSE-SLE-SERVER-12-SP5-2021-2569 is not security or has no CVEs. patches: SUSE-2021-2569,SUSE-OpenStack-Cloud-9-2021-2569,SUSE-OpenStack-Cloud-Crowbar-9-2021-2569,SUSE-SLE-SAP-12-SP4-2021-2569,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2569,SUSE-SLE-SERVER-12-SP5-2021-2569 SKIP SUSE-RU-2021:2570-1 as SUSE-SLE-SERVER-12-SP5-2021-2570 is not security or has no CVEs. patches: SUSE-2021-2570,SUSE-SLE-SERVER-12-SP5-2021-2570 SKIP SUSE-RU-2021:2571-1 as SUSE-SUSE-MicroOS-5.0-2021-2571 is not security or has no CVEs. patches: SUSE-2021-2571,SUSE-SLE-Module-Basesystem-15-SP2-2021-2571,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2571,SUSE-SUSE-MicroOS-5.0-2021-2571 SKIP SUSE-RU-2021:2572-1 as SUSE-SLE-SERVER-12-SP5-2021-2572 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2572,SUSE-2021-2572,SUSE-OpenStack-Cloud-8-2021-2572,SUSE-OpenStack-Cloud-9-2021-2572,SUSE-OpenStack-Cloud-Crowbar-8-2021-2572,SUSE-OpenStack-Cloud-Crowbar-9-2021-2572,SUSE-SLE-SAP-12-SP3-2021-2572,SUSE-SLE-SAP-12-SP4-2021-2572,SUSE-SLE-SERVER-12-SP2-BCL-2021-2572,SUSE-SLE-SERVER-12-SP3-2021-2572,SUSE-SLE-SERVER-12-SP3-BCL-2021-2572,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2572,SUSE-SLE-SERVER-12-SP5-2021-2572 SKIP SUSE-RU-2021:2573-1 as SUSE-Storage-6-2021-2573 is not security or has no CVEs. patches: SUSE-2021-2573,SUSE-SLE-Module-Basesystem-15-SP2-2021-2573,SUSE-SLE-Module-Basesystem-15-SP3-2021-2573,SUSE-SLE-Product-HPC-15-2021-2573,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2573,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2573,SUSE-SLE-Product-SLES-15-2021-2573,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2573,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2573,SUSE-SLE-Product-SLES_SAP-15-2021-2573,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2573,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2573,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2573,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2573,SUSE-SUSE-MicroOS-5.0-2021-2573,SUSE-Storage-6-2021-2573 SKIP SUSE-RU-2021:2574-1 as SUSE-SLE-SERVER-12-SP5-2021-2574 is not security or has no CVEs. patches: SUSE-2021-2574,SUSE-SLE-SDK-12-SP5-2021-2574,SUSE-SLE-SERVER-12-SP5-2021-2574 SKIP SUSE-RU-2021:2576-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2576 is not security or has no CVEs. patches: SUSE-2021-2576,SUSE-SLE-Module-Basesystem-15-SP2-2021-2576,SUSE-SLE-Module-Basesystem-15-SP3-2021-2576,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2576,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2576 SKIP SUSE-RU-2021:2578-1 as SUSE-SLE-SERVER-12-SP5-2021-2578 is not security or has no CVEs. patches: SUSE-2021-2578,SUSE-OpenStack-Cloud-9-2021-2578,SUSE-OpenStack-Cloud-Crowbar-9-2021-2578,SUSE-SLE-SDK-12-SP5-2021-2578,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2578,SUSE-SLE-SERVER-12-SP5-2021-2578 SKIP SUSE-RU-2021:2579-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2579 is not security or has no CVEs. patches: SUSE-2021-2579,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2579 SKIP SUSE-RU-2021:2580-1 as SUSE-SLE-Module-HPC-15-SP3-2021-2580 is not security or has no CVEs. patches: SUSE-2021-2580,SUSE-SLE-Module-HPC-15-SP3-2021-2580 SKIP SUSE-RU-2021:2581-1 as SUSE-Storage-6-2021-2581 is not security or has no CVEs. patches: SUSE-2021-2581,SUSE-Storage-6-2021-2581 SKIP SUSE-RU-2021:2582-1 as SUSE-Storage-7-2021-2582 is not security or has no CVEs. patches: SUSE-2021-2582,SUSE-Storage-7-2021-2582 SKIP SUSE-RU-2021:2583-1 as SUSE-SLE-SDK-12-SP5-2021-2583 is not security or has no CVEs. patches: SUSE-2021-2583,SUSE-SLE-SDK-12-SP5-2021-2583 SKIP SUSE-RU-2021:2586-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-2586 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2586,SUSE-2021-2586,SUSE-OpenStack-Cloud-8-2021-2586,SUSE-OpenStack-Cloud-Crowbar-8-2021-2586,SUSE-SLE-SAP-12-SP3-2021-2586,SUSE-SLE-SERVER-12-SP3-2021-2586,SUSE-SLE-SERVER-12-SP3-BCL-2021-2586 SKIP SUSE-RU-2021:2587-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2587 is not security or has no CVEs. patches: SUSE-2021-2587,SUSE-SLE-Module-Basesystem-15-SP3-2021-2587 SKIP SUSE-RU-2021:2592-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2592 is not security or has no CVEs. patches: SUSE-2021-2592,SUSE-SLE-Module-Basesystem-15-SP2-2021-2592 SKIP SUSE-RU-2021:2593-1 as SUSE-SUSE-MicroOS-5.0-2021-2593 is not security or has no CVEs. patches: SUSE-2021-2593,SUSE-SLE-Module-Basesystem-15-SP2-2021-2593,SUSE-SUSE-MicroOS-5.0-2021-2593 SKIP SUSE-RU-2021:2594-1 as SUSE-SLE-SERVER-12-SP5-2021-2594 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2594,SUSE-2021-2594,SUSE-OpenStack-Cloud-8-2021-2594,SUSE-OpenStack-Cloud-9-2021-2594,SUSE-OpenStack-Cloud-Crowbar-8-2021-2594,SUSE-OpenStack-Cloud-Crowbar-9-2021-2594,SUSE-SLE-SAP-12-SP3-2021-2594,SUSE-SLE-SAP-12-SP4-2021-2594,SUSE-SLE-SERVER-12-SP3-2021-2594,SUSE-SLE-SERVER-12-SP3-BCL-2021-2594,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2594,SUSE-SLE-SERVER-12-SP5-2021-2594 SKIP SUSE-RU-2021:2596-1 as SUSE-SLE-Module-Containers-12-2021-2596 is not security or has no CVEs. patches: SUSE-2021-2596,SUSE-SLE-Module-Containers-12-2021-2596 SKIP SUSE-RU-2021:2597-1 as SUSE-SLE-SERVER-12-SP5-2021-2597 is not security or has no CVEs. patches: SUSE-2021-2597,SUSE-SLE-HA-12-SP5-2021-2597,SUSE-SLE-SDK-12-SP5-2021-2597,SUSE-SLE-SERVER-12-SP5-2021-2597 SKIP SUSE-RU-2021:2602-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2602 is not security or has no CVEs. patches: SUSE-2021-2602,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-2602,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2602,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2602 SKIP SUSE-RU-2021:2603-1 as SUSE-SUSE-MicroOS-5.0-2021-2603 is not security or has no CVEs. patches: SUSE-2021-2603,SUSE-SLE-Module-Basesystem-15-SP2-2021-2603,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2603,SUSE-SUSE-MicroOS-5.0-2021-2603 SKIP SUSE-RU-2021:2604-1 as SUSE-SLE-HA-12-SP5-2021-2604 is not security or has no CVEs. patches: SUSE-2021-2604,SUSE-SLE-HA-12-SP5-2021-2604 SKIP SUSE-RU-2021:2606-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2606 is not security or has no CVEs. patches: SUSE-2021-2606,SUSE-SLE-Module-Basesystem-15-SP2-2021-2606,SUSE-SLE-Module-Basesystem-15-SP3-2021-2606,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2606,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2606 SKIP SUSE-RU-2021:2608-1 as SUSE-SLE-HA-12-SP3-2021-2608 is not security or has no CVEs. patches: SUSE-2021-2608,SUSE-SLE-HA-12-SP3-2021-2608 SKIP SUSE-RU-2021:2609-1 as SUSE-SLE-HA-12-SP4-2021-2609 is not security or has no CVEs. patches: SUSE-2021-2609,SUSE-SLE-HA-12-SP4-2021-2609 SKIP SUSE-RU-2021:2610-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2610 is not security or has no CVEs. patches: SUSE-2021-2610,SUSE-SLE-Module-Basesystem-15-SP3-2021-2610 SKIP SUSE-RU-2021:2611-1 as SUSE-SLE-Product-HA-15-SP3-2021-2611 is not security or has no CVEs. patches: SUSE-2021-2611,SUSE-SLE-Product-HA-15-SP3-2021-2611 SKIP SUSE-RU-2021:2623-1 as SUSE-SLE-Product-HA-15-SP2-2021-2623 is not security or has no CVEs. patches: SUSE-2021-2623,SUSE-SLE-Module-Basesystem-15-SP2-2021-2623,SUSE-SLE-Module-Python2-15-SP2-2021-2623,SUSE-SLE-Product-HA-15-SP2-2021-2623 SKIP SUSE-RU-2021:2624-1 as SUSE-SLE-SERVER-12-SP5-2021-2624 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2624,SUSE-2021-2624,SUSE-OpenStack-Cloud-8-2021-2624,SUSE-OpenStack-Cloud-9-2021-2624,SUSE-OpenStack-Cloud-Crowbar-8-2021-2624,SUSE-OpenStack-Cloud-Crowbar-9-2021-2624,SUSE-SLE-SAP-12-SP3-2021-2624,SUSE-SLE-SAP-12-SP4-2021-2624,SUSE-SLE-SERVER-12-SP2-BCL-2021-2624,SUSE-SLE-SERVER-12-SP3-2021-2624,SUSE-SLE-SERVER-12-SP3-BCL-2021-2624,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2624,SUSE-SLE-SERVER-12-SP5-2021-2624 SKIP SUSE-RU-2021:2625-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2625 is not security or has no CVEs. patches: SUSE-2021-2625,SUSE-SLE-Module-Basesystem-15-SP3-2021-2625 SKIP SUSE-RU-2021:2626-1 as SUSE-SLE-Module-Transactional-Server-15-SP3-2021-2626 is not security or has no CVEs. patches: SUSE-2021-2626,SUSE-SLE-Module-Transactional-Server-15-SP3-2021-2626 SKIP SUSE-RU-2021:2627-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2627 is not security or has no CVEs. patches: SUSE-2021-2627,SUSE-SLE-Module-Basesystem-15-SP3-2021-2627 SKIP SUSE-RU-2021:2628-1 as SUSE-Storage-6-2021-2628 is not security or has no CVEs. patches: SUSE-2021-2628,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2628,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2628,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2628,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2628,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2628,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2628,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2628,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2628,SUSE-Storage-6-2021-2628 SKIP SUSE-RU-2021:2629-1 as SUSE-SLE-Product-WE-15-SP3-2021-2629 is not security or has no CVEs. patches: SUSE-2021-2629,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2629,SUSE-SLE-Product-WE-15-SP3-2021-2629 SKIP SUSE-RU-2021:2630-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2630 is not security or has no CVEs. patches: SUSE-2021-2630,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2630 SKIP SUSE-RU-2021:2639-1 as SUSE-SLE-Module-Public-Cloud-12-2021-2639 is not security or has no CVEs. patches: SUSE-2021-2639,SUSE-SLE-Module-Public-Cloud-12-2021-2639 SKIP SUSE-RU-2021:2640-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2640 is not security or has no CVEs. patches: SUSE-2021-2640,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-2640,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2640,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2640 SKIP SUSE-RU-2021:2650-1 as SUSE-SLE-SERVER-12-SP5-2021-2650 is not security or has no CVEs. patches: SUSE-2021-2650,SUSE-SLE-SDK-12-SP5-2021-2650,SUSE-SLE-SERVER-12-SP5-2021-2650 SKIP SUSE-RU-2021:2651-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-2651 is not security or has no CVEs. patches: SUSE-2021-2651,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2651 SKIP SUSE-RU-2021:2652-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2652 is not security or has no CVEs. patches: SUSE-2021-2652,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2652 SKIP SUSE-RU-2021:2654-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2654 is not security or has no CVEs. patches: SUSE-2021-2654,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2654,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2654 SKIP SUSE-RU-2021:2655-1 as SUSE-SLE-Product-WE-15-SP2-2021-2655 is not security or has no CVEs. patches: SUSE-2021-2655,SUSE-SLE-Product-WE-15-SP2-2021-2655 ERROR: notice SUSE-RU-2021:2659-1 has no valid patches out of: SUSE-2021-2659,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2021-2659 ERROR: notice SUSE-RU-2021:2661-1 has no valid patches out of: SUSE-2021-2661,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2021-2661 SKIP SUSE-RU-2021:2663-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2021-2663 is not security or has no CVEs. patches: SUSE-2021-2663,SUSE-SLE-Manager-Tools-12-2021-2663,SUSE-SLE-Module-Adv-Systems-Management-12-2021-2663 SKIP SUSE-RU-2021:2665-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-2665 is not security or has no CVEs. patches: SUSE-2021-2665,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2021-2665,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2021-2665,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-2665 SKIP SUSE-RU-2021:2666-1 as SUSE-SLE-Product-SLES_SAP-15-2021-2666 is not security or has no CVEs. patches: SUSE-2021-2666,SUSE-SLE-Product-HPC-15-2021-2666,SUSE-SLE-Product-SLES-15-2021-2666,SUSE-SLE-Product-SLES_SAP-15-2021-2666 SKIP SUSE-RU-2021:2667-1 as SUSE-Storage-6-2021-2667 is not security or has no CVEs. patches: SUSE-2021-2667,SUSE-SLE-Manager-Tools-15-2021-2667,SUSE-Storage-6-2021-2667 SKIP SUSE-RU-2021:2668-1 as SUSE-SLE-Module-Transactional-Server-15-SP3-2021-2668 is not security or has no CVEs. patches: SUSE-2021-2668,SUSE-SLE-Module-Basesystem-15-SP3-2021-2668,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2668,SUSE-SLE-Module-Transactional-Server-15-SP3-2021-2668 SKIP SUSE-RU-2021:2669-1 as SUSE-SUSE-MicroOS-5.0-2021-2669 is not security or has no CVEs. patches: SUSE-2021-2669,SUSE-SLE-Module-Basesystem-15-SP2-2021-2669,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2669,SUSE-SLE-Module-Transactional-Server-15-SP2-2021-2669,SUSE-SUSE-MicroOS-5.0-2021-2669 SKIP SUSE-RU-2021:2670-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2670 is not security or has no CVEs. patches: SUSE-2021-2670,SUSE-SLE-Module-Basesystem-15-SP2-2021-2670,SUSE-SLE-Module-Basesystem-15-SP3-2021-2670 SKIP SUSE-RU-2021:2671-1 as SUSE-Storage-6-2021-2671 is not security or has no CVEs. patches: SUSE-2021-2671,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2671,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2671,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2671,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2671,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2671,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2671,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2671,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2671,SUSE-Storage-6-2021-2671 SKIP SUSE-RU-2021:2676-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2676 is not security or has no CVEs. patches: SUSE-2021-2676,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2676,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2676 SKIP SUSE-RU-2021:2681-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2681 is not security or has no CVEs. patches: SUSE-2021-2681,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2681 SKIP SUSE-RU-2021:2688-1 as SUSE-SLE-Module-Transactional-Server-15-SP2-2021-2688 is not security or has no CVEs. patches: SUSE-2021-2688,SUSE-SLE-Module-Basesystem-15-SP2-2021-2688,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2688,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2688,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2688,SUSE-SLE-Module-Transactional-Server-15-SP2-2021-2688 SKIP SUSE-RU-2021:2692-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-2692 is not security or has no CVEs. patches: SUSE-2021-2692,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-2692,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-2692,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-2692 SKIP SUSE-RU-2021:2693-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2693 is not security or has no CVEs. patches: SUSE-2021-2693,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2693,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2693 SKIP SUSE-RU-2021:2758-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2758 is not security or has no CVEs. patches: SUSE-2021-2758,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2758 SKIP SUSE-RU-2021:2763-1 as SUSE-Storage-6-2021-2763 is not security or has no CVEs. patches: SUSE-2021-2763,SUSE-SLE-Module-Basesystem-15-SP2-2021-2763,SUSE-SLE-Module-Basesystem-15-SP3-2021-2763,SUSE-SLE-Product-HPC-15-2021-2763,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2763,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2763,SUSE-SLE-Product-SLES-15-2021-2763,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2763,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2763,SUSE-SLE-Product-SLES_SAP-15-2021-2763,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2763,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2763,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2763,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2763,SUSE-SUSE-MicroOS-5.0-2021-2763,SUSE-Storage-6-2021-2763 SKIP SUSE-RU-2021:2767-1 as SUSE-SLE-SERVER-12-SP5-2021-2767 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2767,SUSE-2021-2767,SUSE-OpenStack-Cloud-8-2021-2767,SUSE-OpenStack-Cloud-9-2021-2767,SUSE-OpenStack-Cloud-Crowbar-8-2021-2767,SUSE-OpenStack-Cloud-Crowbar-9-2021-2767,SUSE-SLE-SAP-12-SP3-2021-2767,SUSE-SLE-SAP-12-SP4-2021-2767,SUSE-SLE-SERVER-12-SP2-BCL-2021-2767,SUSE-SLE-SERVER-12-SP3-2021-2767,SUSE-SLE-SERVER-12-SP3-BCL-2021-2767,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2767,SUSE-SLE-SERVER-12-SP5-2021-2767 SKIP SUSE-RU-2021:2770-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2770 is not security or has no CVEs. patches: SUSE-2021-2770,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2770 SKIP SUSE-RU-2021:2772-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2772 is not security or has no CVEs. patches: SUSE-2021-2772,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2772 SKIP SUSE-RU-2021:2775-1 as SUSE-SLE-SERVER-12-SP5-2021-2775 is not security or has no CVEs. patches: SUSE-2021-2775,SUSE-SLE-SDK-12-SP5-2021-2775,SUSE-SLE-SERVER-12-SP5-2021-2775 SKIP SUSE-RU-2021:2778-1 as SUSE-2021-2778 is not security or has no CVEs. patches: SUSE-2021-2778,SUSE-SLE-Module-Basesystem-15-SP3-2021-2778 SKIP SUSE-RU-2021:2781-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2781 is not security or has no CVEs. patches: SUSE-2021-2781,SUSE-SLE-Module-Basesystem-15-SP2-2021-2781,SUSE-SLE-Module-Basesystem-15-SP3-2021-2781 SKIP SUSE-RU-2021:2782-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2782 is not security or has no CVEs. patches: SUSE-2021-2782,SUSE-SLE-INSTALLER-15-SP3-2021-2782,SUSE-SLE-Module-Basesystem-15-SP3-2021-2782 SKIP SUSE-RU-2021:2783-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2783 is not security or has no CVEs. patches: SUSE-2021-2783,SUSE-SLE-INSTALLER-15-SP3-2021-2783,SUSE-SLE-Module-Basesystem-15-SP3-2021-2783 SKIP SUSE-RU-2021:2785-1 as SUSE-SLE-SAP-12-SP5-2021-2785 is not security or has no CVEs. patches: SUSE-2021-2785,SUSE-SLE-SAP-12-SP3-2021-2785,SUSE-SLE-SAP-12-SP4-2021-2785,SUSE-SLE-SAP-12-SP5-2021-2785 SKIP SUSE-RU-2021:2786-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2786 is not security or has no CVEs. patches: SUSE-2021-2786,SUSE-SLE-Module-Basesystem-15-SP3-2021-2786 SKIP SUSE-RU-2021:2805-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2805 is not security or has no CVEs. patches: SUSE-2021-2805,SUSE-SLE-Module-Basesystem-15-SP2-2021-2805,SUSE-SLE-Module-Basesystem-15-SP3-2021-2805 SKIP SUSE-RU-2021:2807-1 as SUSE-SLE-Product-HA-15-SP2-2021-2807 is not security or has no CVEs. patches: SUSE-2021-2807,SUSE-SLE-Product-HA-15-SP2-2021-2807 SKIP SUSE-RU-2021:2819-1 as SUSE-Storage-6-2021-2819 is not security or has no CVEs. patches: SUSE-2021-2819,SUSE-Storage-6-2021-2819 SKIP SUSE-RU-2021:2820-1 as SUSE-Storage-6-2021-2820 is not security or has no CVEs. patches: SUSE-2021-2820,SUSE-Storage-6-2021-2820 SKIP SUSE-RU-2021:2821-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2821 is not security or has no CVEs. patches: SUSE-2021-2821,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2821,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-2821,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2821 SKIP SUSE-RU-2021:2822-1 as SUSE-SLE-Module-SAP-Applications-15-2021-2822 is not security or has no CVEs. patches: SUSE-2021-2822,SUSE-SLE-Module-SAP-Applications-15-2021-2822 SKIP SUSE-RU-2021:2836-1 as SUSE-SLE-SAP-12-SP5-2021-2836 is not security or has no CVEs. patches: SUSE-2021-2836,SUSE-SLE-SAP-12-SP3-2021-2836,SUSE-SLE-SAP-12-SP4-2021-2836,SUSE-SLE-SAP-12-SP5-2021-2836 SKIP SUSE-RU-2021:2839-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2839 is not security or has no CVEs. patches: SUSE-2021-2839,SUSE-SLE-INSTALLER-15-SP3-2021-2839,SUSE-SLE-Module-Basesystem-15-SP3-2021-2839 SKIP SUSE-RU-2021:2849-1 as SUSE-SLE-Product-HA-15-SP3-2021-2849 is not security or has no CVEs. patches: SUSE-2021-2849,SUSE-SLE-Module-Basesystem-15-SP2-2021-2849,SUSE-SLE-Module-Basesystem-15-SP3-2021-2849,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2849,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2849,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2849,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2849,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2849,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2849,SUSE-SLE-Product-HA-15-2021-2849,SUSE-SLE-Product-HA-15-SP1-2021-2849,SUSE-SLE-Product-HA-15-SP2-2021-2849,SUSE-SLE-Product-HA-15-SP3-2021-2849 SKIP SUSE-RU-2021:2850-1 as SUSE-SLE-Product-HA-15-2021-2850 is not security or has no CVEs. patches: SUSE-2021-2850,SUSE-SLE-Product-HA-15-2021-2850 SKIP SUSE-RU-2021:2851-1 as SUSE-SLE-Product-HA-15-SP1-2021-2851 is not security or has no CVEs. patches: SUSE-2021-2851,SUSE-SLE-Product-HA-15-SP1-2021-2851 SKIP SUSE-RU-2021:2854-1 as SUSE-SLE-Product-SLES_SAP-15-2021-2854 is not security or has no CVEs. patches: SUSE-2021-2854,SUSE-SLE-Product-HPC-15-2021-2854,SUSE-SLE-Product-SLES-15-2021-2854,SUSE-SLE-Product-SLES_SAP-15-2021-2854 SKIP SUSE-RU-2021:2855-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2855 is not security or has no CVEs. patches: SUSE-2021-2855,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2855 SKIP SUSE-RU-2021:2856-1 as SUSE-SLE-HA-12-SP5-2021-2856 is not security or has no CVEs. patches: SUSE-2021-2856,SUSE-SLE-HA-12-SP4-2021-2856,SUSE-SLE-HA-12-SP5-2021-2856 SKIP SUSE-RU-2021:2859-1 as SUSE-SLE-SERVER-12-SP5-2021-2859 is not security or has no CVEs. patches: SUSE-2021-2859,SUSE-SLE-SDK-12-SP5-2021-2859,SUSE-SLE-SERVER-12-SP5-2021-2859 SKIP SUSE-RU-2021:2860-1 as SUSE-SLE-SAP-12-SP5-2021-2860 is not security or has no CVEs. patches: SUSE-2021-2860,SUSE-SLE-SAP-12-SP3-2021-2860,SUSE-SLE-SAP-12-SP4-2021-2860,SUSE-SLE-SAP-12-SP5-2021-2860 SKIP SUSE-RU-2021:2863-1 as SUSE-SUSE-MicroOS-5.0-2021-2863 is not security or has no CVEs. patches: SUSE-2021-2863,SUSE-SLE-Module-Basesystem-15-SP2-2021-2863,SUSE-SLE-Module-Basesystem-15-SP3-2021-2863,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2863,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2863,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2863,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2863,SUSE-SLE-Module-Python2-15-SP2-2021-2863,SUSE-SLE-Module-Python2-15-SP3-2021-2863,SUSE-SUSE-MicroOS-5.0-2021-2863 SKIP SUSE-RU-2021:2863-2 as SUSE-SUSE-MicroOS-5.1-2021-2863 is not security or has no CVEs. patches: SUSE-2021-2863,SUSE-SUSE-MicroOS-5.1-2021-2863 SKIP SUSE-RU-2021:2864-1 as SUSE-SLE-Product-HA-15-SP1-2021-2864 is not security or has no CVEs. patches: SUSE-2021-2864,SUSE-SLE-Product-HA-15-SP1-2021-2864 SKIP SUSE-RU-2021:2865-1 as SUSE-SLE-Product-HA-15-2021-2865 is not security or has no CVEs. patches: SUSE-2021-2865,SUSE-SLE-Product-HA-15-2021-2865 SKIP SUSE-RU-2021:2866-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2866 is not security or has no CVEs. patches: SUSE-2021-2866,SUSE-SLE-Module-Basesystem-15-SP2-2021-2866 SKIP SUSE-RU-2021:2867-1 as SUSE-SLE-SERVER-12-SP5-2021-2867 is not security or has no CVEs. patches: SUSE-2021-2867,SUSE-SLE-SERVER-12-SP5-2021-2867 SKIP SUSE-RU-2021:2868-1 as SUSE-SLE-SAP-12-SP5-2021-2868 is not security or has no CVEs. patches: SUSE-2021-2868,SUSE-SLE-SAP-12-SP3-2021-2868,SUSE-SLE-SAP-12-SP4-2021-2868,SUSE-SLE-SAP-12-SP5-2021-2868 SKIP SUSE-RU-2021:2869-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2869 is not security or has no CVEs. patches: SUSE-2021-2869,SUSE-SLE-Module-Basesystem-15-SP3-2021-2869 SKIP SUSE-RU-2021:2870-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2870 is not security or has no CVEs. patches: SUSE-2021-2870,SUSE-SLE-INSTALLER-15-SP3-2021-2870,SUSE-SLE-Module-Basesystem-15-SP3-2021-2870 SKIP SUSE-RU-2021:2871-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-2871 is not security or has no CVEs. patches: SUSE-2021-2871,SUSE-SLE-Module-Basesystem-15-SP2-2021-2871,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2871 SKIP SUSE-RU-2021:2878-1 as SUSE-SLE-Module-Containers-15-SP3-2021-2878 is not security or has no CVEs. patches: SUSE-2021-2878,SUSE-SLE-Module-Containers-15-SP2-2021-2878,SUSE-SLE-Module-Containers-15-SP3-2021-2878 SKIP SUSE-RU-2021:2879-1 as SUSE-SLE-Module-Containers-15-SP2-2021-2879 is not security or has no CVEs. patches: SUSE-2021-2879,SUSE-SLE-Module-Containers-15-SP2-2021-2879 SKIP SUSE-RU-2021:2880-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2880 is not security or has no CVEs. patches: SUSE-2021-2880,SUSE-SLE-Module-Basesystem-15-SP2-2021-2880 SKIP SUSE-RU-2021:2881-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2881 is not security or has no CVEs. patches: SUSE-2021-2881,SUSE-SLE-Module-Basesystem-15-SP3-2021-2881 SKIP SUSE-RU-2021:2882-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2882 is not security or has no CVEs. patches: SUSE-2021-2882,SUSE-SLE-INSTALLER-15-SP2-2021-2882,SUSE-SLE-Module-Basesystem-15-SP2-2021-2882 SKIP SUSE-RU-2021:2883-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2883 is not security or has no CVEs. patches: SUSE-2021-2883,SUSE-SLE-Module-Basesystem-15-SP3-2021-2883 SKIP SUSE-RU-2021:2884-1 as SUSE-SLE-SERVER-12-SP5-2021-2884 is not security or has no CVEs. patches: SUSE-2021-2884,SUSE-SLE-SERVER-12-SP5-2021-2884 SKIP SUSE-RU-2021:2885-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2885 is not security or has no CVEs. patches: SUSE-2021-2885,SUSE-SLE-Module-Basesystem-15-SP2-2021-2885,SUSE-SLE-Module-Basesystem-15-SP3-2021-2885 SKIP SUSE-RU-2021:2886-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2886 is not security or has no CVEs. patches: SUSE-2021-2886,SUSE-SLE-Module-Basesystem-15-SP3-2021-2886,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2886 SKIP SUSE-RU-2021:2887-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2887 is not security or has no CVEs. patches: SUSE-2021-2887,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-2887,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-2887,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2887 SKIP SUSE-RU-2021:2888-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2888 is not security or has no CVEs. patches: SUSE-2021-2888,SUSE-SLE-Module-Basesystem-15-SP3-2021-2888 SKIP SUSE-RU-2021:2893-1 as SUSE-SLE-SERVER-12-SP5-2021-2893 is not security or has no CVEs. patches: SUSE-2021-2893,SUSE-SLE-SERVER-12-SP5-2021-2893 SKIP SUSE-RU-2021:2895-1 as SUSE-SUSE-MicroOS-5.0-2021-2895 is not security or has no CVEs. patches: SUSE-2021-2895,SUSE-SLE-Module-Basesystem-15-SP2-2021-2895,SUSE-SLE-Module-Basesystem-15-SP3-2021-2895,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2895,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2895,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-2895,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-2895,SUSE-SUSE-MicroOS-5.0-2021-2895 SKIP SUSE-RU-2021:2897-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2897 is not security or has no CVEs. patches: SUSE-2021-2897,SUSE-SLE-Module-Basesystem-15-SP3-2021-2897,SUSE-SLE-Module-Legacy-15-SP3-2021-2897,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2897 SKIP SUSE-RU-2021:2898-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2898 is not security or has no CVEs. patches: SUSE-2021-2898,SUSE-SLE-Module-Basesystem-15-SP3-2021-2898,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2898,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2898 SKIP SUSE-RU-2021:2898-2 as SUSE-SUSE-MicroOS-5.1-2021-2898 is not security or has no CVEs. patches: SUSE-2021-2898,SUSE-SUSE-MicroOS-5.1-2021-2898 SKIP SUSE-RU-2021:2899-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2899 is not security or has no CVEs. patches: SUSE-2021-2899,SUSE-SLE-Module-Basesystem-15-SP2-2021-2899,SUSE-SLE-Module-Basesystem-15-SP3-2021-2899 SKIP SUSE-RU-2021:2900-1 as SUSE-SLE-SERVER-12-SP5-2021-2900 is not security or has no CVEs. patches: SUSE-2021-2900,SUSE-SLE-SDK-12-SP5-2021-2900,SUSE-SLE-SERVER-12-SP5-2021-2900 SKIP SUSE-RU-2021:2901-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2901 is not security or has no CVEs. patches: SUSE-2021-2901,SUSE-SLE-Module-Basesystem-15-SP2-2021-2901,SUSE-SLE-Module-Basesystem-15-SP3-2021-2901 SKIP SUSE-RU-2021:2902-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2902 is not security or has no CVEs. patches: SUSE-2021-2902,SUSE-SLE-Module-SAP-Applications-15-2021-2902,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2902 SKIP SUSE-RU-2021:2903-1 as SUSE-SLE-SERVER-12-SP5-2021-2903 is not security or has no CVEs. patches: SUSE-2021-2903,SUSE-SLE-SDK-12-SP5-2021-2903,SUSE-SLE-SERVER-12-SP5-2021-2903 SKIP SUSE-RU-2021:2904-1 as SUSE-SLE-Product-HA-15-SP1-2021-2904 is not security or has no CVEs. patches: SUSE-2021-2904,SUSE-SLE-Product-HA-15-SP1-2021-2904 SKIP SUSE-RU-2021:2905-1 as SUSE-SLE-Product-HA-15-SP3-2021-2905 is not security or has no CVEs. patches: SUSE-2021-2905,SUSE-SLE-Product-HA-15-SP3-2021-2905 SKIP SUSE-RU-2021:2907-1 as SUSE-SLE-Product-HA-15-SP3-2021-2907 is not security or has no CVEs. patches: SUSE-2021-2907,SUSE-SLE-Product-HA-15-SP3-2021-2907 SKIP SUSE-RU-2021:2908-1 as SUSE-Storage-6-2021-2908 is not security or has no CVEs. patches: SUSE-2021-2908,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2908,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2908,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2908,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2908,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2908,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2908,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2908,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2908,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2908,SUSE-Storage-6-2021-2908 SKIP SUSE-RU-2021:2909-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2909 is not security or has no CVEs. patches: SUSE-2021-2909,SUSE-SLE-Module-Basesystem-15-SP3-2021-2909,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2909 SKIP SUSE-RU-2021:2909-2 as SUSE-SUSE-MicroOS-5.1-2021-2909 is not security or has no CVEs. patches: SUSE-2021-2909,SUSE-SUSE-MicroOS-5.1-2021-2909 SKIP SUSE-RU-2021:2910-1 as SUSE-SLE-Product-HA-15-SP2-2021-2910 is not security or has no CVEs. patches: SUSE-2021-2910,SUSE-SLE-Product-HA-15-SP2-2021-2910 SKIP SUSE-RU-2021:2911-1 as SUSE-SLE-Product-HA-15-2021-2911 is not security or has no CVEs. patches: SUSE-2021-2911,SUSE-SLE-Product-HA-15-2021-2911 ERROR: notice SUSE-RU-2021:2931-1 has no valid patches out of: SUSE-2021-2931,SUSE-SLE-Product-RT-15-SP3-2021-2931 SKIP SUSE-RU-2021:2934-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2934 is not security or has no CVEs. patches: SUSE-2021-2934,SUSE-SLE-Module-SAP-Applications-15-2021-2934,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2934,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-2934,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2934 SKIP SUSE-RU-2021:2935-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2935 is not security or has no CVEs. patches: SUSE-2021-2935,SUSE-SLE-Module-SAP-Applications-15-2021-2935,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-2935,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-2935,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2935 SKIP SUSE-RU-2021:2936-1 as SUSE-SLE-SERVER-12-SP5-2021-2936 is not security or has no CVEs. patches: SUSE-2021-2936,SUSE-SLE-SERVER-12-SP5-2021-2936 SKIP SUSE-RU-2021:2938-1 as SUSE-SUSE-MicroOS-5.0-2021-2938 is not security or has no CVEs. patches: SUSE-2021-2938,SUSE-SLE-Module-Basesystem-15-SP2-2021-2938,SUSE-SLE-Module-Basesystem-15-SP3-2021-2938,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2938,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2938,SUSE-SLE-Module-Legacy-15-SP2-2021-2938,SUSE-SLE-Module-Legacy-15-SP3-2021-2938,SUSE-SUSE-MicroOS-5.0-2021-2938 SKIP SUSE-RU-2021:2945-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2945 is not security or has no CVEs. patches: SUSE-2021-2945,SUSE-SLE-Module-Basesystem-15-SP3-2021-2945 SKIP SUSE-RU-2021:2945-2 as SUSE-SUSE-MicroOS-5.1-2021-2945 is not security or has no CVEs. patches: SUSE-2021-2945,SUSE-SUSE-MicroOS-5.1-2021-2945 SKIP SUSE-RU-2021:2946-1 as SUSE-SLE-SERVER-12-SP5-2021-2946 is not security or has no CVEs. patches: SUSE-2021-2946,SUSE-SLE-SERVER-12-SP5-2021-2946 SKIP SUSE-RU-2021:2947-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2021-2947 is not security or has no CVEs. patches: SUSE-2021-2947,SUSE-SLE-Live-Patching-12-2021-2948,SUSE-SLE-Live-Patching-12-SP3-2021-2948,SUSE-SLE-Live-Patching-12-SP4-2021-2948,SUSE-SLE-Live-Patching-12-SP5-2021-2948,SUSE-SLE-Module-Live-Patching-15-2021-2947,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2947,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2947,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2947 SKIP SUSE-RU-2021:2950-1 as SUSE-SUSE-MicroOS-5.0-2021-2950 is not security or has no CVEs. patches: SUSE-2021-2950,SUSE-SLE-Module-Basesystem-15-SP2-2021-2950,SUSE-SLE-Module-Basesystem-15-SP3-2021-2950,SUSE-SUSE-MicroOS-5.0-2021-2950 SKIP SUSE-RU-2021:2950-2 as SUSE-SUSE-MicroOS-5.1-2021-2950 is not security or has no CVEs. patches: SUSE-2021-2950,SUSE-SUSE-MicroOS-5.1-2021-2950 SKIP SUSE-RU-2021:2951-1 as SUSE-Storage-6-2021-2951 is not security or has no CVEs. patches: SUSE-2021-2951,SUSE-SLE-Module-Basesystem-15-SP2-2021-2951,SUSE-SLE-Module-Basesystem-15-SP3-2021-2951,SUSE-SLE-Product-HPC-15-2021-2951,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2951,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2951,SUSE-SLE-Product-SLES-15-2021-2951,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2951,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2951,SUSE-SLE-Product-SLES_SAP-15-2021-2951,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2951,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2951,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2951,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2951,SUSE-Storage-6-2021-2951 SKIP SUSE-RU-2021:2956-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-2956 is not security or has no CVEs. patches: SUSE-2021-2956,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2956 SKIP SUSE-RU-2021:2959-1 as SUSE-SLE-Product-HA-15-SP2-2021-2959 is not security or has no CVEs. patches: SUSE-2021-2959,SUSE-SLE-Product-HA-15-SP2-2021-2959 SKIP SUSE-RU-2021:2960-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2960 is not security or has no CVEs. patches: SUSE-2021-2960,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-2960,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-2960,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2960,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2960 SKIP SUSE-RU-2021:2961-1 as SUSE-SLE-Product-WE-15-SP2-2021-2961 is not security or has no CVEs. patches: SUSE-2021-2961,SUSE-SLE-Product-WE-15-SP2-2021-2961 SKIP SUSE-RU-2021:2962-1 as SUSE-Storage-7-2021-2962 is not security or has no CVEs. patches: SUSE-2021-2962,SUSE-SLE-Module-Containers-15-SP2-2021-2962,SUSE-SLE-Module-Containers-15-SP3-2021-2962,SUSE-SUSE-MicroOS-5.0-2021-2962,SUSE-Storage-7-2021-2962 SKIP SUSE-RU-2021:2963-1 as SUSE-SLE-SDK-12-SP5-2021-2963 is not security or has no CVEs. patches: SUSE-2021-2963,SUSE-SLE-HA-12-SP3-2021-2963,SUSE-SLE-HA-12-SP4-2021-2963,SUSE-SLE-HA-12-SP5-2021-2963,SUSE-SLE-SDK-12-SP5-2021-2963 SKIP SUSE-RU-2021:2964-1 as SUSE-SUSE-MicroOS-5.0-2021-2964 is not security or has no CVEs. patches: SUSE-2021-2964,SUSE-SUSE-MicroOS-5.0-2021-2964 SKIP SUSE-RU-2021:2970-1 as SUSE-SLE-SERVER-12-SP5-2021-2970 is not security or has no CVEs. patches: SUSE-2021-2970,SUSE-SLE-SERVER-12-SP5-2021-2970 SKIP SUSE-RU-2021:2972-1 as SUSE-SUSE-MicroOS-5.0-2021-2972 is not security or has no CVEs. patches: SUSE-2021-2972,SUSE-SLE-INSTALLER-15-SP2-2021-2972,SUSE-SLE-Module-Basesystem-15-SP2-2021-2972,SUSE-SUSE-MicroOS-5.0-2021-2972 SKIP SUSE-RU-2021:2973-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2973 is not security or has no CVEs. patches: SUSE-2021-2973,SUSE-SLE-Manager-Tools-15-2021-2973,SUSE-SLE-Module-Basesystem-15-SP2-2021-2973,SUSE-SLE-Module-Basesystem-15-SP3-2021-2973,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-2973,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-2973,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2973,SUSE-SLE-Module-SUSE-Manager-Server-4.0-2021-2973,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-2973,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2973 SKIP SUSE-RU-2021:2974-1 as SUSE-Storage-6-2021-2974 is not security or has no CVEs. patches: SUSE-2021-2974,SUSE-SLE-Module-Server-Applications-15-SP2-2021-2974,SUSE-SLE-Module-Server-Applications-15-SP3-2021-2974,SUSE-SLE-Product-HPC-15-2021-2974,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2974,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2974,SUSE-SLE-Product-SLES-15-2021-2974,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2974,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2974,SUSE-SLE-Product-SLES_SAP-15-2021-2974,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2974,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2974,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2974,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2974,SUSE-Storage-6-2021-2974 SKIP SUSE-RU-2021:2976-1 as SUSE-SLE-SERVER-12-SP5-2021-2976 is not security or has no CVEs. patches: SUSE-2021-2976,SUSE-SLE-SERVER-12-SP5-2021-2976 SKIP SUSE-RU-2021:2977-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2977 is not security or has no CVEs. patches: SUSE-2021-2977,SUSE-SLE-Module-Basesystem-15-SP3-2021-2977 SKIP SUSE-RU-2021:2978-1 as SUSE-SLE-Product-SLES_SAP-15-2021-2978 is not security or has no CVEs. patches: SUSE-2021-2978,SUSE-SLE-Product-HPC-15-2021-2978,SUSE-SLE-Product-SLES-15-2021-2978,SUSE-SLE-Product-SLES_SAP-15-2021-2978 SKIP SUSE-RU-2021:2979-1 as SUSE-Storage-6-2021-2979 is not security or has no CVEs. patches: SUSE-2021-2979,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2979,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2979,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2979,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2979,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2979,SUSE-Storage-6-2021-2979 SKIP SUSE-RU-2021:2980-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-2980 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-2980,SUSE-2021-2980,SUSE-OpenStack-Cloud-8-2021-2980,SUSE-OpenStack-Cloud-9-2021-2980,SUSE-OpenStack-Cloud-Crowbar-8-2021-2980,SUSE-OpenStack-Cloud-Crowbar-9-2021-2980,SUSE-SLE-SAP-12-SP3-2021-2980,SUSE-SLE-SAP-12-SP4-2021-2980,SUSE-SLE-SERVER-12-SP3-2021-2980,SUSE-SLE-SERVER-12-SP3-BCL-2021-2980,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2980 SKIP SUSE-RU-2021:2981-1 as SUSE-SLE-WE-12-SP5-2021-2981 is not security or has no CVEs. patches: SUSE-2021-2981,SUSE-SLE-SDK-12-SP5-2021-2981,SUSE-SLE-WE-12-SP5-2021-2981 SKIP SUSE-RU-2021:2982-1 as SUSE-SLE-Module-Python2-15-SP3-2021-2982 is not security or has no CVEs. patches: SUSE-2021-2982,SUSE-SLE-Module-Basesystem-15-SP2-2021-2982,SUSE-SLE-Module-Basesystem-15-SP3-2021-2982,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-2982,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-2982,SUSE-SLE-Module-Python2-15-SP2-2021-2982,SUSE-SLE-Module-Python2-15-SP3-2021-2982 SKIP SUSE-RU-2021:2983-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-2983 is not security or has no CVEs. patches: SUSE-2021-2983,SUSE-SLE-Module-Basesystem-15-SP2-2021-2983 SKIP SUSE-RU-2021:2984-1 as SUSE-SLE-Product-HA-15-SP3-2021-2984 is not security or has no CVEs. patches: SUSE-2021-2984,SUSE-SLE-Product-HA-15-SP2-2021-2984,SUSE-SLE-Product-HA-15-SP3-2021-2984 SKIP SUSE-RU-2021:2985-1 as SUSE-SLE-SERVER-12-SP5-2021-2985 is not security or has no CVEs. patches: SUSE-2021-2985,SUSE-OpenStack-Cloud-9-2021-2985,SUSE-OpenStack-Cloud-Crowbar-9-2021-2985,SUSE-SLE-SAP-12-SP4-2021-2985,SUSE-SLE-SDK-12-SP5-2021-2985,SUSE-SLE-SERVER-12-SP4-LTSS-2021-2985,SUSE-SLE-SERVER-12-SP5-2021-2985 SKIP SUSE-RU-2021:2986-1 as SUSE-SLE-SERVER-12-SP5-2021-2986 is not security or has no CVEs. patches: SUSE-2021-2986,SUSE-SLE-SERVER-12-SP5-2021-2986 SKIP SUSE-RU-2021:2987-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2987 is not security or has no CVEs. patches: SUSE-2021-2987,SUSE-SLE-Module-Basesystem-15-SP2-2021-2987,SUSE-SLE-Module-Basesystem-15-SP3-2021-2987 SKIP SUSE-RU-2021:2988-1 as SUSE-SLE-WE-12-SP5-2021-2988 is not security or has no CVEs. patches: SUSE-2021-2988,SUSE-SLE-SERVER-12-SP5-2021-2988,SUSE-SLE-WE-12-SP5-2021-2988 SKIP SUSE-RU-2021:2990-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-2990 is not security or has no CVEs. patches: SUSE-2021-2990,SUSE-SLE-Module-Basesystem-15-SP3-2021-2990 SKIP SUSE-RU-2021:2991-1 as SUSE-SLE-Module-Public-Cloud-12-2021-2991 is not security or has no CVEs. patches: SUSE-2021-2991,SUSE-SLE-Module-Public-Cloud-12-2021-2991 SKIP SUSE-RU-2021:2992-1 as SUSE-SLE-Product-HA-15-SP3-2021-2992 is not security or has no CVEs. patches: SUSE-2021-2992,SUSE-SLE-Product-HA-15-SP3-2021-2992 SKIP SUSE-RU-2021:2993-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2993 is not security or has no CVEs. patches: SUSE-2021-2993,SUSE-SLE-Module-Basesystem-15-SP2-2021-2993,SUSE-SLE-Module-Basesystem-15-SP3-2021-2993,SUSE-SLE-Module-Development-Tools-15-SP2-2021-2993,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2993 SKIP SUSE-RU-2021:2997-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-2997 is not security or has no CVEs. patches: SUSE-2021-2997,SUSE-SLE-Module-Basesystem-15-SP3-2021-2997,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2997 SKIP SUSE-RU-2021:2998-1 as SUSE-SLE-Product-HA-15-2021-2998 is not security or has no CVEs. patches: SUSE-2021-2998,SUSE-SLE-Product-HA-15-2021-2998 SKIP SUSE-RU-2021:2999-1 as SUSE-SLE-Product-HA-15-SP1-2021-2999 is not security or has no CVEs. patches: SUSE-2021-2999,SUSE-SLE-Product-HA-15-SP1-2021-2999 SKIP SUSE-RU-2021:3000-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3000 is not security or has no CVEs. patches: SUSE-2021-3000,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3000,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3000 SKIP SUSE-RU-2021:3001-1 as SUSE-SUSE-MicroOS-5.0-2021-3001 is not security or has no CVEs. patches: SUSE-2021-3001,SUSE-SLE-Module-Basesystem-15-SP2-2021-3001,SUSE-SLE-Module-Basesystem-15-SP3-2021-3001,SUSE-SUSE-MicroOS-5.0-2021-3001 SKIP SUSE-RU-2021:3001-2 as SUSE-SUSE-MicroOS-5.1-2021-3001 is not security or has no CVEs. patches: SUSE-2021-3001,SUSE-SUSE-MicroOS-5.1-2021-3001 SKIP SUSE-RU-2021:3002-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3002 is not security or has no CVEs. patches: SUSE-2021-3002,SUSE-SLE-Module-Basesystem-15-SP2-2021-3002,SUSE-SLE-Module-Basesystem-15-SP3-2021-3002 SKIP SUSE-RU-2021:3010-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3010 is not security or has no CVEs. patches: SUSE-2021-3010,SUSE-SLE-Module-Basesystem-15-SP3-2021-3010 SKIP SUSE-RU-2021:3013-1 as SUSE-SLE-Module-Transactional-Server-15-SP3-2021-3013 is not security or has no CVEs. patches: SUSE-2021-3013,SUSE-SLE-Module-Basesystem-15-SP3-2021-3013,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3013,SUSE-SLE-Module-Transactional-Server-15-SP3-2021-3013 SKIP SUSE-RU-2021:3014-1 as SUSE-SLE-SERVER-12-SP5-2021-3014 is not security or has no CVEs. patches: SUSE-2021-3014,SUSE-SLE-SERVER-12-SP5-2021-3014 SKIP SUSE-RU-2021:3015-1 as SUSE-Storage-7-2021-3015 is not security or has no CVEs. patches: SUSE-2021-3015,SUSE-SLE-Module-Basesystem-15-SP2-2021-3015,SUSE-SLE-Module-Basesystem-15-SP3-2021-3015,SUSE-SUSE-MicroOS-5.0-2021-3015,SUSE-Storage-7-2021-3015 SKIP SUSE-RU-2021:3015-2 as SUSE-SUSE-MicroOS-5.1-2021-3015 is not security or has no CVEs. patches: SUSE-2021-3015,SUSE-SUSE-MicroOS-5.1-2021-3015 SKIP SUSE-RU-2021:3016-1 as SUSE-SLE-SERVER-12-SP5-2021-3016 is not security or has no CVEs. patches: SUSE-2021-3016,SUSE-SLE-SDK-12-SP5-2021-3016,SUSE-SLE-SERVER-12-SP5-2021-3016 SKIP SUSE-RU-2021:3022-1 as SUSE-Storage-6-2021-3022 is not security or has no CVEs. patches: SUSE-2021-3022,SUSE-SLE-Module-Basesystem-15-SP2-2021-3022,SUSE-SLE-Module-Basesystem-15-SP3-2021-3022,SUSE-SLE-Product-HPC-15-2021-3022,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3022,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3022,SUSE-SLE-Product-SLES-15-2021-3022,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3022,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3022,SUSE-SLE-Product-SLES_SAP-15-2021-3022,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3022,SUSE-Storage-6-2021-3022 SKIP SUSE-RU-2021:3022-2 as SUSE-SUSE-MicroOS-5.1-2021-3022 is not security or has no CVEs. patches: SUSE-2021-3022,SUSE-SUSE-MicroOS-5.1-2021-3022 SKIP SUSE-RU-2021:3023-1 as SUSE-SLE-Product-WE-15-SP3-2021-3023 is not security or has no CVEs. patches: SUSE-2021-3023,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3023,SUSE-SLE-Product-WE-15-SP2-2021-3023,SUSE-SLE-Product-WE-15-SP3-2021-3023 SKIP SUSE-RU-2021:3024-1 as SUSE-SLE-SERVER-12-SP5-2021-3024 is not security or has no CVEs. patches: SUSE-2021-3024,SUSE-SLE-SERVER-12-SP5-2021-3024 SKIP SUSE-RU-2021:3025-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3025 is not security or has no CVEs. patches: SUSE-2021-3025,SUSE-SLE-Module-Basesystem-15-SP2-2021-3025,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3025,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3025 SKIP SUSE-RU-2021:3026-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3026 is not security or has no CVEs. patches: SUSE-2021-3026,SUSE-SLE-Module-RT-15-SP3-2021-3026,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3026 SKIP SUSE-RU-2021:3028-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3028 is not security or has no CVEs. patches: SUSE-2021-3028,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3028,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3028,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3028,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3028 SKIP SUSE-RU-2021:3029-1 as SUSE-Storage-6-2021-3029 is not security or has no CVEs. patches: SUSE-2021-3029,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3029,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3029,SUSE-SLE-Product-HPC-15-2021-3029,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3029,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3029,SUSE-SLE-Product-SLES-15-2021-3029,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3029,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3029,SUSE-SLE-Product-SLES_SAP-15-2021-3029,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3029,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-3029,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-3029,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-3029,SUSE-Storage-6-2021-3029 SKIP SUSE-RU-2021:3030-1 as SUSE-SLE-Module-Transactional-Server-15-SP2-2021-3030 is not security or has no CVEs. patches: SUSE-2021-3030,SUSE-SLE-Module-Basesystem-15-SP2-2021-3030,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3030,SUSE-SLE-Module-Transactional-Server-15-SP2-2021-3030 SKIP SUSE-RU-2021:3031-1 as SUSE-SLE-SERVER-12-SP5-2021-3031 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3031,SUSE-2021-3031,SUSE-OpenStack-Cloud-8-2021-3031,SUSE-OpenStack-Cloud-9-2021-3031,SUSE-OpenStack-Cloud-Crowbar-8-2021-3031,SUSE-OpenStack-Cloud-Crowbar-9-2021-3031,SUSE-SLE-SAP-12-SP3-2021-3031,SUSE-SLE-SAP-12-SP4-2021-3031,SUSE-SLE-SERVER-12-SP3-2021-3031,SUSE-SLE-SERVER-12-SP3-BCL-2021-3031,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3031,SUSE-SLE-SERVER-12-SP5-2021-3031 SKIP SUSE-RU-2021:3032-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3032 is not security or has no CVEs. patches: SUSE-2021-3032,SUSE-SLE-INSTALLER-15-SP2-2021-3032,SUSE-SLE-Module-Basesystem-15-SP2-2021-3032 SKIP SUSE-RU-2021:3033-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3033 is not security or has no CVEs. patches: SUSE-2021-3033,SUSE-SLE-Module-Basesystem-15-SP3-2021-3033 SKIP SUSE-RU-2021:3034-1 as SUSE-SUSE-MicroOS-5.0-2021-3034 is not security or has no CVEs. patches: SUSE-2021-3034,SUSE-SLE-Module-Basesystem-15-SP2-2021-3034,SUSE-SLE-Module-Python2-15-SP2-2021-3034,SUSE-SUSE-MicroOS-5.0-2021-3034 SKIP SUSE-RU-2021:3035-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3035 is not security or has no CVEs. patches: SUSE-2021-3035,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3035 SKIP SUSE-RU-2021:3036-1 as SUSE-SLE-Product-WE-15-SP3-2021-3036 is not security or has no CVEs. patches: SUSE-2021-3036,SUSE-SLE-Product-WE-15-SP2-2021-3036,SUSE-SLE-Product-WE-15-SP3-2021-3036 SKIP SUSE-RU-2021:3037-1 as SUSE-SLE-Product-WE-15-SP3-2021-3037 is not security or has no CVEs. patches: SUSE-2021-3037,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3037,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3037,SUSE-SLE-Product-WE-15-SP2-2021-3037,SUSE-SLE-Product-WE-15-SP3-2021-3037 SKIP SUSE-RU-2021:3038-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2021-3038 is not security or has no CVEs. patches: SUSE-2021-3038,SUSE-SLE-Module-Live-Patching-15-SP2-2021-3038,SUSE-SLE-Module-Live-Patching-15-SP3-2021-3038 SKIP SUSE-RU-2021:3039-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2021-3040 is not security or has no CVEs. patches: SUSE-2021-3039,SUSE-SLE-Live-Patching-12-2021-3039,SUSE-SLE-Live-Patching-12-SP3-2021-3039,SUSE-SLE-Live-Patching-12-SP4-2021-3039,SUSE-SLE-Live-Patching-12-SP5-2021-3039,SUSE-SLE-Module-Live-Patching-15-2021-3040,SUSE-SLE-Module-Live-Patching-15-SP1-2021-3040,SUSE-SLE-Module-Live-Patching-15-SP2-2021-3040,SUSE-SLE-Module-Live-Patching-15-SP3-2021-3040 SKIP SUSE-RU-2021:3041-1 as SUSE-SLE-SERVER-12-SP5-2021-3041 is not security or has no CVEs. patches: SUSE-2021-3041,SUSE-SLE-SDK-12-SP5-2021-3041,SUSE-SLE-SERVER-12-SP5-2021-3041 SKIP SUSE-RU-2021:3042-1 as SUSE-SUSE-MicroOS-5.0-2021-3042 is not security or has no CVEs. patches: SUSE-2021-3042,SUSE-SLE-Module-Basesystem-15-SP2-2021-3042,SUSE-SUSE-MicroOS-5.0-2021-3042 SKIP SUSE-RU-2021:3043-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3043 is not security or has no CVEs. patches: SUSE-2021-3043,SUSE-SLE-Module-Basesystem-15-SP3-2021-3043 SKIP SUSE-RU-2021:3043-2 as SUSE-SUSE-MicroOS-5.1-2021-3043 is not security or has no CVEs. patches: SUSE-2021-3043,SUSE-SUSE-MicroOS-5.1-2021-3043 SKIP SUSE-RU-2021:3045-1 as SUSE-SLE-Module-HPC-15-SP3-2021-3045 is not security or has no CVEs. patches: SUSE-2021-3045,SUSE-SLE-Module-HPC-15-SP3-2021-3045 SKIP SUSE-RU-2021:3046-1 as SUSE-SLE-SERVER-12-SP5-2021-3046 is not security or has no CVEs. patches: SUSE-2021-3046,SUSE-SLE-SERVER-12-SP5-2021-3046 SKIP SUSE-RU-2021:3047-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3047 is not security or has no CVEs. patches: SUSE-2021-3047,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3047 SKIP SUSE-RU-2021:3048-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3048 is not security or has no CVEs. patches: SUSE-2021-3048,SUSE-SLE-Module-Basesystem-15-SP3-2021-3048,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3048,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3048 SKIP SUSE-RU-2021:3051-1 as SUSE-SLE-SERVER-12-SP5-2021-3051 is not security or has no CVEs. patches: SUSE-2021-3051,SUSE-SLE-HA-12-SP5-2021-3051,SUSE-SLE-SDK-12-SP5-2021-3051,SUSE-SLE-SERVER-12-SP5-2021-3051 SKIP SUSE-RU-2021:3052-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3052 is not security or has no CVEs. patches: SUSE-2021-3052,SUSE-SLE-Module-Basesystem-15-SP2-2021-3052,SUSE-SLE-Module-Basesystem-15-SP3-2021-3052 SKIP SUSE-RU-2021:3053-1 as SUSE-SLE-Module-Python2-15-SP2-2021-3053 is not security or has no CVEs. patches: SUSE-2021-3053,SUSE-SLE-Module-Python2-15-SP2-2021-3053 SKIP SUSE-RU-2021:3126-1 as SUSE-SLE-SERVER-12-SP5-2021-3126 is not security or has no CVEs. patches: SUSE-2021-3126,SUSE-SLE-SERVER-12-SP5-2021-3126 SKIP SUSE-RU-2021:3127-1 as SUSE-SLE-Product-WE-15-SP3-2021-3127 is not security or has no CVEs. patches: SUSE-2021-3127,SUSE-SLE-Product-WE-15-SP2-2021-3127,SUSE-SLE-Product-WE-15-SP3-2021-3127 SKIP SUSE-RU-2021:3128-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3128 is not security or has no CVEs. patches: SUSE-2021-3128,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3128,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3128 SKIP SUSE-RU-2021:3129-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3129 is not security or has no CVEs. patches: SUSE-2021-3129,SUSE-SLE-Module-Basesystem-15-SP3-2021-3129,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3129 SKIP SUSE-RU-2021:3130-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3130 is not security or has no CVEs. patches: SUSE-2021-3130,SUSE-SLE-Module-Basesystem-15-SP3-2021-3130 SKIP SUSE-RU-2021:3130-2 as SUSE-SUSE-MicroOS-5.1-2021-3130 is not security or has no CVEs. patches: SUSE-2021-3130,SUSE-SUSE-MicroOS-5.1-2021-3130 SKIP SUSE-RU-2021:3131-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3131 is not security or has no CVEs. patches: SUSE-2021-3131,SUSE-SLE-Module-Basesystem-15-SP2-2021-3131,SUSE-SLE-Module-Basesystem-15-SP3-2021-3131,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3131,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3131 SKIP SUSE-RU-2021:3132-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3132 is not security or has no CVEs. patches: SUSE-2021-3132,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-3132,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3132,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3132 SKIP SUSE-RU-2021:3133-1 as SUSE-SUSE-MicroOS-5.0-2021-3133 is not security or has no CVEs. patches: SUSE-2021-3133,SUSE-SLE-Module-Basesystem-15-SP2-2021-3133,SUSE-SLE-Module-Basesystem-15-SP3-2021-3133,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3133,SUSE-SUSE-MicroOS-5.0-2021-3133 SKIP SUSE-RU-2021:3133-2 as SUSE-SUSE-MicroOS-5.1-2021-3133 is not security or has no CVEs. patches: SUSE-2021-3133,SUSE-SUSE-MicroOS-5.1-2021-3133 SKIP SUSE-RU-2021:3134-1 as SUSE-SLE-Module-Public-Cloud-12-2021-3134 is not security or has no CVEs. patches: SUSE-2021-3134,SUSE-SLE-Module-Public-Cloud-12-2021-3134 SKIP SUSE-RU-2021:3135-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3135 is not security or has no CVEs. patches: SUSE-2021-3135,SUSE-SLE-INSTALLER-15-SP2-2021-3135,SUSE-SLE-Module-Basesystem-15-SP2-2021-3135 SKIP SUSE-RU-2021:3136-1 as SUSE-SUSE-MicroOS-5.0-2021-3136 is not security or has no CVEs. patches: SUSE-2021-3136,SUSE-SLE-Module-Basesystem-15-SP2-2021-3136,SUSE-SLE-Module-Basesystem-15-SP3-2021-3136,SUSE-SUSE-MicroOS-5.0-2021-3136 SKIP SUSE-RU-2021:3137-1 as SUSE-SLE-SERVER-12-SP5-2021-3137 is not security or has no CVEs. patches: SUSE-2021-3137,SUSE-SLE-SERVER-12-SP5-2021-3137 SKIP SUSE-RU-2021:3138-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3138 is not security or has no CVEs. patches: SUSE-2021-3138,SUSE-SLE-Module-Basesystem-15-SP3-2021-3138 SKIP SUSE-RU-2021:3138-2 as SUSE-SUSE-MicroOS-5.1-2021-3138 is not security or has no CVEs. patches: SUSE-2021-3138,SUSE-SUSE-MicroOS-5.1-2021-3138 SKIP SUSE-RU-2021:3139-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3139 is not security or has no CVEs. patches: SUSE-2021-3139,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3139,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3139 SKIP SUSE-RU-2021:3147-1 as SUSE-SLE-SERVER-12-SP5-2021-3147 is not security or has no CVEs. patches: SUSE-2021-3147,SUSE-SLE-SDK-12-SP5-2021-3147,SUSE-SLE-SERVER-12-SP5-2021-3147 SKIP SUSE-RU-2021:3148-1 as SUSE-SLE-SERVER-12-SP5-2021-3148 is not security or has no CVEs. patches: SUSE-2021-3148,SUSE-SLE-SDK-12-SP5-2021-3148,SUSE-SLE-SERVER-12-SP5-2021-3148 ERROR: notice SUSE-RU-2021:3153-1 has no valid patches out of: SUSE-2021-3153,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2021-3153 ERROR: notice SUSE-RU-2021:3156-1 has no valid patches out of: SUSE-2021-3156,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2021-3156 SKIP SUSE-RU-2021:3157-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3157 is not security or has no CVEs. patches: SUSE-2021-3157,SUSE-SLE-Product-HPC-15-2021-3157,SUSE-SLE-Product-SLES-15-2021-3157,SUSE-SLE-Product-SLES_SAP-15-2021-3157 SKIP SUSE-RU-2021:3159-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2021-3159 is not security or has no CVEs. patches: SUSE-2021-3159,SUSE-SLE-Manager-Tools-12-2021-3159,SUSE-SLE-Module-Adv-Systems-Management-12-2021-3159 SKIP SUSE-RU-2021:3160-1 as SUSE-SLE-Manager-Tools-12-2021-3160 is not security or has no CVEs. patches: SUSE-2021-3160,SUSE-SLE-Manager-Tools-12-2021-3160 SKIP SUSE-RU-2021:3161-1 as SUSE-SLE-Module-Transactional-Server-15-SP3-2021-3161 is not security or has no CVEs. patches: SUSE-2021-3161,SUSE-SLE-Module-Basesystem-15-SP3-2021-3161,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3161,SUSE-SLE-Module-Transactional-Server-15-SP3-2021-3161 SKIP SUSE-RU-2021:3161-2 as SUSE-SUSE-MicroOS-5.1-2021-3161 is not security or has no CVEs. patches: SUSE-2021-3161,SUSE-SUSE-MicroOS-5.1-2021-3161 SKIP SUSE-RU-2021:3163-1 as SUSE-SUSE-MicroOS-5.0-2021-3163 is not security or has no CVEs. patches: SUSE-2021-3163,SUSE-SLE-Module-Basesystem-15-SP2-2021-3163,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3163,SUSE-SLE-Module-Transactional-Server-15-SP2-2021-3163,SUSE-SUSE-MicroOS-5.0-2021-3163 SKIP SUSE-RU-2021:3164-1 as SUSE-Storage-6-2021-3164 is not security or has no CVEs. patches: SUSE-2021-3164,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3164,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3164,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3164,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3164,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3164,SUSE-Storage-6-2021-3164 SKIP SUSE-RU-2021:3167-1 as SUSE-SLE-Manager-Tools-15-2021-3167 is not security or has no CVEs. patches: SUSE-2021-3167,SUSE-SLE-Manager-Tools-15-2021-3167 SKIP SUSE-RU-2021:3170-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3170 is not security or has no CVEs. patches: SUSE-2021-3170,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3170 SKIP SUSE-RU-2021:3171-1 as SUSE-Storage-6-2021-3171 is not security or has no CVEs. patches: SUSE-2021-3171,SUSE-SLE-Module-Basesystem-15-SP2-2021-3171,SUSE-SLE-Module-Basesystem-15-SP3-2021-3171,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3171,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3171,SUSE-SLE-Product-HPC-15-2021-3171,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3171,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3171,SUSE-SLE-Product-SLES-15-2021-3171,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3171,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3171,SUSE-SLE-Product-SLES_SAP-15-2021-3171,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3171,SUSE-Storage-6-2021-3171 SKIP SUSE-RU-2021:3172-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-3172 is not security or has no CVEs. patches: SUSE-2021-3172,SUSE-SLE-SERVER-12-SP5-2021-3172,SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-3172 SKIP SUSE-RU-2021:3173-1 as SUSE-SLE-Product-SLES-15-SP3-2021-3173 is not security or has no CVEs. patches: SUSE-2021-3173,SUSE-SLE-INSTALLER-15-SP3-2021-3173,SUSE-SLE-Product-SLES-15-SP3-2021-3173 SKIP SUSE-RU-2021:3182-1 as SUSE-SUSE-MicroOS-5.0-2021-3182 is not security or has no CVEs. patches: SUSE-2021-3182,SUSE-SLE-Module-Basesystem-15-SP2-2021-3182,SUSE-SLE-Module-Basesystem-15-SP3-2021-3182,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3182,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3182,SUSE-SLE-Module-Python2-15-SP2-2021-3182,SUSE-SLE-Module-Python2-15-SP3-2021-3182,SUSE-SUSE-MicroOS-5.0-2021-3182 SKIP SUSE-RU-2021:3182-2 as SUSE-SUSE-MicroOS-5.1-2021-3182 is not security or has no CVEs. patches: SUSE-2021-3182,SUSE-SUSE-MicroOS-5.1-2021-3182 SKIP SUSE-RU-2021:3183-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3183 is not security or has no CVEs. patches: SUSE-2021-3183,SUSE-SLE-Module-Basesystem-15-SP2-2021-3183,SUSE-SLE-Module-Basesystem-15-SP3-2021-3183 SKIP SUSE-RU-2021:3186-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3186 is not security or has no CVEs. patches: SUSE-2021-3186,SUSE-SLE-Module-Basesystem-15-SP2-2021-3186,SUSE-SLE-Module-Basesystem-15-SP3-2021-3186,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3186,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3186 SKIP SUSE-RU-2021:3188-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3188 is not security or has no CVEs. patches: SUSE-2021-3188,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-3188,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3188,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3188,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3188 SKIP SUSE-RU-2021:3189-1 as SUSE-SLE-SERVER-12-SP5-2021-3189 is not security or has no CVEs. patches: SUSE-2021-3189,SUSE-SLE-SERVER-12-SP5-2021-3189 SKIP SUSE-RU-2021:3190-1 as SUSE-SLE-HA-12-SP3-2021-3190 is not security or has no CVEs. patches: SUSE-2021-3190,SUSE-SLE-HA-12-SP3-2021-3190 SKIP SUSE-RU-2021:3203-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3203 is not security or has no CVEs. patches: SUSE-2021-3203,SUSE-SLE-Module-Basesystem-15-SP3-2021-3203 SKIP SUSE-RU-2021:3203-2 as SUSE-SUSE-MicroOS-5.1-2021-3203 is not security or has no CVEs. patches: SUSE-2021-3203,SUSE-SUSE-MicroOS-5.1-2021-3203 SKIP SUSE-RU-2021:3204-1 as SUSE-SLE-Module-Containers-12-2021-3204 is not security or has no CVEs. patches: SUSE-2021-3204,SUSE-SLE-Module-Containers-12-2021-3204 SKIP SUSE-RU-2021:3216-1 as SUSE-Storage-6-2021-3216 is not security or has no CVEs. patches: SUSE-2021-3216,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3216,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3216,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3216,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3216,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3216,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-3216,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-3216,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-3216,SUSE-Storage-6-2021-3216 SKIP SUSE-RU-2021:3221-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3221 is not security or has no CVEs. patches: SUSE-2021-3221,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-3221,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3221,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3221,SUSE-SLE-Module-SUSE-Manager-Proxy-4.0-2021-3221,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3221,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3221,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3221,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3221 SKIP SUSE-RU-2021:3222-1 as SUSE-Storage-6-2021-3222 is not security or has no CVEs. patches: SUSE-2021-3222,SUSE-SLE-Product-HPC-15-2021-3222,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3222,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3222,SUSE-SLE-Product-SLES-15-2021-3222,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3222,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3222,SUSE-SLE-Product-SLES_SAP-15-2021-3222,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3222,SUSE-Storage-6-2021-3222 SKIP SUSE-RU-2021:3223-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3223 is not security or has no CVEs. patches: SUSE-2021-3223,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3223,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3223 SKIP SUSE-RU-2021:3224-1 as SUSE-SUSE-MicroOS-5.0-2021-3224 is not security or has no CVEs. patches: SUSE-2021-3224,SUSE-SLE-Module-Basesystem-15-SP2-2021-3224,SUSE-SLE-Module-Basesystem-15-SP3-2021-3224,SUSE-SUSE-MicroOS-5.0-2021-3224 SKIP SUSE-RU-2021:3225-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3225 is not security or has no CVEs. patches: SUSE-2021-3225,SUSE-SLE-Module-Basesystem-15-SP3-2021-3225 SKIP SUSE-RU-2021:3226-1 as SUSE-SLE-Product-HA-15-SP3-2021-3226 is not security or has no CVEs. patches: SUSE-2021-3226,SUSE-SLE-Product-HA-15-SP2-2021-3226,SUSE-SLE-Product-HA-15-SP3-2021-3226 SKIP SUSE-RU-2021:3227-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3227 is not security or has no CVEs. patches: SUSE-2021-3227,SUSE-SLE-Module-Basesystem-15-SP2-2021-3227,SUSE-SLE-Module-Basesystem-15-SP3-2021-3227,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3227,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3227 SKIP SUSE-RU-2021:3229-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3229 is not security or has no CVEs. patches: SUSE-2021-3229,SUSE-SLE-INSTALLER-15-SP3-2021-3229,SUSE-SLE-Module-Basesystem-15-SP3-2021-3229 SKIP SUSE-RU-2021:3230-1 as SUSE-SLE-SERVER-12-SP5-2021-3230 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3230,SUSE-2021-3230,SUSE-OpenStack-Cloud-8-2021-3230,SUSE-OpenStack-Cloud-9-2021-3230,SUSE-OpenStack-Cloud-Crowbar-8-2021-3230,SUSE-OpenStack-Cloud-Crowbar-9-2021-3230,SUSE-SLE-SAP-12-SP3-2021-3230,SUSE-SLE-SAP-12-SP4-2021-3230,SUSE-SLE-SERVER-12-SP2-BCL-2021-3230,SUSE-SLE-SERVER-12-SP3-2021-3230,SUSE-SLE-SERVER-12-SP3-BCL-2021-3230,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3230,SUSE-SLE-SERVER-12-SP5-2021-3230 SKIP SUSE-RU-2021:3233-1 as SUSE-SUSE-MicroOS-5.0-2021-3233 is not security or has no CVEs. patches: SUSE-2021-3233,SUSE-SLE-Module-Basesystem-15-SP2-2021-3233,SUSE-SLE-Module-Basesystem-15-SP3-2021-3233,SUSE-SUSE-MicroOS-5.0-2021-3233 SKIP SUSE-RU-2021:3233-2 as SUSE-SUSE-MicroOS-5.1-2021-3233 is not security or has no CVEs. patches: SUSE-2021-3233,SUSE-SUSE-MicroOS-5.1-2021-3233 SKIP SUSE-RU-2021:3241-1 as SUSE-SUSE-MicroOS-5.1-2021-3241 is not security or has no CVEs. patches: SUSE-2021-3241,SUSE-SLE-Module-Basesystem-15-SP3-2021-3241,SUSE-SUSE-MicroOS-5.1-2021-3241 SKIP SUSE-RU-2021:3242-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3242 is not security or has no CVEs. patches: SUSE-2021-3242,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3242,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3242 SKIP SUSE-RU-2021:3243-1 as SUSE-SLE-Module-Public-Cloud-12-2021-3243 is not security or has no CVEs. patches: SUSE-2021-3243,SUSE-SLE-Module-Public-Cloud-12-2021-3243 SKIP SUSE-RU-2021:3245-1 as SUSE-Storage-6-2021-3245 is not security or has no CVEs. patches: SUSE-2021-3245,SUSE-SLE-Module-Containers-15-SP2-2021-3245,SUSE-SLE-Module-Containers-15-SP3-2021-3245,SUSE-SLE-Product-HPC-15-2021-3245,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3245,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3245,SUSE-SLE-Product-SLES-15-2021-3245,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3245,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3245,SUSE-SLE-Product-SLES_SAP-15-2021-3245,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3245,SUSE-SUSE-MicroOS-5.0-2021-3245,SUSE-SUSE-MicroOS-5.1-2021-3245,SUSE-Storage-6-2021-3245 SKIP SUSE-RU-2021:3247-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-3247 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3247,SUSE-2021-3247,SUSE-OpenStack-Cloud-8-2021-3247,SUSE-OpenStack-Cloud-9-2021-3247,SUSE-OpenStack-Cloud-Crowbar-8-2021-3247,SUSE-OpenStack-Cloud-Crowbar-9-2021-3247,SUSE-SLE-SAP-12-SP3-2021-3247,SUSE-SLE-SAP-12-SP4-2021-3247,SUSE-SLE-SERVER-12-SP2-BCL-2021-3247,SUSE-SLE-SERVER-12-SP3-2021-3247,SUSE-SLE-SERVER-12-SP3-BCL-2021-3247,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3247 SKIP SUSE-RU-2021:3261-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-3261 is not security or has no CVEs. patches: SUSE-2021-3261,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-3261,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-3261,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-3261 SKIP SUSE-RU-2021:3264-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3264 is not security or has no CVEs. patches: SUSE-2021-3264,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3264,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3264 SKIP SUSE-RU-2021:3265-1 as SUSE-SLE-Module-Public-Cloud-15-2021-3265 is not security or has no CVEs. patches: SUSE-2021-3265,SUSE-SLE-Module-Public-Cloud-15-2021-3265 SKIP SUSE-RU-2021:3271-1 as SUSE-SLE-Product-HA-15-SP1-2021-3271 is not security or has no CVEs. patches: SUSE-2021-3271,SUSE-SLE-Product-HA-15-SP1-2021-3271 SKIP SUSE-RU-2021:3272-1 as SUSE-SLE-SAP-12-SP5-2021-3272 is not security or has no CVEs. patches: SUSE-2021-3272,SUSE-SLE-SAP-12-SP3-2021-3272,SUSE-SLE-SAP-12-SP4-2021-3272,SUSE-SLE-SAP-12-SP5-2021-3272 SKIP SUSE-RU-2021:3273-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-3273 is not security or has no CVEs. patches: SUSE-2021-3273,SUSE-SLE-Module-SAP-Applications-15-2021-3273,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-3273 SKIP SUSE-RU-2021:3274-1 as SUSE-SUSE-MicroOS-5.1-2021-3274 is not security or has no CVEs. patches: SUSE-2021-3274,SUSE-SLE-Module-Basesystem-15-SP2-2021-3274,SUSE-SLE-Module-Basesystem-15-SP3-2021-3274,SUSE-SUSE-MicroOS-5.0-2021-3274,SUSE-SUSE-MicroOS-5.1-2021-3274 SKIP SUSE-RU-2021:3275-1 as SUSE-SLE-Product-HA-15-2021-3275 is not security or has no CVEs. patches: SUSE-2021-3275,SUSE-SLE-Product-HA-15-2021-3275 SKIP SUSE-RU-2021:3278-1 as SUSE-Storage-6-2021-3278 is not security or has no CVEs. patches: SUSE-2021-3278,SUSE-SLE-Product-HPC-15-2021-3278,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3278,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3278,SUSE-SLE-Product-SLES-15-2021-3278,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3278,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3278,SUSE-SLE-Product-SLES_SAP-15-2021-3278,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3278,SUSE-Storage-6-2021-3278 SKIP SUSE-RU-2021:3279-1 as SUSE-SLE-HA-12-SP3-2021-3279 is not security or has no CVEs. patches: SUSE-2021-3279,SUSE-SLE-HA-12-SP3-2021-3279 SKIP SUSE-RU-2021:3280-1 as SUSE-SLE-HA-12-SP4-2021-3280 is not security or has no CVEs. patches: SUSE-2021-3280,SUSE-SLE-HA-12-SP4-2021-3280 SKIP SUSE-RU-2021:3281-1 as SUSE-SLE-HA-12-SP5-2021-3281 is not security or has no CVEs. patches: SUSE-2021-3281,SUSE-SLE-HA-12-SP5-2021-3281 SKIP SUSE-RU-2021:3286-1 as SUSE-SLE-Product-HA-15-SP1-2021-3286 is not security or has no CVEs. patches: SUSE-2021-3286,SUSE-SLE-Product-HA-15-SP1-2021-3286 SKIP SUSE-RU-2021:3287-1 as SUSE-SLE-Product-HA-15-SP2-2021-3287 is not security or has no CVEs. patches: SUSE-2021-3287,SUSE-SLE-Product-HA-15-SP2-2021-3287 SKIP SUSE-RU-2021:3303-1 as SUSE-SUSE-MicroOS-5.0-2021-3303 is not security or has no CVEs. patches: SUSE-2021-3303,SUSE-SLE-Module-Basesystem-15-SP2-2021-3303,SUSE-SUSE-MicroOS-5.0-2021-3303 SKIP SUSE-RU-2021:3304-1 as SUSE-SUSE-MicroOS-5.1-2021-3304 is not security or has no CVEs. patches: SUSE-2021-3304,SUSE-SLE-Module-Basesystem-15-SP3-2021-3304,SUSE-SUSE-MicroOS-5.1-2021-3304 SKIP SUSE-RU-2021:3305-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3305 is not security or has no CVEs. patches: SUSE-2021-3305,SUSE-SLE-INSTALLER-15-SP2-2021-3305,SUSE-SLE-Module-Basesystem-15-SP2-2021-3305 SKIP SUSE-RU-2021:3306-1 as SUSE-SUSE-MicroOS-5.1-2021-3306 is not security or has no CVEs. patches: SUSE-2021-3306,SUSE-SLE-Module-Basesystem-15-SP3-2021-3306,SUSE-SUSE-MicroOS-5.1-2021-3306 SKIP SUSE-RU-2021:3307-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3307 is not security or has no CVEs. patches: SUSE-2021-3307,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3307,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3307 SKIP SUSE-RU-2021:3308-1 as SUSE-SLE-Product-SLES-15-SP2-2021-3308 is not security or has no CVEs. patches: SUSE-2021-3308,SUSE-SLE-INSTALLER-15-SP2-2021-3308,SUSE-SLE-Product-SLES-15-SP2-2021-3308 SKIP SUSE-RU-2021:3309-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3309 is not security or has no CVEs. patches: SUSE-2021-3309,SUSE-SLE-Module-Basesystem-15-SP2-2021-3309,SUSE-SLE-Module-Basesystem-15-SP3-2021-3309 SKIP SUSE-RU-2021:3310-1 as SUSE-SUSE-MicroOS-5.1-2021-3310 is not security or has no CVEs. patches: SUSE-2021-3310,SUSE-SLE-Module-Basesystem-15-SP3-2021-3310,SUSE-SUSE-MicroOS-5.1-2021-3310 SKIP SUSE-RU-2021:3311-1 as SUSE-SUSE-MicroOS-5.1-2021-3311 is not security or has no CVEs. patches: SUSE-2021-3311,SUSE-SLE-Module-Basesystem-15-SP3-2021-3311,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3311,SUSE-SUSE-MicroOS-5.1-2021-3311 SKIP SUSE-RU-2021:3312-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3312 is not security or has no CVEs. patches: SUSE-2021-3312,SUSE-SLE-INSTALLER-15-SP3-2021-3312,SUSE-SLE-Module-Basesystem-15-SP3-2021-3312 SKIP SUSE-RU-2021:3313-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-3313 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3313,SUSE-2021-3313,SUSE-OpenStack-Cloud-8-2021-3313,SUSE-OpenStack-Cloud-Crowbar-8-2021-3313,SUSE-SLE-SAP-12-SP3-2021-3313,SUSE-SLE-SERVER-12-SP2-BCL-2021-3313,SUSE-SLE-SERVER-12-SP3-2021-3313,SUSE-SLE-SERVER-12-SP3-BCL-2021-3313 SKIP SUSE-RU-2021:3314-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3314 is not security or has no CVEs. patches: SUSE-2021-3314,SUSE-SLE-Module-Basesystem-15-SP2-2021-3314,SUSE-SLE-Module-Basesystem-15-SP3-2021-3314 SKIP SUSE-RU-2021:3316-1 as SUSE-SLE-SERVER-12-SP5-2021-3316 is not security or has no CVEs. patches: SUSE-2021-3316,SUSE-SLE-SERVER-12-SP5-2021-3316 SKIP SUSE-RU-2021:3317-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-3317 is not security or has no CVEs. patches: SUSE-2021-3317,SUSE-SLE-Module-Basesystem-15-SP2-2021-3317,SUSE-SLE-Module-Legacy-15-SP3-2021-3317,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3317 SKIP SUSE-RU-2021:3318-1 as SUSE-SUSE-MicroOS-5.0-2021-3318 is not security or has no CVEs. patches: SUSE-2021-3318,SUSE-SLE-Module-Basesystem-15-SP2-2021-3318,SUSE-SUSE-MicroOS-5.0-2021-3318 SKIP SUSE-RU-2021:3319-1 as SUSE-SLE-SERVER-12-SP5-2021-3319 is not security or has no CVEs. patches: SUSE-2021-3319,SUSE-SLE-SERVER-12-SP5-2021-3319 SKIP SUSE-RU-2021:3320-1 as SUSE-SLE-SERVER-12-SP5-2021-3320 is not security or has no CVEs. patches: SUSE-2021-3320,SUSE-SLE-SERVER-12-SP5-2021-3320 SKIP SUSE-RU-2021:3321-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3321 is not security or has no CVEs. patches: SUSE-2021-3321,SUSE-SLE-INSTALLER-15-SP3-2021-3321,SUSE-SLE-Module-Basesystem-15-SP3-2021-3321 SKIP SUSE-RU-2021:3326-1 as SUSE-SLE-HA-12-SP5-2021-3326 is not security or has no CVEs. patches: SUSE-2021-3326,SUSE-SLE-HA-12-SP4-2021-3326,SUSE-SLE-HA-12-SP5-2021-3326 SKIP SUSE-RU-2021:3328-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3328 is not security or has no CVEs. patches: SUSE-2021-3328,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3328 SKIP SUSE-RU-2021:3329-1 as SUSE-SLE-SERVER-12-SP5-2021-3329 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3329,SUSE-2021-3329,SUSE-OpenStack-Cloud-8-2021-3329,SUSE-OpenStack-Cloud-9-2021-3329,SUSE-OpenStack-Cloud-Crowbar-8-2021-3329,SUSE-OpenStack-Cloud-Crowbar-9-2021-3329,SUSE-SLE-Module-Toolchain-12-2021-3329,SUSE-SLE-SAP-12-SP3-2021-3329,SUSE-SLE-SAP-12-SP4-2021-3329,SUSE-SLE-SERVER-12-SP2-BCL-2021-3329,SUSE-SLE-SERVER-12-SP3-2021-3329,SUSE-SLE-SERVER-12-SP3-BCL-2021-3329,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3329,SUSE-SLE-SERVER-12-SP5-2021-3329 SKIP SUSE-RU-2021:3330-1 as SUSE-SLE-SERVER-12-SP5-2021-3330 is not security or has no CVEs. patches: SUSE-2021-3330,SUSE-SLE-SDK-12-SP5-2021-3330,SUSE-SLE-SERVER-12-SP5-2021-3330 SKIP SUSE-RU-2021:3340-1 as SUSE-SLE-SERVER-12-SP5-2021-3340 is not security or has no CVEs. patches: SUSE-2021-3340,SUSE-SLE-SERVER-12-SP5-2021-3340 SKIP SUSE-RU-2021:3341-1 as SUSE-SLE-SERVER-12-SP5-2021-3341 is not security or has no CVEs. patches: SUSE-2021-3341,SUSE-SLE-SERVER-12-SP5-2021-3341 SKIP SUSE-RU-2021:3342-1 as SUSE-SLE-WE-12-SP5-2021-3342 is not security or has no CVEs. patches: SUSE-2021-3342,SUSE-SLE-SDK-12-SP5-2021-3342,SUSE-SLE-WE-12-SP5-2021-3342 SKIP SUSE-RU-2021:3343-1 as SUSE-SLE-Product-HA-15-SP3-2021-3343 is not security or has no CVEs. patches: SUSE-2021-3343,SUSE-SLE-Product-HA-15-SP3-2021-3343 SKIP SUSE-RU-2021:3344-1 as SUSE-SLE-Product-HA-15-SP2-2021-3344 is not security or has no CVEs. patches: SUSE-2021-3344,SUSE-SLE-Product-HA-15-SP2-2021-3344 SKIP SUSE-RU-2021:3345-1 as SUSE-SLE-Product-HA-15-SP1-2021-3345 is not security or has no CVEs. patches: SUSE-2021-3345,SUSE-SLE-Product-HA-15-SP1-2021-3345 SKIP SUSE-RU-2021:3346-1 as SUSE-SLE-Product-HA-15-2021-3346 is not security or has no CVEs. patches: SUSE-2021-3346,SUSE-SLE-Product-HA-15-2021-3346 SKIP SUSE-RU-2021:3347-1 as SUSE-SLE-SDK-12-SP5-2021-3347 is not security or has no CVEs. patches: SUSE-2021-3347,SUSE-SLE-HA-12-SP5-2021-3347,SUSE-SLE-SDK-12-SP5-2021-3347 SKIP SUSE-RU-2021:3349-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3349 is not security or has no CVEs. patches: SUSE-2021-3349,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3349,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3349,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3349,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3349 SKIP SUSE-RU-2021:3382-1 as SUSE-SUSE-MicroOS-5.1-2021-3382 is not security or has no CVEs. patches: SUSE-2021-3382,SUSE-SLE-Module-Basesystem-15-SP2-2021-3382,SUSE-SLE-Module-Basesystem-15-SP3-2021-3382,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3382,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3382,SUSE-SUSE-MicroOS-5.0-2021-3382,SUSE-SUSE-MicroOS-5.1-2021-3382 SKIP SUSE-RU-2021:3390-1 as SUSE-SUSE-MicroOS-5.1-2021-3390 is not security or has no CVEs. patches: SUSE-2021-3390,SUSE-SLE-Module-Basesystem-15-SP3-2021-3390,SUSE-SUSE-MicroOS-5.1-2021-3390 SKIP SUSE-RU-2021:3391-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3391 is not security or has no CVEs. patches: SUSE-2021-3391,SUSE-SLE-Module-Basesystem-15-SP2-2021-3391,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3391 SKIP SUSE-RU-2021:3392-1 as SUSE-Storage-6-2021-3392 is not security or has no CVEs. patches: SUSE-2021-3392,SUSE-SLE-Module-Basesystem-15-SP2-2021-3392,SUSE-SLE-Module-Basesystem-15-SP3-2021-3392,SUSE-SLE-Product-HPC-15-2021-3392,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3392,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3392,SUSE-SLE-Product-SLES-15-2021-3392,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3392,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3392,SUSE-SLE-Product-SLES_SAP-15-2021-3392,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3392,SUSE-SUSE-MicroOS-5.0-2021-3392,SUSE-SUSE-MicroOS-5.1-2021-3392,SUSE-Storage-6-2021-3392 SKIP SUSE-RU-2021:3393-1 as SUSE-SLE-HA-12-SP4-2021-3393 is not security or has no CVEs. patches: SUSE-2021-3393,SUSE-SLE-HA-12-SP4-2021-3393 SKIP SUSE-RU-2021:3394-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-3394 is not security or has no CVEs. patches: SUSE-2021-3394,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3394 SKIP SUSE-RU-2021:3395-1 as SUSE-SLE-Product-HA-15-SP3-2021-3395 is not security or has no CVEs. patches: SUSE-2021-3395,SUSE-SLE-Product-HA-15-SP3-2021-3395 SKIP SUSE-RU-2021:3396-1 as SUSE-SLE-SERVER-12-SP5-2021-3396 is not security or has no CVEs. patches: SUSE-2021-3396,SUSE-SLE-SDK-12-SP5-2021-3396,SUSE-SLE-SERVER-12-SP5-2021-3396 SKIP SUSE-RU-2021:3397-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3397 is not security or has no CVEs. patches: SUSE-2021-3397,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3397 SKIP SUSE-RU-2021:3398-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3398 is not security or has no CVEs. patches: SUSE-2021-3398,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3398,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3398 SKIP SUSE-RU-2021:3399-1 as SUSE-SUSE-MicroOS-5.1-2021-3399 is not security or has no CVEs. patches: SUSE-2021-3399,SUSE-SLE-Module-Basesystem-15-SP2-2021-3399,SUSE-SLE-Module-Basesystem-15-SP3-2021-3399,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3399,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3399,SUSE-SLE-Product-WE-15-SP2-2021-3399,SUSE-SLE-Product-WE-15-SP3-2021-3399,SUSE-SUSE-MicroOS-5.0-2021-3399,SUSE-SUSE-MicroOS-5.1-2021-3399 SKIP SUSE-RU-2021:3400-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3400 is not security or has no CVEs. patches: SUSE-2021-3400,SUSE-SLE-Module-Basesystem-15-SP2-2021-3400,SUSE-SLE-Module-Basesystem-15-SP3-2021-3400,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3400,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3400 SKIP SUSE-RU-2021:3402-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3402 is not security or has no CVEs. patches: SUSE-2021-3402,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3402 SKIP SUSE-RU-2021:3403-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3403 is not security or has no CVEs. patches: SUSE-2021-3403,SUSE-SLE-INSTALLER-15-SP2-2021-3403,SUSE-SLE-Module-Basesystem-15-SP2-2021-3403 SKIP SUSE-RU-2021:3404-1 as SUSE-Storage-6-2021-3404 is not security or has no CVEs. patches: SUSE-2021-3404,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3404,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3404,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3404,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3404,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3404,SUSE-Storage-6-2021-3404 SKIP SUSE-RU-2021:3405-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3405 is not security or has no CVEs. patches: SUSE-2021-3405,SUSE-SLE-Product-HPC-15-2021-3405,SUSE-SLE-Product-SLES-15-2021-3405,SUSE-SLE-Product-SLES_SAP-15-2021-3405 SKIP SUSE-RU-2021:3406-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3406 is not security or has no CVEs. patches: SUSE-2021-3406,SUSE-SLE-Module-Basesystem-15-SP3-2021-3406 SKIP SUSE-RU-2021:3407-1 as SUSE-SLE-Product-HA-15-SP3-2021-3407 is not security or has no CVEs. patches: SUSE-2021-3407,SUSE-SLE-Product-HA-15-SP3-2021-3407 SKIP SUSE-RU-2021:3408-1 as SUSE-SLE-Product-HA-15-SP2-2021-3408 is not security or has no CVEs. patches: SUSE-2021-3408,SUSE-SLE-Product-HA-15-SP2-2021-3408 SKIP SUSE-RU-2021:3409-1 as SUSE-SLE-Product-WE-15-SP3-2021-3409 is not security or has no CVEs. patches: SUSE-2021-3409,SUSE-SLE-Product-WE-15-SP2-2021-3409,SUSE-SLE-Product-WE-15-SP3-2021-3409 SKIP SUSE-RU-2021:3410-1 as SUSE-Storage-6-2021-3410 is not security or has no CVEs. patches: SUSE-2021-3410,SUSE-SLE-Module-Basesystem-15-SP2-2021-3410,SUSE-SLE-Module-Basesystem-15-SP3-2021-3410,SUSE-SLE-Product-HPC-15-2021-3410,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3410,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3410,SUSE-SLE-Product-SLES-15-2021-3410,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3410,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3410,SUSE-SLE-Product-SLES_SAP-15-2021-3410,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3410,SUSE-SUSE-MicroOS-5.0-2021-3410,SUSE-SUSE-MicroOS-5.1-2021-3410,SUSE-Storage-6-2021-3410 SKIP SUSE-RU-2021:3411-1 as SUSE-SUSE-MicroOS-5.1-2021-3411 is not security or has no CVEs. patches: SUSE-2021-3411,SUSE-SLE-Module-Basesystem-15-SP2-2021-3411,SUSE-SLE-Module-Basesystem-15-SP3-2021-3411,SUSE-SLE-Product-HA-15-SP2-2021-3411,SUSE-SLE-Product-HA-15-SP3-2021-3411,SUSE-SUSE-MicroOS-5.0-2021-3411,SUSE-SUSE-MicroOS-5.1-2021-3411 SKIP SUSE-RU-2021:3412-1 as SUSE-SUSE-MicroOS-5.0-2021-3412 is not security or has no CVEs. patches: SUSE-2021-3412,SUSE-SLE-Module-Basesystem-15-SP2-2021-3412,SUSE-SUSE-MicroOS-5.0-2021-3412 SKIP SUSE-RU-2021:3413-1 as SUSE-SUSE-MicroOS-5.1-2021-3413 is not security or has no CVEs. patches: SUSE-2021-3413,SUSE-SLE-Module-Basesystem-15-SP3-2021-3413,SUSE-SUSE-MicroOS-5.1-2021-3413 SKIP SUSE-RU-2021:3448-1 as SUSE-Storage-6-2021-3448 is not security or has no CVEs. patches: SUSE-2021-3448,SUSE-SLE-Module-Basesystem-15-SP2-2021-3448,SUSE-SLE-Module-Basesystem-15-SP3-2021-3448,SUSE-SLE-Product-HPC-15-2021-3448,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3448,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3448,SUSE-SLE-Product-SLES-15-2021-3448,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3448,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3448,SUSE-SLE-Product-SLES_SAP-15-2021-3448,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3448,SUSE-Storage-6-2021-3448 SKIP SUSE-RU-2021:3449-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-3449 is not security or has no CVEs. patches: SUSE-2021-3449,SUSE-SLE-SERVER-12-SP2-BCL-2021-3449 SKIP SUSE-RU-2021:3457-1 as SUSE-SLE-SERVER-12-SP5-2021-3457 is not security or has no CVEs. patches: SUSE-2021-3457,SUSE-SLE-SERVER-12-SP5-2021-3457 SKIP SUSE-RU-2021:3464-1 as SUSE-SLE-Module-Public-Cloud-12-2021-3464 is not security or has no CVEs. patches: SUSE-2021-3464,SUSE-SLE-Module-Public-Cloud-12-2021-3464 SKIP SUSE-RU-2021:3465-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3465 is not security or has no CVEs. patches: SUSE-2021-3465,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3465 SKIP SUSE-RU-2021:3470-1 as SUSE-SUSE-MicroOS-5.1-2021-3470 is not security or has no CVEs. patches: SUSE-2021-3470,SUSE-SUSE-MicroOS-5.1-2021-3470 SKIP SUSE-RU-2021:3471-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3471 is not security or has no CVEs. patches: SUSE-2021-3471,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-3471,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3471,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3471,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3471 SKIP SUSE-RU-2021:3478-1 as SUSE-SLE-SERVER-12-SP5-2021-3478 is not security or has no CVEs. patches: SUSE-2021-3478,SUSE-OpenStack-Cloud-9-2021-3478,SUSE-OpenStack-Cloud-Crowbar-9-2021-3478,SUSE-SLE-SAP-12-SP4-2021-3478,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3478,SUSE-SLE-SERVER-12-SP5-2021-3478 SKIP SUSE-RU-2021:3479-1 as SUSE-SUSE-MicroOS-5.1-2021-3479 is not security or has no CVEs. patches: SUSE-2021-3479,SUSE-SLE-Module-Basesystem-15-SP2-2021-3479,SUSE-SLE-Module-Basesystem-15-SP3-2021-3479,SUSE-SUSE-MicroOS-5.1-2021-3479 SKIP SUSE-RU-2021:3480-1 as SUSE-SUSE-MicroOS-5.1-2021-3480 is not security or has no CVEs. patches: SUSE-2021-3480,SUSE-SLE-Module-Basesystem-15-SP2-2021-3480,SUSE-SLE-Module-Basesystem-15-SP3-2021-3480,SUSE-SUSE-MicroOS-5.0-2021-3480,SUSE-SUSE-MicroOS-5.1-2021-3480 SKIP SUSE-RU-2021:3494-1 as SUSE-Storage-6-2021-3494 is not security or has no CVEs. patches: SUSE-2021-3494,SUSE-SLE-Module-Basesystem-15-SP2-2021-3494,SUSE-SLE-Module-Basesystem-15-SP3-2021-3494,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3494,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3494,SUSE-SLE-Product-HPC-15-2021-3494,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3494,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3494,SUSE-SLE-Product-SLES-15-2021-3494,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3494,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3494,SUSE-SLE-Product-SLES_SAP-15-2021-3494,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3494,SUSE-SUSE-MicroOS-5.0-2021-3494,SUSE-SUSE-MicroOS-5.1-2021-3494,SUSE-Storage-6-2021-3494 SKIP SUSE-RU-2021:3495-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3495 is not security or has no CVEs. patches: SUSE-2021-3495,SUSE-SLE-Module-Basesystem-15-SP3-2021-3495 SKIP SUSE-RU-2021:3496-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3496 is not security or has no CVEs. patches: SUSE-2021-3496,SUSE-SLE-Module-Basesystem-15-SP2-2021-3496,SUSE-SLE-Module-Basesystem-15-SP3-2021-3496 SKIP SUSE-RU-2021:3497-1 as SUSE-Storage-6-2021-3497 is not security or has no CVEs. patches: SUSE-2021-3497,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3497,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3497,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3497,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3497,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3497,SUSE-Storage-6-2021-3497 SKIP SUSE-RU-2021:3498-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3498 is not security or has no CVEs. patches: SUSE-2021-3498,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3498,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3498 SKIP SUSE-RU-2021:3500-1 as SUSE-SUSE-MicroOS-5.1-2021-3500 is not security or has no CVEs. patches: SUSE-2021-3500,SUSE-SLE-Module-Basesystem-15-SP3-2021-3500,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3500,SUSE-SUSE-MicroOS-5.1-2021-3500 SKIP SUSE-RU-2021:3501-1 as SUSE-SUSE-MicroOS-5.1-2021-3501 is not security or has no CVEs. patches: SUSE-2021-3501,SUSE-SLE-INSTALLER-15-SP2-2021-3501,SUSE-SLE-Module-Basesystem-15-SP2-2021-3501,SUSE-SLE-Module-Basesystem-15-SP3-2021-3501,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3501,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3501,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3501,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3501,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3501,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3501,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3501,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3501,SUSE-SUSE-MicroOS-5.0-2021-3501,SUSE-SUSE-MicroOS-5.1-2021-3501 SKIP SUSE-RU-2021:3503-1 as SUSE-SLE-SERVER-12-SP5-2021-3503 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3503,SUSE-2021-3503,SUSE-OpenStack-Cloud-8-2021-3503,SUSE-OpenStack-Cloud-9-2021-3503,SUSE-OpenStack-Cloud-Crowbar-8-2021-3503,SUSE-OpenStack-Cloud-Crowbar-9-2021-3503,SUSE-SLE-SAP-12-SP3-2021-3503,SUSE-SLE-SAP-12-SP4-2021-3503,SUSE-SLE-SDK-12-SP5-2021-3503,SUSE-SLE-SERVER-12-SP3-2021-3503,SUSE-SLE-SERVER-12-SP3-BCL-2021-3503,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3503,SUSE-SLE-SERVER-12-SP5-2021-3503 SKIP SUSE-RU-2021:3504-1 as SUSE-SLE-SERVER-12-SP5-2021-3504 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3504,SUSE-2021-3504,SUSE-OpenStack-Cloud-8-2021-3504,SUSE-OpenStack-Cloud-9-2021-3504,SUSE-OpenStack-Cloud-Crowbar-8-2021-3504,SUSE-OpenStack-Cloud-Crowbar-9-2021-3504,SUSE-SLE-SAP-12-SP3-2021-3504,SUSE-SLE-SAP-12-SP4-2021-3504,SUSE-SLE-SDK-12-SP5-2021-3504,SUSE-SLE-SERVER-12-SP2-BCL-2021-3504,SUSE-SLE-SERVER-12-SP3-2021-3504,SUSE-SLE-SERVER-12-SP3-BCL-2021-3504,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3504,SUSE-SLE-SERVER-12-SP5-2021-3504 SKIP SUSE-RU-2021:3509-1 as SUSE-SUSE-MicroOS-5.1-2021-3509 is not security or has no CVEs. patches: SUSE-2021-3509,SUSE-SLE-Module-Basesystem-15-SP3-2021-3509,SUSE-SUSE-MicroOS-5.1-2021-3509 SKIP SUSE-RU-2021:3510-1 as SUSE-Storage-6-2021-3510 is not security or has no CVEs. patches: SUSE-2021-3510,SUSE-SLE-Module-Basesystem-15-SP2-2021-3510,SUSE-SLE-Module-Basesystem-15-SP3-2021-3510,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3510,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3510,SUSE-SLE-Product-HPC-15-2021-3510,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3510,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3510,SUSE-SLE-Product-SLES-15-2021-3510,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3510,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3510,SUSE-SLE-Product-SLES_SAP-15-2021-3510,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3510,SUSE-SUSE-MicroOS-5.0-2021-3510,SUSE-SUSE-MicroOS-5.1-2021-3510,SUSE-Storage-6-2021-3510 SKIP SUSE-RU-2021:3511-1 as SUSE-SLE-HA-12-SP3-2021-3511 is not security or has no CVEs. patches: SUSE-2021-3511,SUSE-SLE-HA-12-SP3-2021-3511 SKIP SUSE-RU-2021:3512-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3512 is not security or has no CVEs. patches: SUSE-2021-3512,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3512,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3512 SKIP SUSE-RU-2021:3513-1 as SUSE-SLE-SERVER-12-SP5-2021-3513 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3513,SUSE-2021-3513,SUSE-OpenStack-Cloud-8-2021-3513,SUSE-OpenStack-Cloud-9-2021-3513,SUSE-OpenStack-Cloud-Crowbar-8-2021-3513,SUSE-OpenStack-Cloud-Crowbar-9-2021-3513,SUSE-SLE-SAP-12-SP3-2021-3513,SUSE-SLE-SAP-12-SP4-2021-3513,SUSE-SLE-SDK-12-SP5-2021-3513,SUSE-SLE-SERVER-12-SP2-BCL-2021-3513,SUSE-SLE-SERVER-12-SP3-2021-3513,SUSE-SLE-SERVER-12-SP3-BCL-2021-3513,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3513,SUSE-SLE-SERVER-12-SP5-2021-3513 SKIP SUSE-RU-2021:3514-1 as SUSE-Storage-6-2021-3514 is not security or has no CVEs. patches: SUSE-2021-3514,SUSE-SLE-Product-HPC-15-2021-3514,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3514,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3514,SUSE-SLE-Product-SLES-15-2021-3514,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3514,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3514,SUSE-SLE-Product-SLES_SAP-15-2021-3514,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3514,SUSE-Storage-6-2021-3514 SKIP SUSE-RU-2021:3515-1 as SUSE-SUSE-MicroOS-5.0-2021-3515 is not security or has no CVEs. patches: SUSE-2021-3515,SUSE-SLE-Module-Basesystem-15-SP2-2021-3515,SUSE-SUSE-MicroOS-5.0-2021-3515 SKIP SUSE-RU-2021:3516-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3516 is not security or has no CVEs. patches: SUSE-2021-3516,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-3516,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3516,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3516 SKIP SUSE-RU-2021:3517-1 as SUSE-SLE-SERVER-12-SP5-2021-3517 is not security or has no CVEs. patches: SUSE-2021-3517,SUSE-SLE-SERVER-12-SP5-2021-3517 SKIP SUSE-RU-2021:3518-1 as SUSE-SLE-WE-12-SP5-2021-3518 is not security or has no CVEs. patches: SUSE-2021-3518,SUSE-OpenStack-Cloud-9-2021-3518,SUSE-OpenStack-Cloud-Crowbar-9-2021-3518,SUSE-SLE-SAP-12-SP4-2021-3518,SUSE-SLE-SDK-12-SP5-2021-3518,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3518,SUSE-SLE-SERVER-12-SP5-2021-3518,SUSE-SLE-WE-12-SP5-2021-3518 SKIP SUSE-RU-2021:3526-1 as SUSE-SLE-SERVER-12-SP5-2021-3526 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3526,SUSE-2021-3526,SUSE-OpenStack-Cloud-8-2021-3526,SUSE-OpenStack-Cloud-9-2021-3526,SUSE-OpenStack-Cloud-Crowbar-8-2021-3526,SUSE-OpenStack-Cloud-Crowbar-9-2021-3526,SUSE-SLE-SAP-12-SP3-2021-3526,SUSE-SLE-SAP-12-SP4-2021-3526,SUSE-SLE-SERVER-12-SP3-2021-3526,SUSE-SLE-SERVER-12-SP3-BCL-2021-3526,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3526,SUSE-SLE-SERVER-12-SP5-2021-3526 SKIP SUSE-RU-2021:3532-1 as SUSE-SUSE-MicroOS-5.1-2021-3532 is not security or has no CVEs. patches: SUSE-2021-3532,SUSE-SLE-Module-Basesystem-15-SP3-2021-3532,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3532,SUSE-SUSE-MicroOS-5.1-2021-3532 SKIP SUSE-RU-2021:3533-1 as SUSE-SLE-SERVER-12-SP5-2021-3533 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3533,SUSE-2021-3533,SUSE-OpenStack-Cloud-8-2021-3533,SUSE-OpenStack-Cloud-9-2021-3533,SUSE-OpenStack-Cloud-Crowbar-8-2021-3533,SUSE-OpenStack-Cloud-Crowbar-9-2021-3533,SUSE-SLE-Module-Public-Cloud-12-2021-3533,SUSE-SLE-SAP-12-SP3-2021-3533,SUSE-SLE-SAP-12-SP4-2021-3533,SUSE-SLE-SERVER-12-SP2-BCL-2021-3533,SUSE-SLE-SERVER-12-SP3-2021-3533,SUSE-SLE-SERVER-12-SP3-BCL-2021-3533,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3533,SUSE-SLE-SERVER-12-SP5-2021-3533 SKIP SUSE-RU-2021:3534-1 as SUSE-SLE-Product-HA-15-SP3-2021-3534 is not security or has no CVEs. patches: SUSE-2021-3534,SUSE-SLE-Product-HA-15-SP3-2021-3534 SKIP SUSE-RU-2021:3535-1 as SUSE-SUSE-MicroOS-5.0-2021-3535 is not security or has no CVEs. patches: SUSE-2021-3535,SUSE-SLE-Module-Basesystem-15-SP2-2021-3535,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3535,SUSE-SUSE-MicroOS-5.0-2021-3535 SKIP SUSE-RU-2021:3536-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3536 is not security or has no CVEs. patches: SUSE-2021-3536,SUSE-SLE-Module-Basesystem-15-SP3-2021-3536 SKIP SUSE-RU-2021:3537-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3537 is not security or has no CVEs. patches: SUSE-2021-3537,SUSE-SLE-Module-Basesystem-15-SP2-2021-3537 SKIP SUSE-RU-2021:3538-1 as SUSE-SUSE-MicroOS-5.1-2021-3538 is not security or has no CVEs. patches: SUSE-2021-3538,SUSE-SLE-Module-Basesystem-15-SP2-2021-3538,SUSE-SLE-Module-Basesystem-15-SP3-2021-3538,SUSE-SUSE-MicroOS-5.0-2021-3538,SUSE-SUSE-MicroOS-5.1-2021-3538 SKIP SUSE-RU-2021:3541-1 as SUSE-SUSE-MicroOS-5.1-2021-3541 is not security or has no CVEs. patches: SUSE-2021-3541,SUSE-SUSE-MicroOS-5.1-2021-3541 SKIP SUSE-RU-2021:3542-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3542 is not security or has no CVEs. patches: SUSE-2021-3542,SUSE-SLE-Module-Basesystem-15-SP2-2021-3542,SUSE-SLE-Module-Basesystem-15-SP3-2021-3542 SKIP SUSE-RU-2021:3543-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3543 is not security or has no CVEs. patches: SUSE-2021-3543,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3543 SKIP SUSE-RU-2021:3544-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3544 is not security or has no CVEs. patches: SUSE-2021-3544,SUSE-SLE-INSTALLER-15-SP2-2021-3544,SUSE-SLE-Module-Basesystem-15-SP2-2021-3544 SKIP SUSE-RU-2021:3545-1 as SUSE-SUSE-MicroOS-5.1-2021-3545 is not security or has no CVEs. patches: SUSE-2021-3545,SUSE-SLE-Module-Basesystem-15-SP2-2021-3545,SUSE-SLE-Module-Basesystem-15-SP3-2021-3545,SUSE-SUSE-MicroOS-5.0-2021-3545,SUSE-SUSE-MicroOS-5.1-2021-3545 SKIP SUSE-RU-2021:3552-1 as SUSE-SLE-Manager-Tools-12-2021-3552 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3552,SUSE-2021-3552,SUSE-OpenStack-Cloud-8-2021-3552,SUSE-OpenStack-Cloud-9-2021-3552,SUSE-SLE-Manager-Tools-12-2021-3552 SKIP SUSE-RU-2021:3558-1 as SUSE-SLE-Manager-Tools-15-2021-3558 is not security or has no CVEs. patches: SUSE-2021-3558,SUSE-SLE-Manager-Tools-15-2021-3558 SKIP SUSE-RU-2021:3561-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3561 is not security or has no CVEs. patches: SUSE-2021-3561,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3561 SKIP SUSE-RU-2021:3563-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3563 is not security or has no CVEs. patches: SUSE-2021-3563,SUSE-SLE-INSTALLER-15-SP2-2021-3563,SUSE-SLE-Module-Basesystem-15-SP2-2021-3563 SKIP SUSE-RU-2021:3564-1 as SUSE-SUSE-MicroOS-5.1-2021-3564 is not security or has no CVEs. patches: SUSE-2021-3564,SUSE-SLE-Module-Basesystem-15-SP3-2021-3564,SUSE-SUSE-MicroOS-5.1-2021-3564 SKIP SUSE-RU-2021:3565-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2021-3565 is not security or has no CVEs. patches: SUSE-2021-3565,SUSE-SLE-Module-Public-Cloud-12-2021-3565,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2021-3565 SKIP SUSE-RU-2021:3566-1 as SUSE-SLE-SERVER-12-SP5-2021-3566 is not security or has no CVEs. patches: SUSE-2021-3566,SUSE-SLE-HA-12-SP5-2021-3566,SUSE-SLE-SDK-12-SP5-2021-3566,SUSE-SLE-SERVER-12-SP5-2021-3566 SKIP SUSE-RU-2021:3567-1 as SUSE-SUSE-MicroOS-5.0-2021-3567 is not security or has no CVEs. patches: SUSE-2021-3567,SUSE-SLE-Module-Basesystem-15-SP2-2021-3567,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3567,SUSE-SUSE-MicroOS-5.0-2021-3567 SKIP SUSE-RU-2021:3568-1 as SUSE-SLE-Product-HA-15-SP3-2021-3568 is not security or has no CVEs. patches: SUSE-2021-3568,SUSE-SLE-Product-HA-15-SP2-2021-3568,SUSE-SLE-Product-HA-15-SP3-2021-3568 SKIP SUSE-RU-2021:3569-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3569 is not security or has no CVEs. patches: SUSE-2021-3569,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3569 SKIP SUSE-RU-2021:3570-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3570 is not security or has no CVEs. patches: SUSE-2021-3570,SUSE-SLE-INSTALLER-15-SP3-2021-3570,SUSE-SLE-Module-Basesystem-15-SP3-2021-3570 SKIP SUSE-RU-2021:3571-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3571 is not security or has no CVEs. patches: SUSE-2021-3571,SUSE-SLE-Module-Basesystem-15-SP3-2021-3571,SUSE-SLE-Module-Legacy-15-SP3-2021-3571,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3571 SKIP SUSE-RU-2021:3572-1 as SUSE-SLE-SERVER-12-SP5-2021-3572 is not security or has no CVEs. patches: SUSE-2021-3572,SUSE-SLE-SDK-12-SP5-2021-3572,SUSE-SLE-SERVER-12-SP5-2021-3572 SKIP SUSE-RU-2021:3573-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3573 is not security or has no CVEs. patches: SUSE-2021-3573,SUSE-SLE-Module-Basesystem-15-SP3-2021-3573 SKIP SUSE-RU-2021:3574-1 as SUSE-Storage-6-2021-3574 is not security or has no CVEs. patches: SUSE-2021-3574,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3574,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3574,SUSE-SLE-Product-HPC-15-2021-3574,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3574,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3574,SUSE-SLE-Product-SLES-15-2021-3574,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3574,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3574,SUSE-SLE-Product-SLES_SAP-15-2021-3574,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3574,SUSE-Storage-6-2021-3574 SKIP SUSE-RU-2021:3576-1 as SUSE-Storage-6-2021-3576 is not security or has no CVEs. patches: SUSE-2021-3576,SUSE-SLE-INSTALLER-15-SP1-2021-3576,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3576,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3576,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3576,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3576,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3576,SUSE-Storage-6-2021-3576 SKIP SUSE-RU-2021:3577-1 as SUSE-SLE-Module-CAP-Tools-15-SP2-2021-3577 is not security or has no CVEs. patches: SUSE-2021-3577,SUSE-SLE-Module-CAP-Tools-15-SP2-2021-3577 SKIP SUSE-RU-2021:3578-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3578 is not security or has no CVEs. patches: SUSE-2021-3578,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3578,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3578 SKIP SUSE-RU-2021:3579-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2021-3579 is not security or has no CVEs. patches: SUSE-2021-3579,SUSE-SLE-Module-Public-Cloud-15-2021-3579,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-3579,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3579,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3579,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2021-3579 SKIP SUSE-RU-2021:3580-1 as SUSE-SLE-SERVER-12-SP5-2021-3580 is not security or has no CVEs. patches: SUSE-2021-3580,SUSE-SLE-SERVER-12-SP5-2021-3580 SKIP SUSE-RU-2021:3581-1 as SUSE-SUSE-MicroOS-5.0-2021-3581 is not security or has no CVEs. patches: SUSE-2021-3581,SUSE-SLE-Module-Basesystem-15-SP2-2021-3581,SUSE-SLE-Module-Basesystem-15-SP3-2021-3581,SUSE-SUSE-MicroOS-5.0-2021-3581 SKIP SUSE-RU-2021:3587-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3587 is not security or has no CVEs. patches: SUSE-2021-3587,SUSE-SLE-INSTALLER-15-SP3-2021-3587,SUSE-SLE-Module-Basesystem-15-SP3-2021-3587 SKIP SUSE-RU-2021:3588-1 as SUSE-SLE-Product-WE-15-SP2-2021-3588 is not security or has no CVEs. patches: SUSE-2021-3588,SUSE-SLE-Product-WE-15-SP2-2021-3588 SKIP SUSE-RU-2021:3589-1 as SUSE-SUSE-MicroOS-5.1-2021-3589 is not security or has no CVEs. patches: SUSE-2021-3589,SUSE-SLE-Module-Basesystem-15-SP3-2021-3589,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3589,SUSE-SUSE-MicroOS-5.1-2021-3589 SKIP SUSE-RU-2021:3590-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3590 is not security or has no CVEs. patches: SUSE-2021-3590,SUSE-SLE-Module-Basesystem-15-SP3-2021-3590,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3590,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3590 SKIP SUSE-RU-2021:3591-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3591 is not security or has no CVEs. patches: SUSE-2021-3591,SUSE-SLE-Module-Basesystem-15-SP3-2021-3591 SKIP SUSE-RU-2021:3594-1 as SUSE-SLE-WE-12-SP5-2021-3594 is not security or has no CVEs. patches: SUSE-2021-3594,SUSE-SLE-SERVER-12-SP5-2021-3594,SUSE-SLE-WE-12-SP5-2021-3594 SKIP SUSE-RU-2021:3595-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3595 is not security or has no CVEs. patches: SUSE-2021-3595,SUSE-SLE-Module-Basesystem-15-SP3-2021-3595 SKIP SUSE-RU-2021:3596-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3596 is not security or has no CVEs. patches: SUSE-2021-3596,SUSE-SLE-Module-Basesystem-15-SP2-2021-3596,SUSE-SLE-Module-Basesystem-15-SP3-2021-3596 SKIP SUSE-RU-2021:3598-1 as SUSE-SLE-SERVER-12-SP5-2021-3598 is not security or has no CVEs. patches: SUSE-2021-3598,SUSE-SLE-SDK-12-SP5-2021-3598,SUSE-SLE-SERVER-12-SP5-2021-3598 SKIP SUSE-RU-2021:3599-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3599 is not security or has no CVEs. patches: SUSE-2021-3599,SUSE-SLE-Module-Basesystem-15-SP2-2021-3599,SUSE-SLE-Module-Basesystem-15-SP3-2021-3599,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3599,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3599,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3599,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3599 SKIP SUSE-RU-2021:3600-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3600 is not security or has no CVEs. patches: SUSE-2021-3600,SUSE-SLE-Module-Basesystem-15-SP3-2021-3600,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3600,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3600 SKIP SUSE-RU-2021:3601-1 as SUSE-SLE-Module-Legacy-15-SP2-2021-3601 is not security or has no CVEs. patches: SUSE-2021-3601,SUSE-SLE-Module-Legacy-15-SP2-2021-3601 SKIP SUSE-RU-2021:3606-1 as SUSE-SLE-Product-SLES-15-SP3-2021-3606 is not security or has no CVEs. patches: SUSE-2021-3606,SUSE-SLE-INSTALLER-15-SP3-2021-3606,SUSE-SLE-Product-SLES-15-SP3-2021-3606 SKIP SUSE-RU-2021:3607-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-3607 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3607,SUSE-2021-3607,SUSE-OpenStack-Cloud-8-2021-3607,SUSE-OpenStack-Cloud-9-2021-3607,SUSE-OpenStack-Cloud-Crowbar-8-2021-3607,SUSE-OpenStack-Cloud-Crowbar-9-2021-3607,SUSE-SLE-SAP-12-SP3-2021-3607,SUSE-SLE-SAP-12-SP4-2021-3607,SUSE-SLE-SERVER-12-SP3-2021-3607,SUSE-SLE-SERVER-12-SP3-BCL-2021-3607,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3607 SKIP SUSE-RU-2021:3608-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-3608 is not security or has no CVEs. patches: SUSE-2021-3608,SUSE-SLE-SERVER-12-SP2-BCL-2021-3608 SKIP SUSE-RU-2021:3609-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3609 is not security or has no CVEs. patches: SUSE-2021-3609,SUSE-SLE-INSTALLER-15-SP3-2021-3609,SUSE-SLE-Module-Basesystem-15-SP3-2021-3609 SKIP SUSE-RU-2021:3610-1 as SUSE-SLE-Module-HPC-15-SP2-2021-3610 is not security or has no CVEs. patches: SUSE-2021-3610,SUSE-SLE-Module-HPC-15-SP2-2021-3610 SKIP SUSE-RU-2021:3617-1 as SUSE-SLE-Product-HA-15-SP2-2021-3617 is not security or has no CVEs. patches: SUSE-2021-3617,SUSE-SLE-Module-Basesystem-15-SP2-2021-3617,SUSE-SLE-Module-Python2-15-SP2-2021-3617,SUSE-SLE-Product-HA-15-SP2-2021-3617 SKIP SUSE-RU-2021:3621-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3621 is not security or has no CVEs. patches: SUSE-2021-3621,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3621 SKIP SUSE-RU-2021:3622-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-3622 is not security or has no CVEs. patches: SUSE-2021-3622,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-3622,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-3622,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-3622 SKIP SUSE-RU-2021:3625-1 as SUSE-Storage-6-2021-3625 is not security or has no CVEs. patches: SUSE-2021-3625,SUSE-Storage-6-2021-3625 SKIP SUSE-RU-2021:3626-1 as SUSE-Storage-6-2021-3626 is not security or has no CVEs. patches: SUSE-2021-3626,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3626,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3626,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3626,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3626,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3626,SUSE-Storage-6-2021-3626 SKIP SUSE-RU-2021:3627-1 as SUSE-SLE-Product-WE-15-SP2-2021-3627 is not security or has no CVEs. patches: SUSE-2021-3627,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3627,SUSE-SLE-Product-WE-15-SP2-2021-3627 SKIP SUSE-RU-2021:3629-1 as SUSE-SLE-Module-Public-Cloud-12-2021-3629 is not security or has no CVEs. patches: SUSE-2021-3629,SUSE-SLE-Module-Public-Cloud-12-2021-3629 SKIP SUSE-RU-2021:3636-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3636 is not security or has no CVEs. patches: SUSE-2021-3636,SUSE-SLE-Product-HPC-15-2021-3636,SUSE-SLE-Product-SLES-15-2021-3636,SUSE-SLE-Product-SLES_SAP-15-2021-3636 SKIP SUSE-RU-2021:3638-1 as SUSE-SLE-Product-HA-15-SP3-2021-3638 is not security or has no CVEs. patches: SUSE-2021-3638,SUSE-SLE-Module-Basesystem-15-SP3-2021-3638,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3638,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3638,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-3638,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3638,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3638,SUSE-SLE-Module-Python2-15-SP3-2021-3638,SUSE-SLE-Product-HA-15-SP3-2021-3638 SKIP SUSE-RU-2021:3644-1 as SUSE-SUSE-MicroOS-5.1-2021-3644 is not security or has no CVEs. patches: SUSE-2021-3644,SUSE-SUSE-MicroOS-5.1-2021-3644 SKIP SUSE-RU-2021:3645-1 as SUSE-SLE-Product-HA-15-SP1-2021-3645 is not security or has no CVEs. patches: SUSE-2021-3645,SUSE-SLE-Product-HA-15-SP1-2021-3645 SKIP SUSE-RU-2021:3646-1 as SUSE-SLE-Product-HA-15-2021-3646 is not security or has no CVEs. patches: SUSE-2021-3646,SUSE-SLE-Product-HA-15-2021-3646 SKIP SUSE-RU-2021:3654-1 as SUSE-SLE-SDK-12-SP5-2021-3654 is not security or has no CVEs. patches: SUSE-2021-3654,SUSE-SLE-SDK-12-SP5-2021-3654 SKIP SUSE-RU-2021:3656-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3656 is not security or has no CVEs. patches: SUSE-2021-3656,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3656 SKIP SUSE-RU-2021:3659-1 as SUSE-SLE-Product-WE-15-SP3-2021-3659 is not security or has no CVEs. patches: SUSE-2021-3659,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3659,SUSE-SLE-Product-WE-15-SP3-2021-3659 SKIP SUSE-RU-2021:3660-1 as SUSE-SLE-SERVER-12-SP5-2021-3660 is not security or has no CVEs. patches: SUSE-2021-3660,SUSE-SLE-Manager-Tools-12-2021-3660,SUSE-SLE-SERVER-12-SP5-2021-3660 SKIP SUSE-RU-2021:3661-1 as SUSE-SLE-SERVER-12-SP5-2021-3661 is not security or has no CVEs. patches: SUSE-2021-3661,SUSE-SLE-SERVER-12-SP5-2021-3661 SKIP SUSE-RU-2021:3663-1 as SUSE-SUSE-MicroOS-5.1-2021-3663 is not security or has no CVEs. patches: SUSE-2021-3663,SUSE-SLE-Module-Basesystem-15-SP3-2021-3663,SUSE-SUSE-MicroOS-5.1-2021-3663 SKIP SUSE-RU-2021:3664-1 as SUSE-SLE-SERVER-12-SP5-2021-3664 is not security or has no CVEs. patches: SUSE-2021-3664,SUSE-SLE-SDK-12-SP5-2021-3664,SUSE-SLE-SERVER-12-SP5-2021-3664 SKIP SUSE-RU-2021:3666-1 as SUSE-SLE-Module-Public-Cloud-12-2021-3666 is not security or has no CVEs. patches: SUSE-2021-3666,SUSE-SLE-Module-Public-Cloud-12-2021-3666 SKIP SUSE-RU-2021:3724-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3724 is not security or has no CVEs. patches: SUSE-2021-3724,SUSE-SLE-Module-Basesystem-15-SP3-2021-3724 SKIP SUSE-RU-2021:3730-1 as SUSE-SLE-Module-Public-Cloud-12-2021-3730 is not security or has no CVEs. patches: SUSE-2021-3730,SUSE-SLE-Module-Public-Cloud-12-2021-3730 SKIP SUSE-RU-2021:3731-1 as SUSE-SLE-Module-HPC-15-SP3-2021-3731 is not security or has no CVEs. patches: SUSE-2021-3731,SUSE-SLE-Module-HPC-15-SP3-2021-3731 SKIP SUSE-RU-2021:3732-1 as SUSE-SLE-SERVER-12-SP5-2021-3732 is not security or has no CVEs. patches: SUSE-2021-3732,SUSE-SLE-SDK-12-SP5-2021-3732,SUSE-SLE-SERVER-12-SP5-2021-3732 SKIP SUSE-RU-2021:3756-1 as SUSE-SLE-SDK-12-SP5-2021-3756 is not security or has no CVEs. patches: SUSE-2021-3756,SUSE-SLE-HA-12-SP3-2021-3756,SUSE-SLE-HA-12-SP4-2021-3756,SUSE-SLE-HA-12-SP5-2021-3756,SUSE-SLE-SDK-12-SP5-2021-3756 SKIP SUSE-RU-2021:3765-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3765 is not security or has no CVEs. patches: SUSE-2021-3765,SUSE-SLE-Product-HPC-15-2021-3765,SUSE-SLE-Product-SLES-15-2021-3765,SUSE-SLE-Product-SLES_SAP-15-2021-3765 SKIP SUSE-RU-2021:3766-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3766 is not security or has no CVEs. patches: SUSE-2021-3766,SUSE-SLE-Module-Basesystem-15-SP3-2021-3766,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3766 SKIP SUSE-RU-2021:3767-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3767 is not security or has no CVEs. patches: SUSE-2021-3767,SUSE-SLE-Module-Basesystem-15-SP3-2021-3767,SUSE-SLE-Module-Legacy-15-SP3-2021-3767,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3767 SKIP SUSE-RU-2021:3774-1 as SUSE-SLE-Product-HA-15-SP3-2021-3774 is not security or has no CVEs. patches: SUSE-2021-3774,SUSE-SLE-Product-HA-15-SP3-2021-3774 SKIP SUSE-RU-2021:3775-1 as SUSE-SLE-Product-HA-15-SP2-2021-3775 is not security or has no CVEs. patches: SUSE-2021-3775,SUSE-SLE-Product-HA-15-SP2-2021-3775 SKIP SUSE-RU-2021:3776-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3776 is not security or has no CVEs. patches: SUSE-2021-3776,SUSE-SLE-INSTALLER-15-SP2-2021-3776,SUSE-SLE-Module-Basesystem-15-SP2-2021-3776 SKIP SUSE-RU-2021:3777-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3777 is not security or has no CVEs. patches: SUSE-2021-3777,SUSE-SLE-Product-HPC-15-2021-3777,SUSE-SLE-Product-SLES-15-2021-3777,SUSE-SLE-Product-SLES_SAP-15-2021-3777 SKIP SUSE-RU-2021:3778-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3778 is not security or has no CVEs. patches: SUSE-2021-3778,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3778,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3778 SKIP SUSE-RU-2021:3779-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3779 is not security or has no CVEs. patches: SUSE-2021-3779,SUSE-SLE-INSTALLER-15-SP3-2021-3779,SUSE-SLE-Module-Basesystem-15-SP3-2021-3779 SKIP SUSE-RU-2021:3780-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3780 is not security or has no CVEs. patches: SUSE-2021-3780,SUSE-SLE-INSTALLER-15-2021-3780,SUSE-SLE-Product-HPC-15-2021-3780,SUSE-SLE-Product-SLES-15-2021-3780,SUSE-SLE-Product-SLES_SAP-15-2021-3780 SKIP SUSE-RU-2021:3781-1 as SUSE-Storage-6-2021-3781 is not security or has no CVEs. patches: SUSE-2021-3781,SUSE-SLE-INSTALLER-15-SP1-2021-3781,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3781,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3781,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3781,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3781,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3781,SUSE-Storage-6-2021-3781 SKIP SUSE-RU-2021:3782-1 as SUSE-SUSE-MicroOS-5.1-2021-3782 is not security or has no CVEs. patches: SUSE-2021-3782,SUSE-SLE-Module-Basesystem-15-SP2-2021-3782,SUSE-SLE-Module-Basesystem-15-SP3-2021-3782,SUSE-SUSE-MicroOS-5.1-2021-3782 SKIP SUSE-RU-2021:3783-1 as SUSE-SLE-Module-SAP-Applications-15-2021-3783 is not security or has no CVEs. patches: SUSE-2021-3783,SUSE-SLE-Module-SAP-Applications-15-2021-3783 SKIP SUSE-RU-2021:3784-1 as SUSE-SLE-SAP-12-SP3-2021-3784 is not security or has no CVEs. patches: SUSE-2021-3784,SUSE-SLE-SAP-12-SP3-2021-3784 SKIP SUSE-RU-2021:3785-1 as SUSE-SLE-SAP-12-SP5-2021-3785 is not security or has no CVEs. patches: SUSE-2021-3785,SUSE-SLE-SAP-12-SP4-2021-3785,SUSE-SLE-SAP-12-SP5-2021-3785 SKIP SUSE-RU-2021:3786-1 as SUSE-SUSE-MicroOS-5.1-2021-3786 is not security or has no CVEs. patches: SUSE-2021-3786,SUSE-SLE-Module-Basesystem-15-SP3-2021-3786,SUSE-SUSE-MicroOS-5.1-2021-3786 SKIP SUSE-RU-2021:3787-1 as SUSE-SUSE-MicroOS-5.1-2021-3787 is not security or has no CVEs. patches: SUSE-2021-3787,SUSE-SLE-Module-Basesystem-15-SP2-2021-3787,SUSE-SLE-Module-Basesystem-15-SP3-2021-3787,SUSE-SUSE-MicroOS-5.0-2021-3787,SUSE-SUSE-MicroOS-5.1-2021-3787 SKIP SUSE-RU-2021:3788-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3788 is not security or has no CVEs. patches: SUSE-2021-3788,SUSE-SLE-INSTALLER-15-SP2-2021-3788,SUSE-SLE-Module-Basesystem-15-SP2-2021-3788,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-3788 SKIP SUSE-RU-2021:3789-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3789 is not security or has no CVEs. patches: SUSE-2021-3789,SUSE-SLE-INSTALLER-15-SP3-2021-3789,SUSE-SLE-Module-Basesystem-15-SP3-2021-3789 SKIP SUSE-RU-2021:3790-1 as SUSE-SUSE-MicroOS-5.1-2021-3790 is not security or has no CVEs. patches: SUSE-2021-3790,SUSE-SLE-Module-Basesystem-15-SP3-2021-3790,SUSE-SUSE-MicroOS-5.1-2021-3790 SKIP SUSE-RU-2021:3791-1 as SUSE-SUSE-MicroOS-5.0-2021-3791 is not security or has no CVEs. patches: SUSE-2021-3791,SUSE-SUSE-MicroOS-5.0-2021-3791 SKIP SUSE-RU-2021:3792-1 as SUSE-SUSE-MicroOS-5.1-2021-3792 is not security or has no CVEs. patches: SUSE-2021-3792,SUSE-SLE-Module-Basesystem-15-SP3-2021-3792,SUSE-SUSE-MicroOS-5.1-2021-3792 SKIP SUSE-RU-2021:3793-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3793 is not security or has no CVEs. patches: SUSE-2021-3793,SUSE-SLE-Module-Basesystem-15-SP3-2021-3793 SKIP SUSE-RU-2021:3794-1 as SUSE-Storage-6-2021-3794 is not security or has no CVEs. patches: SUSE-2021-3794,SUSE-SLE-INSTALLER-15-SP1-2021-3794,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3794,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3794,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3794,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3794,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3794,SUSE-Storage-6-2021-3794 SKIP SUSE-RU-2021:3795-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2021-3796 is not security or has no CVEs. patches: SUSE-2021-3795,SUSE-SLE-Live-Patching-12-2021-3795,SUSE-SLE-Live-Patching-12-SP3-2021-3795,SUSE-SLE-Live-Patching-12-SP4-2021-3795,SUSE-SLE-Live-Patching-12-SP5-2021-3795,SUSE-SLE-Module-Live-Patching-15-2021-3796,SUSE-SLE-Module-Live-Patching-15-SP1-2021-3796,SUSE-SLE-Module-Live-Patching-15-SP2-2021-3796,SUSE-SLE-Module-Live-Patching-15-SP3-2021-3796 SKIP SUSE-RU-2021:3798-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3798 is not security or has no CVEs. patches: SUSE-2021-3798,SUSE-SLE-Module-Basesystem-15-SP2-2021-3798,SUSE-SLE-Module-Basesystem-15-SP3-2021-3798,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3798,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3798 SKIP SUSE-RU-2021:3799-1 as SUSE-Storage-6-2021-3799 is not security or has no CVEs. patches: SUSE-2021-3799,SUSE-SLE-Module-Basesystem-15-SP2-2021-3799,SUSE-SLE-Module-Basesystem-15-SP3-2021-3799,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3799,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3799,SUSE-SLE-Product-HPC-15-2021-3799,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3799,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3799,SUSE-SLE-Product-SLES-15-2021-3799,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3799,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3799,SUSE-SLE-Product-SLES_SAP-15-2021-3799,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3799,SUSE-SUSE-MicroOS-5.0-2021-3799,SUSE-SUSE-MicroOS-5.1-2021-3799,SUSE-Storage-6-2021-3799 SKIP SUSE-RU-2021:3800-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2021-3800 is not security or has no CVEs. patches: SUSE-2021-3800,SUSE-SLE-Module-Public-Cloud-12-2021-3800,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2021-3800 SKIP SUSE-RU-2021:3801-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2021-3801 is not security or has no CVEs. patches: SUSE-2021-3801,SUSE-SLE-Module-Public-Cloud-15-2021-3801,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-3801,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3801,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3801,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2021-3801 SKIP SUSE-RU-2021:3802-1 as SUSE-SLE-Module-HPC-15-SP3-2021-3802 is not security or has no CVEs. patches: SUSE-2021-3802,SUSE-SLE-Module-HPC-15-SP3-2021-3802 SKIP SUSE-RU-2021:3808-1 as SUSE-SUSE-MicroOS-5.1-2021-3808 is not security or has no CVEs. patches: SUSE-2021-3808,SUSE-SLE-Module-Basesystem-15-SP3-2021-3808,SUSE-SUSE-MicroOS-5.1-2021-3808 SKIP SUSE-RU-2021:3809-1 as SUSE-Storage-6-2021-3809 is not security or has no CVEs. patches: SUSE-2021-3809,SUSE-SLE-INSTALLER-15-SP1-2021-3809,SUSE-SLE-Module-Basesystem-15-SP2-2021-3809,SUSE-SLE-Product-HPC-15-2021-3809,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3809,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3809,SUSE-SLE-Product-SLES-15-2021-3809,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3809,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3809,SUSE-SLE-Product-SLES_SAP-15-2021-3809,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3809,SUSE-Storage-6-2021-3809 SKIP SUSE-RU-2021:3811-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-3811 is not security or has no CVEs. patches: SUSE-2021-3811,SUSE-OpenStack-Cloud-9-2021-3811,SUSE-OpenStack-Cloud-Crowbar-9-2021-3811,SUSE-SLE-SAP-12-SP4-2021-3811,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3811 SKIP SUSE-RU-2021:3817-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3817 is not security or has no CVEs. patches: SUSE-2021-3817,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-3817,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-3817,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-3817 SKIP SUSE-RU-2021:3818-1 as SUSE-SUSE-MicroOS-5.1-2021-3818 is not security or has no CVEs. patches: SUSE-2021-3818,SUSE-SLE-Module-Basesystem-15-SP3-2021-3818,SUSE-SUSE-MicroOS-5.1-2021-3818 SKIP SUSE-RU-2021:3820-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3820 is not security or has no CVEs. patches: SUSE-2021-3820,SUSE-SLE-Product-HPC-15-2021-3820,SUSE-SLE-Product-SLES-15-2021-3820,SUSE-SLE-Product-SLES_SAP-15-2021-3820 SKIP SUSE-RU-2021:3821-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3821 is not security or has no CVEs. patches: SUSE-2021-3821,SUSE-SLE-Module-Basesystem-15-SP3-2021-3821,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3821,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3821 SKIP SUSE-RU-2021:3822-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3822 is not security or has no CVEs. patches: SUSE-2021-3822,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3822 SKIP SUSE-RU-2021:3823-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3823 is not security or has no CVEs. patches: SUSE-2021-3823,SUSE-SLE-Module-Basesystem-15-SP3-2021-3823 SKIP SUSE-RU-2021:3824-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3824 is not security or has no CVEs. patches: SUSE-2021-3824,SUSE-SLE-INSTALLER-15-SP3-2021-3824,SUSE-SLE-Module-Basesystem-15-SP3-2021-3824 SKIP SUSE-RU-2021:3825-1 as SUSE-Storage-6-2021-3825 is not security or has no CVEs. patches: SUSE-2021-3825,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3825,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3825,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3825,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3825,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3825,SUSE-Storage-6-2021-3825 SKIP SUSE-RU-2021:3826-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-3826 is not security or has no CVEs. patches: SUSE-2021-3826,SUSE-SLE-INSTALLER-15-SP2-2021-3826,SUSE-SLE-Module-Basesystem-15-SP2-2021-3826 SKIP SUSE-RU-2021:3827-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3827 is not security or has no CVEs. patches: SUSE-2021-3827,SUSE-SLE-INSTALLER-15-SP3-2021-3827,SUSE-SLE-Module-Basesystem-15-SP3-2021-3827 SKIP SUSE-RU-2021:3828-1 as SUSE-Storage-6-2021-3828 is not security or has no CVEs. patches: SUSE-2021-3828,SUSE-SLE-INSTALLER-15-SP1-2021-3828,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3828,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3828,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3828,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3828,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3828,SUSE-Storage-6-2021-3828 SKIP SUSE-RU-2021:3829-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3829 is not security or has no CVEs. patches: SUSE-2021-3829,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3829,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3829 SKIP SUSE-RU-2021:3831-1 as SUSE-SLE-Product-HA-15-SP1-2021-3831 is not security or has no CVEs. patches: SUSE-2021-3831,SUSE-SLE-Product-HA-15-SP1-2021-3831 SKIP SUSE-RU-2021:3832-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3832 is not security or has no CVEs. patches: SUSE-2021-3832,SUSE-SLE-Manager-Tools-15-2021-3832,SUSE-SLE-Module-Basesystem-15-SP2-2021-3832,SUSE-SLE-Module-Basesystem-15-SP3-2021-3832,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3832,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3832,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3832,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3832 SKIP SUSE-RU-2021:3846-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3846 is not security or has no CVEs. patches: SUSE-2021-3846,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3846,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3846 SKIP SUSE-RU-2021:3862-1 as SUSE-SUSE-MicroOS-5.1-2021-3862 is not security or has no CVEs. patches: SUSE-2021-3862,SUSE-SUSE-MicroOS-5.1-2021-3862 SKIP SUSE-RU-2021:3863-1 as SUSE-SLE-SERVER-12-SP5-2021-3863 is not security or has no CVEs. patches: SUSE-2021-3863,SUSE-SLE-SERVER-12-SP5-2021-3863 SKIP SUSE-RU-2021:3864-1 as SUSE-SUSE-MicroOS-5.1-2021-3864 is not security or has no CVEs. patches: SUSE-2021-3864,SUSE-SUSE-MicroOS-5.1-2021-3864 SKIP SUSE-RU-2021:3865-1 as SUSE-SLE-SERVER-12-SP5-2021-3865 is not security or has no CVEs. patches: SUSE-2021-3865,SUSE-SLE-SERVER-12-SP5-2021-3865 SKIP SUSE-RU-2021:3866-1 as SUSE-SUSE-MicroOS-5.1-2021-3866 is not security or has no CVEs. patches: SUSE-2021-3866,SUSE-SLE-Module-Basesystem-15-SP2-2021-3866,SUSE-SLE-Module-Basesystem-15-SP3-2021-3866,SUSE-SUSE-MicroOS-5.0-2021-3866,SUSE-SUSE-MicroOS-5.1-2021-3866 SKIP SUSE-RU-2021:3867-1 as SUSE-SLE-SERVER-12-SP5-2021-3867 is not security or has no CVEs. patches: SUSE-2021-3867,SUSE-SLE-SERVER-12-SP5-2021-3867 SKIP SUSE-RU-2021:3868-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3868 is not security or has no CVEs. patches: SUSE-2021-3868,SUSE-SLE-Module-Basesystem-15-SP2-2021-3868,SUSE-SLE-Module-Basesystem-15-SP3-2021-3868 SKIP SUSE-RU-2021:3869-1 as SUSE-Storage-6-2021-3869 is not security or has no CVEs. patches: SUSE-2021-3869,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3869,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3869,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3869,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3869,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3869,SUSE-Storage-6-2021-3869 SKIP SUSE-RU-2021:3870-1 as SUSE-SUSE-MicroOS-5.1-2021-3870 is not security or has no CVEs. patches: SUSE-2021-3870,SUSE-SLE-INSTALLER-15-SP2-2021-3870,SUSE-SLE-Module-Basesystem-15-SP2-2021-3870,SUSE-SLE-Module-Basesystem-15-SP3-2021-3870,SUSE-SUSE-MicroOS-5.0-2021-3870,SUSE-SUSE-MicroOS-5.1-2021-3870 SKIP SUSE-RU-2021:3871-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3871 is not security or has no CVEs. patches: SUSE-2021-3871,SUSE-SLE-Module-Basesystem-15-SP2-2021-3871,SUSE-SLE-Module-Basesystem-15-SP3-2021-3871 SKIP SUSE-RU-2021:3872-1 as SUSE-SUSE-MicroOS-5.1-2021-3872 is not security or has no CVEs. patches: SUSE-2021-3872,SUSE-SLE-Module-Basesystem-15-SP2-2021-3872,SUSE-SLE-Module-Basesystem-15-SP3-2021-3872,SUSE-SUSE-MicroOS-5.0-2021-3872,SUSE-SUSE-MicroOS-5.1-2021-3872 SKIP SUSE-RU-2021:3879-1 as SUSE-SLE-Module-Server-Applications-15-SP2-2021-3879 is not security or has no CVEs. patches: SUSE-2021-3879,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3879,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3879 SKIP SUSE-RU-2021:3882-1 as SUSE-SLE-SERVER-12-SP5-2021-3882 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3882,SUSE-2021-3882,SUSE-OpenStack-Cloud-8-2021-3882,SUSE-OpenStack-Cloud-9-2021-3882,SUSE-OpenStack-Cloud-Crowbar-8-2021-3882,SUSE-OpenStack-Cloud-Crowbar-9-2021-3882,SUSE-SLE-SAP-12-SP3-2021-3882,SUSE-SLE-SAP-12-SP4-2021-3882,SUSE-SLE-SERVER-12-SP2-BCL-2021-3882,SUSE-SLE-SERVER-12-SP3-2021-3882,SUSE-SLE-SERVER-12-SP3-BCL-2021-3882,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3882,SUSE-SLE-SERVER-12-SP5-2021-3882 SKIP SUSE-RU-2021:3883-1 as SUSE-Storage-6-2021-3883 is not security or has no CVEs. patches: SUSE-2021-3883,SUSE-SLE-Module-Basesystem-15-SP2-2021-3883,SUSE-SLE-Module-Basesystem-15-SP3-2021-3883,SUSE-SLE-Product-HPC-15-2021-3883,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3883,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3883,SUSE-SLE-Product-SLES-15-2021-3883,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3883,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3883,SUSE-SLE-Product-SLES_SAP-15-2021-3883,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3883,SUSE-SUSE-MicroOS-5.0-2021-3883,SUSE-SUSE-MicroOS-5.1-2021-3883,SUSE-Storage-6-2021-3883 SKIP SUSE-RU-2021:3889-1 as SUSE-SLE-SERVER-12-SP5-2021-3889 is not security or has no CVEs. patches: SUSE-2021-3889,SUSE-SLE-SERVER-12-SP5-2021-3889 SKIP SUSE-RU-2021:3890-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3890 is not security or has no CVEs. patches: SUSE-2021-3890,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3890,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3890 SKIP SUSE-RU-2021:3891-1 as SUSE-Storage-6-2021-3891 is not security or has no CVEs. patches: SUSE-2021-3891,SUSE-SLE-Module-Basesystem-15-SP2-2021-3891,SUSE-SLE-Module-Basesystem-15-SP3-2021-3891,SUSE-SLE-Product-HPC-15-2021-3891,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3891,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3891,SUSE-SLE-Product-SLES-15-2021-3891,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3891,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3891,SUSE-SLE-Product-SLES_SAP-15-2021-3891,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3891,SUSE-SUSE-MicroOS-5.0-2021-3891,SUSE-SUSE-MicroOS-5.1-2021-3891,SUSE-Storage-6-2021-3891 SKIP SUSE-RU-2021:3892-1 as SUSE-SLE-Product-HA-15-2021-3892 is not security or has no CVEs. patches: SUSE-2021-3892,SUSE-SLE-Product-HA-15-2021-3892 SKIP SUSE-RU-2021:3893-1 as SUSE-SLE-Product-HA-15-SP3-2021-3893 is not security or has no CVEs. patches: SUSE-2021-3893,SUSE-SLE-Product-HA-15-SP2-2021-3893,SUSE-SLE-Product-HA-15-SP3-2021-3893 SKIP SUSE-RU-2021:3894-1 as SUSE-SLE-SERVER-12-SP5-2021-3894 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3894,SUSE-2021-3894,SUSE-OpenStack-Cloud-8-2021-3894,SUSE-OpenStack-Cloud-9-2021-3894,SUSE-OpenStack-Cloud-Crowbar-8-2021-3894,SUSE-OpenStack-Cloud-Crowbar-9-2021-3894,SUSE-SLE-SAP-12-SP3-2021-3894,SUSE-SLE-SAP-12-SP4-2021-3894,SUSE-SLE-SDK-12-SP5-2021-3894,SUSE-SLE-SERVER-12-SP2-BCL-2021-3894,SUSE-SLE-SERVER-12-SP3-2021-3894,SUSE-SLE-SERVER-12-SP3-BCL-2021-3894,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3894,SUSE-SLE-SERVER-12-SP5-2021-3894 SKIP SUSE-RU-2021:3895-1 as SUSE-SLE-Product-SLES-15-SP2-2021-3895 is not security or has no CVEs. patches: SUSE-2021-3895,SUSE-SLE-INSTALLER-15-SP2-2021-3895,SUSE-SLE-Product-SLES-15-SP2-2021-3895 SKIP SUSE-RU-2021:3896-1 as SUSE-SLE-Product-SLES-15-SP3-2021-3896 is not security or has no CVEs. patches: SUSE-2021-3896,SUSE-SLE-INSTALLER-15-SP3-2021-3896,SUSE-SLE-Product-SLES-15-SP3-2021-3896 SKIP SUSE-RU-2021:3897-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3897 is not security or has no CVEs. patches: SUSE-2021-3897,SUSE-SLE-INSTALLER-15-2021-3897,SUSE-SLE-Product-SLES-15-2021-3897,SUSE-SLE-Product-SLES_SAP-15-2021-3897 SKIP SUSE-RU-2021:3898-1 as SUSE-Storage-6-2021-3898 is not security or has no CVEs. patches: SUSE-2021-3898,SUSE-SLE-INSTALLER-15-SP1-2021-3898,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3898,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3898,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3898,SUSE-Storage-6-2021-3898 ERROR: notice SUSE-RU-2021:3910-1 has no valid patches out of: SUSE-2021-3910,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2021-3910 SKIP SUSE-RU-2021:3913-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2021-3913 is not security or has no CVEs. patches: SUSE-2021-3913,SUSE-SLE-Manager-Tools-12-2021-3913,SUSE-SLE-Module-Adv-Systems-Management-12-2021-3913 ERROR: notice SUSE-RU-2021:3915-1 has no valid patches out of: SUSE-2021-3915,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2021-3915 SKIP SUSE-RU-2021:3916-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-3916 is not security or has no CVEs. patches: SUSE-2021-3916,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2021-3916,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2021-3916,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-3916 SKIP SUSE-RU-2021:3919-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3919 is not security or has no CVEs. patches: SUSE-2021-3919,SUSE-SLE-Product-HPC-15-2021-3919,SUSE-SLE-Product-SLES-15-2021-3919,SUSE-SLE-Product-SLES_SAP-15-2021-3919 SKIP SUSE-RU-2021:3920-1 as SUSE-Storage-6-2021-3920 is not security or has no CVEs. patches: SUSE-2021-3920,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3920,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3920,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3920,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3920,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3920,SUSE-Storage-6-2021-3920 SKIP SUSE-RU-2021:3921-1 as SUSE-SUSE-MicroOS-5.0-2021-3921 is not security or has no CVEs. patches: SUSE-2021-3921,SUSE-SLE-Module-Basesystem-15-SP2-2021-3921,SUSE-SLE-Module-Server-Applications-15-SP2-2021-3921,SUSE-SLE-Module-Transactional-Server-15-SP2-2021-3921,SUSE-SUSE-MicroOS-5.0-2021-3921 SKIP SUSE-RU-2021:3922-1 as SUSE-SUSE-MicroOS-5.1-2021-3922 is not security or has no CVEs. patches: SUSE-2021-3922,SUSE-SLE-Module-Basesystem-15-SP3-2021-3922,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3922,SUSE-SLE-Module-Transactional-Server-15-SP3-2021-3922,SUSE-SUSE-MicroOS-5.1-2021-3922 SKIP SUSE-RU-2021:3926-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3926 is not security or has no CVEs. patches: SUSE-2021-3926,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-3926,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-3926 SKIP SUSE-RU-2021:3928-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-3928 is not security or has no CVEs. patches: SUSE-2021-3928,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3928,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3928 SKIP SUSE-RU-2021:3930-1 as SUSE-Storage-6-2021-3930 is not security or has no CVEs. patches: SUSE-2021-3930,SUSE-SLE-Product-HPC-15-2021-3930,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3930,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3930,SUSE-SLE-Product-SLES-15-2021-3930,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3930,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3930,SUSE-SLE-Product-SLES_SAP-15-2021-3930,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3930,SUSE-Storage-6-2021-3930 SKIP SUSE-RU-2021:3931-1 as SUSE-SLE-SERVER-12-SP5-2021-3931 is not security or has no CVEs. patches: SUSE-2021-3931,SUSE-SLE-SDK-12-SP5-2021-3931,SUSE-SLE-SERVER-12-SP5-2021-3931 SKIP SUSE-RU-2021:3932-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-3932 is not security or has no CVEs. patches: SUSE-2021-3932,SUSE-OpenStack-Cloud-9-2021-3932,SUSE-OpenStack-Cloud-Crowbar-9-2021-3932,SUSE-SLE-SAP-12-SP4-2021-3932,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3932 SKIP SUSE-RU-2021:3936-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3936 is not security or has no CVEs. patches: SUSE-2021-3936,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3936 SKIP SUSE-RU-2021:3937-1 as SUSE-SLE-Product-SLES_SAP-15-2021-3937 is not security or has no CVEs. patches: SUSE-2021-3937,SUSE-SLE-Product-HPC-15-2021-3937,SUSE-SLE-Product-SLES-15-2021-3937,SUSE-SLE-Product-SLES_SAP-15-2021-3937 SKIP SUSE-RU-2021:3953-1 as SUSE-SUSE-MicroOS-5.1-2021-3953 is not security or has no CVEs. patches: SUSE-2021-3953,SUSE-SLE-Module-Basesystem-15-SP3-2021-3953,SUSE-SUSE-MicroOS-5.1-2021-3953 SKIP SUSE-RU-2021:3954-1 as SUSE-SUSE-MicroOS-5.0-2021-3954 is not security or has no CVEs. patches: SUSE-2021-3954,SUSE-SLE-Module-Basesystem-15-SP2-2021-3954,SUSE-SUSE-MicroOS-5.0-2021-3954 SKIP SUSE-RU-2021:3957-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3957 is not security or has no CVEs. patches: SUSE-2021-3957,SUSE-SLE-INSTALLER-15-SP3-2021-3957,SUSE-SLE-Module-Basesystem-15-SP3-2021-3957 SKIP SUSE-RU-2021:3958-1 as SUSE-SLE-SERVER-12-SP5-2021-3958 is not security or has no CVEs. patches: SUSE-2021-3958,SUSE-SLE-SERVER-12-SP5-2021-3958 SKIP SUSE-RU-2021:3959-1 as SUSE-SUSE-MicroOS-5.1-2021-3959 is not security or has no CVEs. patches: SUSE-2021-3959,SUSE-SLE-Module-Basesystem-15-SP2-2021-3959,SUSE-SLE-Module-Basesystem-15-SP3-2021-3959,SUSE-SUSE-MicroOS-5.1-2021-3959 SKIP SUSE-RU-2021:3960-1 as SUSE-SUSE-MicroOS-5.1-2021-3960 is not security or has no CVEs. patches: SUSE-2021-3960,SUSE-SUSE-MicroOS-5.1-2021-3960 SKIP SUSE-RU-2021:3961-1 as SUSE-SUSE-MicroOS-5.1-2021-3961 is not security or has no CVEs. patches: SUSE-2021-3961,SUSE-SLE-Module-Basesystem-15-SP2-2021-3961,SUSE-SLE-Module-Basesystem-15-SP3-2021-3961,SUSE-SUSE-MicroOS-5.0-2021-3961,SUSE-SUSE-MicroOS-5.1-2021-3961 SKIP SUSE-RU-2021:3962-1 as SUSE-SLE-SDK-12-SP5-2021-3962 is not security or has no CVEs. patches: SUSE-2021-3962,SUSE-SLE-HA-12-SP3-2021-3962,SUSE-SLE-HA-12-SP4-2021-3962,SUSE-SLE-HA-12-SP5-2021-3962,SUSE-SLE-SDK-12-SP5-2021-3962 SKIP SUSE-RU-2021:3963-1 as SUSE-SUSE-MicroOS-5.1-2021-3963 is not security or has no CVEs. patches: SUSE-2021-3963,SUSE-SLE-Module-Basesystem-15-SP3-2021-3963,SUSE-SLE-Module-Legacy-15-SP3-2021-3963,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-3963,SUSE-SLE-Module-Server-Applications-15-SP3-2021-3963,SUSE-SUSE-MicroOS-5.1-2021-3963 SKIP SUSE-RU-2021:3965-1 as SUSE-SLE-SERVER-12-SP5-2021-3965 is not security or has no CVEs. patches: SUSE-2021-3965,SUSE-SLE-SDK-12-SP5-2021-3965,SUSE-SLE-SERVER-12-SP5-2021-3965 SKIP SUSE-RU-2021:3965-2 as SUSE-SLE-SDK-12-SP5-2021-3965 is not security or has no CVEs. patches: SUSE-2021-3965,SUSE-SLE-SDK-12-SP5-2021-3965 SKIP SUSE-RU-2021:3966-1 as SUSE-SLE-SERVER-12-SP5-2021-3966 is not security or has no CVEs. patches: SUSE-2021-3966,SUSE-SLE-SERVER-12-SP5-2021-3966 SKIP SUSE-RU-2021:3967-1 as SUSE-SLE-SERVER-12-SP5-2021-3967 is not security or has no CVEs. patches: SUSE-2021-3967,SUSE-SLE-SDK-12-SP5-2021-3967,SUSE-SLE-SERVER-12-SP5-2021-3967 SKIP SUSE-RU-2021:3970-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2021-3970 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-3970,SUSE-2021-3970,SUSE-OpenStack-Cloud-8-2021-3970,SUSE-OpenStack-Cloud-9-2021-3970,SUSE-OpenStack-Cloud-Crowbar-8-2021-3970,SUSE-OpenStack-Cloud-Crowbar-9-2021-3970,SUSE-SLE-SAP-12-SP3-2021-3970,SUSE-SLE-SAP-12-SP4-2021-3970,SUSE-SLE-SERVER-12-SP2-BCL-2021-3970,SUSE-SLE-SERVER-12-SP3-2021-3970,SUSE-SLE-SERVER-12-SP3-BCL-2021-3970,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3970 SKIP SUSE-RU-2021:3971-1 as SUSE-SLE-Product-HA-15-SP1-2021-3971 is not security or has no CVEs. patches: SUSE-2021-3971,SUSE-SLE-Product-HA-15-SP1-2021-3971 SKIP SUSE-RU-2021:3974-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-3974 is not security or has no CVEs. patches: SUSE-2021-3974,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3974 SKIP SUSE-RU-2021:3975-1 as SUSE-Storage-6-2021-3975 is not security or has no CVEs. patches: SUSE-2021-3975,SUSE-SLE-Product-HPC-15-2021-3975,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3975,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3975,SUSE-SLE-Product-SLES-15-2021-3975,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3975,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3975,SUSE-SLE-Product-SLES_SAP-15-2021-3975,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3975,SUSE-Storage-6-2021-3975 SKIP SUSE-RU-2021:3976-1 as SUSE-SUSE-MicroOS-5.0-2021-3976 is not security or has no CVEs. patches: SUSE-2021-3976,SUSE-SUSE-MicroOS-5.0-2021-3976 SKIP SUSE-RU-2021:3980-1 as SUSE-SUSE-MicroOS-5.1-2021-3980 is not security or has no CVEs. patches: SUSE-2021-3980,SUSE-SLE-Module-Basesystem-15-SP3-2021-3980,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3980,SUSE-SUSE-MicroOS-5.1-2021-3980 SKIP SUSE-RU-2021:3981-1 as SUSE-SLE-Product-HA-15-SP3-2021-3981 is not security or has no CVEs. patches: SUSE-2021-3981,SUSE-SLE-Product-HA-15-SP1-2021-3981,SUSE-SLE-Product-HA-15-SP2-2021-3981,SUSE-SLE-Product-HA-15-SP3-2021-3981 SKIP SUSE-RU-2021:3982-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3982 is not security or has no CVEs. patches: SUSE-2021-3982,SUSE-SLE-Module-Basesystem-15-SP2-2021-3982,SUSE-SLE-Module-Basesystem-15-SP3-2021-3982,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-3982,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3982 SKIP SUSE-RU-2021:3983-1 as SUSE-SLE-Module-Development-Tools-15-SP2-2021-3983 is not security or has no CVEs. patches: SUSE-2021-3983,SUSE-SLE-INSTALLER-15-SP2-2021-3983,SUSE-SLE-Module-Basesystem-15-SP2-2021-3983,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3983 SKIP SUSE-RU-2021:3984-1 as SUSE-SLE-SERVER-12-SP5-2021-3984 is not security or has no CVEs. patches: SUSE-2021-3984,SUSE-SLE-SERVER-12-SP5-2021-3984 SKIP SUSE-RU-2021:3985-1 as SUSE-SUSE-MicroOS-5.1-2021-3985 is not security or has no CVEs. patches: SUSE-2021-3985,SUSE-SLE-Module-Basesystem-15-SP3-2021-3985,SUSE-SUSE-MicroOS-5.1-2021-3985 SKIP SUSE-RU-2021:3986-1 as SUSE-SUSE-MicroOS-5.0-2021-3986 is not security or has no CVEs. patches: SUSE-2021-3986,SUSE-SLE-Module-Basesystem-15-SP2-2021-3986,SUSE-SUSE-MicroOS-5.0-2021-3986 SKIP SUSE-RU-2021:3987-1 as SUSE-Storage-6-2021-3987 is not security or has no CVEs. patches: SUSE-2021-3987,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-3987,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-3987,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-3987,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-3987,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-3987,SUSE-Storage-6-2021-3987 SKIP SUSE-RU-2021:3988-1 as SUSE-SLE-SERVER-12-SP2-BCL-2021-3988 is not security or has no CVEs. patches: SUSE-2021-3988,SUSE-SLE-SERVER-12-SP2-BCL-2021-3988 SKIP SUSE-RU-2021:3989-1 as SUSE-SUSE-MicroOS-5.1-2021-3989 is not security or has no CVEs. patches: SUSE-2021-3989,SUSE-SUSE-MicroOS-5.1-2021-3989 SKIP SUSE-RU-2021:3990-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-3990 is not security or has no CVEs. patches: SUSE-2021-3990,SUSE-SLE-Module-Basesystem-15-SP3-2021-3990 SKIP SUSE-RU-2021:3991-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3991 is not security or has no CVEs. patches: SUSE-2021-3991,SUSE-SLE-Module-Basesystem-15-SP2-2021-3991,SUSE-SLE-Module-Basesystem-15-SP3-2021-3991,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3991,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3991 SKIP SUSE-RU-2021:3998-1 as SUSE-SLE-SERVER-12-SP5-2021-3998 is not security or has no CVEs. patches: SUSE-2021-3998,SUSE-OpenStack-Cloud-9-2021-3998,SUSE-OpenStack-Cloud-Crowbar-9-2021-3998,SUSE-SLE-SAP-12-SP4-2021-3998,SUSE-SLE-SDK-12-SP5-2021-3998,SUSE-SLE-SERVER-12-SP4-LTSS-2021-3998,SUSE-SLE-SERVER-12-SP5-2021-3998 SKIP SUSE-RU-2021:4005-1 as SUSE-SLE-SERVER-12-SP5-2021-4005 is not security or has no CVEs. patches: SUSE-2021-4005,SUSE-SLE-SERVER-12-SP5-2021-4005 SKIP SUSE-RU-2021:4006-1 as SUSE-SLE-SERVER-12-SP5-2021-4006 is not security or has no CVEs. patches: SUSE-2021-4006,SUSE-SLE-SDK-12-SP5-2021-4006,SUSE-SLE-SERVER-12-SP5-2021-4006 SKIP SUSE-RU-2021:4007-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2021-4007 is not security or has no CVEs. patches: SUSE-2021-4007,SUSE-SLE-Module-Basesystem-15-SP3-2021-4007,SUSE-SLE-Module-Development-Tools-15-SP3-2021-4007 SKIP SUSE-RU-2021:4008-1 as SUSE-SLE-SERVER-12-SP5-2021-4008 is not security or has no CVEs. patches: SUSE-2021-4008,SUSE-SLE-SERVER-12-SP5-2021-4008 SKIP SUSE-RU-2021:4009-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4009 is not security or has no CVEs. patches: SUSE-2021-4009,SUSE-SLE-Module-Basesystem-15-SP2-2021-4009,SUSE-SLE-Module-Basesystem-15-SP3-2021-4009 SKIP SUSE-RU-2021:4010-1 as SUSE-SLE-Module-Public-Cloud-12-2021-4010 is not security or has no CVEs. patches: SUSE-2021-4010,SUSE-SLE-Module-Public-Cloud-12-2021-4010 SKIP SUSE-RU-2021:4013-1 as SUSE-SUSE-MicroOS-5.0-2021-4013 is not security or has no CVEs. patches: SUSE-2021-4013,SUSE-SLE-Module-Basesystem-15-SP2-2021-4013,SUSE-SLE-Module-Server-Applications-15-SP2-2021-4013,SUSE-SUSE-MicroOS-5.0-2021-4013 SKIP SUSE-RU-2021:4014-1 as SUSE-SUSE-MicroOS-5.1-2021-4014 is not security or has no CVEs. patches: SUSE-2021-4014,SUSE-SLE-Module-Basesystem-15-SP3-2021-4014,SUSE-SLE-Module-Server-Applications-15-SP3-2021-4014,SUSE-SUSE-MicroOS-5.1-2021-4014 SKIP SUSE-RU-2021:4017-1 as SUSE-Storage-6-2021-4017 is not security or has no CVEs. patches: SUSE-2021-4017,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-4017,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-4017,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-4017,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-4017,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-4017,SUSE-Storage-6-2021-4017 ERROR: notice SUSE-RU-2021:4019-1 has no valid patches out of: SUSE-2021-4019,SUSE-SLE-Module-Containers-12-2021-4019 SKIP SUSE-RU-2021:4019-2 as SUSE-SLE-Module-Public-Cloud-12-2022-466 is not security or has no CVEs. patches: SUSE-2021-4019,SUSE-SLE-Module-Containers-12-2022-466,SUSE-SLE-Module-Public-Cloud-12-2022-466 SKIP SUSE-RU-2021:4062-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4062 is not security or has no CVEs. patches: SUSE-2021-4062,SUSE-SLE-Module-Basesystem-15-SP2-2021-4062,SUSE-SLE-Module-Basesystem-15-SP3-2021-4062 SKIP SUSE-RU-2021:4100-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-4100 is not security or has no CVEs. patches: SUSE-2021-4100,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-4100 SKIP SUSE-RU-2021:4105-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2021-4105 is not security or has no CVEs. patches: SUSE-2021-4105,SUSE-SLE-Module-SAP-Applications-15-SP3-2021-4105 SKIP SUSE-RU-2021:4106-1 as SUSE-SLE-SERVER-12-SP5-2021-4106 is not security or has no CVEs. patches: SUSE-2021-4106,SUSE-SLE-SERVER-12-SP5-2021-4106 SKIP SUSE-RU-2021:4108-1 as SUSE-SLE-SERVER-12-SP5-2021-4108 is not security or has no CVEs. patches: SUSE-2021-4108,SUSE-OpenStack-Cloud-9-2021-4108,SUSE-OpenStack-Cloud-Crowbar-9-2021-4108,SUSE-SLE-SAP-12-SP4-2021-4108,SUSE-SLE-SDK-12-SP5-2021-4108,SUSE-SLE-SERVER-12-SP4-LTSS-2021-4108,SUSE-SLE-SERVER-12-SP5-2021-4108 SKIP SUSE-RU-2021:4113-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2021-4113 is not security or has no CVEs. patches: SUSE-2021-4113,SUSE-SLE-Module-SAP-Applications-15-SP2-2021-4113 SKIP SUSE-RU-2021:4114-1 as SUSE-Storage-7-2021-4114 is not security or has no CVEs. patches: SUSE-2021-4114,SUSE-SLE-Product-SLES-15-SP2-LTSS-2021-4114,SUSE-SLE-Product-SLES_SAP-15-SP2-2021-4114,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2021-4114,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2021-4114,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2021-4114,SUSE-Storage-7-2021-4114 SKIP SUSE-RU-2021:4116-1 as SUSE-SLE-Product-HA-15-SP2-2021-4116 is not security or has no CVEs. patches: SUSE-2021-4116,SUSE-SLE-Product-HA-15-SP2-2021-4116 SKIP SUSE-RU-2021:4128-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2021-4128 is not security or has no CVEs. patches: SUSE-2021-4128,SUSE-OpenStack-Cloud-9-2021-4128,SUSE-OpenStack-Cloud-Crowbar-9-2021-4128,SUSE-SLE-SAP-12-SP4-2021-4128,SUSE-SLE-SERVER-12-SP4-LTSS-2021-4128,SUSE-SLE-SERVER-INSTALLER-12-SP4-2021-4128 SKIP SUSE-RU-2021:4129-1 as SUSE-SLE-Product-SLES_SAP-15-2021-4129 is not security or has no CVEs. patches: SUSE-2021-4129,SUSE-SLE-INSTALLER-15-2021-4129,SUSE-SLE-Product-SLES-15-2021-4129,SUSE-SLE-Product-SLES_SAP-15-2021-4129 SKIP SUSE-RU-2021:4130-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-4130 is not security or has no CVEs. patches: SUSE-2021-4130,SUSE-SLE-SERVER-12-SP5-2021-4130,SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-4130 SKIP SUSE-RU-2021:4131-1 as SUSE-Storage-6-2021-4131 is not security or has no CVEs. patches: SUSE-2021-4131,SUSE-Storage-6-2021-4131 SKIP SUSE-RU-2021:4132-1 as SUSE-Storage-7-2021-4132 is not security or has no CVEs. patches: SUSE-2021-4132,SUSE-Storage-7-2021-4132 SKIP SUSE-RU-2021:4133-1 as SUSE-Storage-6-2021-4133 is not security or has no CVEs. patches: SUSE-2021-4133,SUSE-Storage-6-2021-4133 SKIP SUSE-RU-2021:4134-1 as SUSE-SUSE-MicroOS-5.1-2021-4134 is not security or has no CVEs. patches: SUSE-2021-4134,SUSE-SLE-Module-Basesystem-15-SP3-2021-4134,SUSE-SUSE-MicroOS-5.1-2021-4134 SKIP SUSE-RU-2021:4135-1 as SUSE-SLE-Product-WE-15-SP3-2021-4135 is not security or has no CVEs. patches: SUSE-2021-4135,SUSE-SLE-Module-Basesystem-15-SP3-2021-4135,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-4135,SUSE-SLE-Product-WE-15-SP3-2021-4135 SKIP SUSE-RU-2021:4137-1 as SUSE-SLE-SERVER-12-SP5-2021-4137 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-4137,SUSE-2021-4137,SUSE-OpenStack-Cloud-8-2021-4137,SUSE-OpenStack-Cloud-9-2021-4137,SUSE-OpenStack-Cloud-Crowbar-8-2021-4137,SUSE-OpenStack-Cloud-Crowbar-9-2021-4137,SUSE-SLE-SAP-12-SP3-2021-4137,SUSE-SLE-SAP-12-SP4-2021-4137,SUSE-SLE-SERVER-12-SP2-BCL-2021-4137,SUSE-SLE-SERVER-12-SP3-2021-4137,SUSE-SLE-SERVER-12-SP3-BCL-2021-4137,SUSE-SLE-SERVER-12-SP4-LTSS-2021-4137,SUSE-SLE-SERVER-12-SP5-2021-4137 SKIP SUSE-RU-2021:4138-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2021-4138 is not security or has no CVEs. patches: SUSE-2021-4138,SUSE-SLE-Module-SAP-Applications-15-SP1-2021-4138 SKIP SUSE-RU-2021:4139-1 as SUSE-Storage-6-2021-4139 is not security or has no CVEs. patches: SUSE-2021-4139,SUSE-SLE-INSTALLER-15-SP1-2021-4139,SUSE-SLE-Module-Basesystem-15-SP2-2021-4139,SUSE-SLE-Product-HPC-15-2021-4139,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-4139,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-4139,SUSE-SLE-Product-SLES-15-2021-4139,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-4139,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-4139,SUSE-SLE-Product-SLES_SAP-15-2021-4139,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-4139,SUSE-Storage-6-2021-4139 SKIP SUSE-RU-2021:4140-1 as SUSE-SLE-WE-12-SP5-2021-4140 is not security or has no CVEs. patches: SUSE-2021-4140,SUSE-SLE-SDK-12-SP5-2021-4140,SUSE-SLE-SERVER-12-SP5-2021-4140,SUSE-SLE-WE-12-SP5-2021-4140 SKIP SUSE-RU-2021:4141-1 as SUSE-SUSE-MicroOS-5.1-2021-4141 is not security or has no CVEs. patches: SUSE-2021-4141,SUSE-SLE-Module-Basesystem-15-SP2-2021-4141,SUSE-SLE-Module-Basesystem-15-SP3-2021-4141,SUSE-SUSE-MicroOS-5.1-2021-4141 SKIP SUSE-RU-2021:4142-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-4142 is not security or has no CVEs. patches: SUSE-2021-4142,SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-4142,SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-4142 SKIP SUSE-RU-2021:4143-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-4143 is not security or has no CVEs. patches: SUSE-2021-4143,SUSE-SLE-Module-Basesystem-15-SP2-2021-4143,SUSE-SLE-Module-Basesystem-15-SP3-2021-4143,SUSE-SLE-Module-Server-Applications-15-SP2-2021-4143,SUSE-SLE-Module-Server-Applications-15-SP3-2021-4143 SKIP SUSE-RU-2021:4144-1 as SUSE-Storage-6-2021-4144 is not security or has no CVEs. patches: SUSE-2021-4144,SUSE-SLE-Module-Legacy-15-SP2-2021-4144,SUSE-SLE-Module-Legacy-15-SP3-2021-4144,SUSE-SLE-Product-SLES-15-2021-4144,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-4144,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-4144,SUSE-SLE-Product-SLES_SAP-15-2021-4144,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-4144,SUSE-Storage-6-2021-4144 SKIP SUSE-RU-2021:4145-1 as SUSE-SUSE-MicroOS-5.1-2021-4145 is not security or has no CVEs. patches: SUSE-2021-4145,SUSE-SLE-Module-Basesystem-15-SP2-2021-4145,SUSE-SLE-Module-Basesystem-15-SP3-2021-4145,SUSE-SUSE-MicroOS-5.0-2021-4145,SUSE-SUSE-MicroOS-5.1-2021-4145 SKIP SUSE-RU-2021:4148-1 as SUSE-SLE-SERVER-12-SP5-2021-4148 is not security or has no CVEs. patches: SUSE-2021-4148,SUSE-OpenStack-Cloud-9-2021-4148,SUSE-OpenStack-Cloud-Crowbar-9-2021-4148,SUSE-SLE-SAP-12-SP4-2021-4148,SUSE-SLE-SDK-12-SP5-2021-4148,SUSE-SLE-SERVER-12-SP4-LTSS-2021-4148,SUSE-SLE-SERVER-12-SP5-2021-4148 SKIP SUSE-RU-2021:4156-1 as SUSE-SLE-SERVER-12-SP5-2021-4156 is not security or has no CVEs. patches: SUSE-2021-4156,SUSE-SLE-SERVER-12-SP5-2021-4156 SKIP SUSE-RU-2021:4157-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-4157 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-4157,SUSE-2021-4157,SUSE-OpenStack-Cloud-8-2021-4157,SUSE-OpenStack-Cloud-Crowbar-8-2021-4157,SUSE-SLE-SAP-12-SP3-2021-4157,SUSE-SLE-SERVER-12-SP3-2021-4157,SUSE-SLE-SERVER-12-SP3-BCL-2021-4157 SKIP SUSE-RU-2021:4158-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2021-4158 is not security or has no CVEs. patches: SUSE-2021-4158,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-4158,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-4158 SKIP SUSE-RU-2021:4159-1 as SUSE-SLE-Product-SLES-15-SP2-2021-4159 is not security or has no CVEs. patches: SUSE-2021-4159,SUSE-SLE-INSTALLER-15-SP2-2021-4159,SUSE-SLE-Product-SLES-15-SP2-2021-4159 SKIP SUSE-RU-2021:4163-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-4163 is not security or has no CVEs. patches: SUSE-2021-4163,SUSE-SLE-Module-Basesystem-15-SP3-2021-4163,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-4163,SUSE-SLE-Module-Server-Applications-15-SP3-2021-4163 SKIP SUSE-RU-2021:4164-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4164 is not security or has no CVEs. patches: SUSE-2021-4164,SUSE-SLE-Module-Basesystem-15-SP2-2021-4164,SUSE-SLE-Module-Basesystem-15-SP3-2021-4164 SKIP SUSE-RU-2021:4165-1 as SUSE-SUSE-MicroOS-5.1-2021-4165 is not security or has no CVEs. patches: SUSE-2021-4165,SUSE-SLE-Module-Basesystem-15-SP3-2021-4165,SUSE-SUSE-MicroOS-5.1-2021-4165 SKIP SUSE-RU-2021:4166-1 as SUSE-Storage-7-2021-4166 is not security or has no CVEs. patches: SUSE-2021-4166,SUSE-SLE-Module-Basesystem-15-SP2-2021-4166,SUSE-SLE-Module-Basesystem-15-SP3-2021-4166,SUSE-SUSE-MicroOS-5.0-2021-4166,SUSE-SUSE-MicroOS-5.1-2021-4166,SUSE-Storage-7-2021-4166 SKIP SUSE-RU-2021:4167-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4167 is not security or has no CVEs. patches: SUSE-2021-4167,SUSE-SLE-Module-Basesystem-15-SP2-2021-4167,SUSE-SLE-Module-Basesystem-15-SP3-2021-4167 SKIP SUSE-RU-2021:4174-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-4174 is not security or has no CVEs. patches: SUSE-2021-4174,SUSE-SLE-Module-HPC-15-SP2-2021-4174,SUSE-SLE-Module-HPC-15-SP3-2021-4174,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-4174,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-4174 SKIP SUSE-RU-2021:4175-1 as SUSE-SUSE-MicroOS-5.1-2021-4175 is not security or has no CVEs. patches: SUSE-2021-4175,SUSE-SLE-Module-Basesystem-15-SP3-2021-4175,SUSE-SUSE-MicroOS-5.1-2021-4175 SKIP SUSE-RU-2021:4176-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-4176 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-4176,SUSE-2021-4176,SUSE-OpenStack-Cloud-8-2021-4176,SUSE-OpenStack-Cloud-Crowbar-8-2021-4176,SUSE-SLE-SAP-12-SP3-2021-4176,SUSE-SLE-SERVER-12-SP3-2021-4176,SUSE-SLE-SERVER-12-SP3-BCL-2021-4176 SKIP SUSE-RU-2021:4177-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4177 is not security or has no CVEs. patches: SUSE-2021-4177,SUSE-SLE-Module-Basesystem-15-SP3-2021-4177 SKIP SUSE-RU-2021:4178-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4178 is not security or has no CVEs. patches: SUSE-2021-4178,SUSE-SLE-Module-Basesystem-15-SP3-2021-4178 SKIP SUSE-RU-2021:4179-1 as SUSE-SLE-Product-HA-15-SP3-2021-4179 is not security or has no CVEs. patches: SUSE-2021-4179,SUSE-SLE-Product-HA-15-SP3-2021-4179 SKIP SUSE-RU-2021:4180-1 as SUSE-SLE-Product-HA-15-2021-4180 is not security or has no CVEs. patches: SUSE-2021-4180,SUSE-SLE-Product-HA-15-2021-4180 SKIP SUSE-RU-2021:4181-1 as SUSE-SLE-Product-HA-15-SP1-2021-4181 is not security or has no CVEs. patches: SUSE-2021-4181,SUSE-SLE-Product-HA-15-SP1-2021-4181 SKIP SUSE-RU-2021:4182-1 as SUSE-SUSE-MicroOS-5.1-2021-4182 is not security or has no CVEs. patches: SUSE-2021-4182,SUSE-SLE-Module-Basesystem-15-SP2-2021-4182,SUSE-SLE-Module-Basesystem-15-SP3-2021-4182,SUSE-SLE-Module-Development-Tools-15-SP2-2021-4182,SUSE-SLE-Module-Development-Tools-15-SP3-2021-4182,SUSE-SUSE-MicroOS-5.0-2021-4182,SUSE-SUSE-MicroOS-5.1-2021-4182 SKIP SUSE-RU-2021:4183-1 as SUSE-SUSE-MicroOS-5.1-2021-4183 is not security or has no CVEs. patches: SUSE-2021-4183,SUSE-SLE-Module-Basesystem-15-SP2-2021-4183,SUSE-SLE-Module-Basesystem-15-SP3-2021-4183,SUSE-SLE-RT-12-SP5-2021-4183,SUSE-SUSE-MicroOS-5.1-2021-4183 SKIP SUSE-RU-2021:4188-1 as SUSE-SLE-SERVER-12-SP5-2021-4188 is not security or has no CVEs. patches: SUSE-2021-4188,SUSE-SLE-SERVER-12-SP5-2021-4188 SKIP SUSE-RU-2021:4189-1 as SUSE-Storage-6-2021-4189 is not security or has no CVEs. patches: SUSE-2021-4189,SUSE-SLE-Module-Basesystem-15-SP2-2021-4189,SUSE-SLE-Module-Basesystem-15-SP3-2021-4189,SUSE-SLE-Product-HPC-15-2021-4189,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-4189,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-4189,SUSE-SLE-Product-SLES-15-2021-4189,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-4189,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-4189,SUSE-SLE-Product-SLES_SAP-15-2021-4189,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-4189,SUSE-Storage-6-2021-4189 SKIP SUSE-RU-2021:4194-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2021-4194 is not security or has no CVEs. patches: SUSE-2021-4194,SUSE-SLE-Module-Server-Applications-15-SP3-2021-4194 SKIP SUSE-RU-2021:4195-1 as SUSE-SUSE-MicroOS-5.1-2021-4195 is not security or has no CVEs. patches: SUSE-2021-4195,SUSE-SLE-INSTALLER-15-SP3-2021-4195,SUSE-SLE-Module-Basesystem-15-SP3-2021-4195,SUSE-SUSE-MicroOS-5.1-2021-4195 SKIP SUSE-RU-2021:4196-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-4196 is not security or has no CVEs. patches: SUSE-2021-4196,SUSE-SLE-SERVER-12-SP5-2021-4196,SUSE-SLE-SERVER-INSTALLER-12-SP5-2021-4196 SKIP SUSE-RU-2021:4197-1 as SUSE-SLE-SERVER-INSTALLER-12-SP4-2021-4197 is not security or has no CVEs. patches: SUSE-2021-4197,SUSE-OpenStack-Cloud-9-2021-4197,SUSE-OpenStack-Cloud-Crowbar-9-2021-4197,SUSE-SLE-SAP-12-SP4-2021-4197,SUSE-SLE-SAP-INSTALLER-12-SP4-2021-4197,SUSE-SLE-SERVER-12-SP4-LTSS-2021-4197,SUSE-SLE-SERVER-INSTALLER-12-SP4-2021-4197 SKIP SUSE-RU-2021:4199-1 as SUSE-SLE-SERVER-12-SP5-2021-4199 is not security or has no CVEs. patches: SUSE-2021-4199,SUSE-SLE-SDK-12-SP5-2021-4199,SUSE-SLE-SERVER-12-SP5-2021-4199 SKIP SUSE-RU-2021:4203-1 as SUSE-SLE-SERVER-12-SP3-BCL-2021-4203 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2021-4203,SUSE-2021-4203,SUSE-OpenStack-Cloud-8-2021-4203,SUSE-OpenStack-Cloud-Crowbar-8-2021-4203,SUSE-SLE-SAP-12-SP3-2021-4203,SUSE-SLE-SAP-INSTALLER-12-SP3-2021-4203,SUSE-SLE-SERVER-12-SP3-2021-4203,SUSE-SLE-SERVER-12-SP3-BCL-2021-4203 SKIP SUSE-RU-2021:4204-1 as SUSE-SLE-Product-WE-15-SP3-2021-4204 is not security or has no CVEs. patches: SUSE-2021-4204,SUSE-SLE-Product-WE-15-SP2-2021-4204,SUSE-SLE-Product-WE-15-SP3-2021-4204 SKIP SUSE-RU-2021:4205-1 as SUSE-SLE-Module-Basesystem-15-SP3-2021-4205 is not security or has no CVEs. patches: SUSE-2021-4205,SUSE-SLE-INSTALLER-15-SP3-2021-4205,SUSE-SLE-Module-Basesystem-15-SP3-2021-4205 SKIP SUSE-RU-2021:4206-1 as SUSE-SLE-Module-Basesystem-15-SP2-2021-4206 is not security or has no CVEs. patches: SUSE-2021-4206,SUSE-SLE-INSTALLER-15-SP2-2021-4206,SUSE-SLE-Module-Basesystem-15-SP2-2021-4206 SKIP SUSE-RU-2022:0001-1 as SUSE-SLE-Product-HA-15-SP3-2022-1 is not security or has no CVEs. patches: SUSE-2022-1,SUSE-SLE-Product-HA-15-SP2-2022-1,SUSE-SLE-Product-HA-15-SP3-2022-1 SKIP SUSE-RU-2022:0002-1 as SUSE-SUSE-MicroOS-5.1-2022-2 is not security or has no CVEs. patches: SUSE-2022-2,SUSE-SLE-Module-Basesystem-15-SP3-2022-2,SUSE-SLE-Product-HA-15-SP2-2022-2,SUSE-SLE-Product-HA-15-SP3-2022-2,SUSE-SUSE-MicroOS-5.0-2022-2,SUSE-SUSE-MicroOS-5.1-2022-2 SKIP SUSE-RU-2022:0002-2 as SUSE-SLE-Product-RT-15-SP2-2022-2 is not security or has no CVEs. patches: SUSE-2022-2,SUSE-SLE-Product-RT-15-SP2-2022-2 SKIP SUSE-RU-2022:0003-1 as SUSE-SLE-SERVER-12-SP5-2022-3 is not security or has no CVEs. patches: SUSE-2022-3,SUSE-SLE-SDK-12-SP5-2022-3,SUSE-SLE-SERVER-12-SP5-2022-3 SKIP SUSE-RU-2022:0003-2 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-3 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-3,SUSE-2022-3,SUSE-OpenStack-Cloud-8-2022-3,SUSE-OpenStack-Cloud-9-2022-3,SUSE-OpenStack-Cloud-Crowbar-8-2022-3,SUSE-OpenStack-Cloud-Crowbar-9-2022-3,SUSE-SLE-SAP-12-SP3-2022-3,SUSE-SLE-SAP-12-SP4-2022-3,SUSE-SLE-SERVER-12-SP2-BCL-2022-3,SUSE-SLE-SERVER-12-SP3-2022-3,SUSE-SLE-SERVER-12-SP3-BCL-2022-3,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3 SKIP SUSE-RU-2022:0004-1 as SUSE-SUSE-MicroOS-5.1-2022-4 is not security or has no CVEs. patches: SUSE-2022-4,SUSE-SLE-Module-Basesystem-15-SP3-2022-4,SUSE-SUSE-MicroOS-5.0-2022-4,SUSE-SUSE-MicroOS-5.1-2022-4 SKIP SUSE-RU-2022:0004-2 as SUSE-SLE-Product-RT-15-SP2-2022-4 is not security or has no CVEs. patches: SUSE-2022-4,SUSE-SLE-Product-RT-15-SP2-2022-4 SKIP SUSE-RU-2022:0004-3 as SUSE-Storage-7-2022-4 is not security or has no CVEs. patches: SUSE-2022-4,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4,SUSE-Storage-6-2022-4,SUSE-Storage-7-2022-4 SKIP SUSE-RU-2022:0005-1 as SUSE-SLE-Product-SLES_SAP-15-2022-5 is not security or has no CVEs. patches: SUSE-2022-5,SUSE-SLE-Product-HPC-15-2022-5,SUSE-SLE-Product-SLES-15-2022-5,SUSE-SLE-Product-SLES_SAP-15-2022-5 SKIP SUSE-RU-2022:0007-1 as SUSE-SUSE-MicroOS-5.0-2022-7 is not security or has no CVEs. patches: SUSE-2022-7,SUSE-SLE-Module-Basesystem-15-SP2-2022-7,SUSE-SLE-Module-Server-Applications-15-SP2-2022-7,SUSE-SUSE-MicroOS-5.0-2022-7 SKIP SUSE-RU-2022:0008-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-8 is not security or has no CVEs. patches: SUSE-2022-8,SUSE-SLE-Module-Basesystem-15-SP2-2022-8,SUSE-SLE-Module-Basesystem-15-SP3-2022-8 SKIP SUSE-RU-2022:0009-1 as SUSE-SUSE-MicroOS-5.1-2022-9 is not security or has no CVEs. patches: SUSE-2022-9,SUSE-SLE-Module-Server-Applications-15-SP3-2022-9,SUSE-SUSE-MicroOS-5.1-2022-9 SKIP SUSE-RU-2022:0010-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2022-11 is not security or has no CVEs. patches: SUSE-2022-10,SUSE-SLE-Live-Patching-12-2022-10,SUSE-SLE-Live-Patching-12-SP3-2022-10,SUSE-SLE-Live-Patching-12-SP4-2022-10,SUSE-SLE-Live-Patching-12-SP5-2022-10,SUSE-SLE-Module-Live-Patching-15-2022-11,SUSE-SLE-Module-Live-Patching-15-SP1-2022-11,SUSE-SLE-Module-Live-Patching-15-SP2-2022-11,SUSE-SLE-Module-Live-Patching-15-SP3-2022-11 SKIP SUSE-RU-2022:0012-1 as SUSE-SUSE-MicroOS-5.1-2022-12 is not security or has no CVEs. patches: SUSE-2022-12,SUSE-SLE-Module-Basesystem-15-SP3-2022-12,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-12,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-12,SUSE-SUSE-MicroOS-5.0-2022-12,SUSE-SUSE-MicroOS-5.1-2022-12 SKIP SUSE-RU-2022:0013-1 as SUSE-SLE-SERVER-12-SP5-2022-13 is not security or has no CVEs. patches: SUSE-2022-13,SUSE-SLE-SDK-12-SP5-2022-13,SUSE-SLE-SERVER-12-SP5-2022-13 SKIP SUSE-RU-2022:0014-1 as SUSE-SLE-Module-Basesystem-15-SP2-2022-14 is not security or has no CVEs. patches: SUSE-2022-14,SUSE-SLE-INSTALLER-15-SP2-2022-14,SUSE-SLE-Module-Basesystem-15-SP2-2022-14 SKIP SUSE-RU-2022:0018-1 as SUSE-SLE-Module-Python2-15-SP3-2022-18 is not security or has no CVEs. patches: SUSE-2022-18,SUSE-SLE-Module-Basesystem-15-SP3-2022-18,SUSE-SLE-Module-Python2-15-SP3-2022-18 SKIP SUSE-RU-2022:0020-1 as SUSE-SLE-Module-Basesystem-15-SP2-2022-20 is not security or has no CVEs. patches: SUSE-2022-20,SUSE-SLE-Module-Basesystem-15-SP2-2022-20 SKIP SUSE-RU-2022:0022-1 as SUSE-SLE-SERVER-12-SP5-2022-22 is not security or has no CVEs. patches: SUSE-2022-22,SUSE-SLE-SERVER-12-SP5-2022-22 SKIP SUSE-RU-2022:0023-1 as SUSE-SLE-SERVER-12-SP5-2022-23 is not security or has no CVEs. patches: SUSE-2022-23,SUSE-SLE-SERVER-12-SP5-2022-23 SKIP SUSE-RU-2022:0027-1 as SUSE-SLE-Module-Basesystem-15-SP2-2022-27 is not security or has no CVEs. patches: SUSE-2022-27,SUSE-SLE-Module-Basesystem-15-SP2-2022-27 SKIP SUSE-RU-2022:0035-1 as SUSE-SLE-Module-Legacy-15-SP3-2022-35 is not security or has no CVEs. patches: SUSE-2022-35,SUSE-SLE-Module-Basesystem-15-SP3-2022-35,SUSE-SLE-Module-Legacy-15-SP3-2022-35 SKIP SUSE-RU-2022:0035-2 as SUSE-SLE-Product-RT-15-SP2-2022-35 is not security or has no CVEs. patches: SUSE-2022-35,SUSE-SLE-Product-RT-15-SP2-2022-35 SKIP SUSE-RU-2022:0036-1 as SUSE-SLE-Product-SLES_SAP-15-2022-36 is not security or has no CVEs. patches: SUSE-2022-36,SUSE-SLE-INSTALLER-15-2022-36,SUSE-SLE-Product-HPC-15-2022-36,SUSE-SLE-Product-SLES-15-2022-36,SUSE-SLE-Product-SLES_SAP-15-2022-36 SKIP SUSE-RU-2022:0037-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-37 is not security or has no CVEs. patches: SUSE-2022-37,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-37,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-37,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-37 SKIP SUSE-RU-2022:0046-1 as SUSE-Storage-6-2022-46 is not security or has no CVEs. patches: SUSE-2022-46,SUSE-SLE-Module-Legacy-15-SP2-2022-46,SUSE-SLE-Module-Legacy-15-SP3-2022-46,SUSE-SLE-Product-SLES-15-2022-46,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-46,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-46,SUSE-SLE-Product-SLES_SAP-15-2022-46,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-46,SUSE-Storage-6-2022-46 SKIP SUSE-RU-2022:0047-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2022-47 is not security or has no CVEs. patches: SUSE-2022-47,SUSE-SLE-Module-Basesystem-15-SP3-2022-47,SUSE-SLE-Module-Server-Applications-15-SP3-2022-47 SKIP SUSE-RU-2022:0048-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-48 is not security or has no CVEs. patches: SUSE-2022-48,SUSE-SLE-Module-Basesystem-15-SP3-2022-48,SUSE-SLE-Module-Development-Tools-15-SP3-2022-48 SKIP SUSE-RU-2022:0049-1 as SUSE-Storage-6-2022-49 is not security or has no CVEs. patches: SUSE-2022-49,SUSE-SLE-Product-HPC-15-2022-49,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-49,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-49,SUSE-SLE-Product-SLES-15-2022-49,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-49,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-49,SUSE-SLE-Product-SLES_SAP-15-2022-49,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-49,SUSE-Storage-6-2022-49 SKIP SUSE-RU-2022:0053-1 as SUSE-Storage-6-2022-53 is not security or has no CVEs. patches: SUSE-2022-53,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-53,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-53,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-53,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-53,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-53,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-53,SUSE-Storage-6-2022-53 SKIP SUSE-RU-2022:0054-1 as SUSE-Storage-7-2022-54 is not security or has no CVEs. patches: SUSE-2022-54,SUSE-Storage-7-2022-54 SKIP SUSE-RU-2022:0055-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2022-55 is not security or has no CVEs. patches: SUSE-2022-55,SUSE-SLE-Module-Basesystem-15-SP2-2022-55,SUSE-SLE-Module-Basesystem-15-SP3-2022-55,SUSE-SLE-Module-Server-Applications-15-SP2-2022-55,SUSE-SLE-Module-Server-Applications-15-SP3-2022-55 SKIP SUSE-RU-2022:0057-1 as SUSE-Storage-6-2022-57 is not security or has no CVEs. patches: SUSE-2022-57,SUSE-SLE-INSTALLER-15-SP1-2022-57,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-57,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-57,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-57,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-57,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-57,SUSE-Storage-6-2022-57 SKIP SUSE-RU-2022:0066-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-66 is not security or has no CVEs. patches: SUSE-2022-66,SUSE-SLE-Module-Development-Tools-15-SP3-2022-66 SKIP SUSE-RU-2022:0067-1 as SUSE-SLE-SERVER-12-SP5-2022-67 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-67,SUSE-2022-67,SUSE-OpenStack-Cloud-8-2022-67,SUSE-OpenStack-Cloud-9-2022-67,SUSE-OpenStack-Cloud-Crowbar-8-2022-67,SUSE-OpenStack-Cloud-Crowbar-9-2022-67,SUSE-SLE-SAP-12-SP3-2022-67,SUSE-SLE-SAP-12-SP4-2022-67,SUSE-SLE-SDK-12-SP5-2022-67,SUSE-SLE-SERVER-12-SP2-BCL-2022-67,SUSE-SLE-SERVER-12-SP3-2022-67,SUSE-SLE-SERVER-12-SP3-BCL-2022-67,SUSE-SLE-SERVER-12-SP4-LTSS-2022-67,SUSE-SLE-SERVER-12-SP5-2022-67 SKIP SUSE-RU-2022:0070-1 as SUSE-SLE-Module-Python2-15-SP3-2022-70 is not security or has no CVEs. patches: SUSE-2022-70,SUSE-SLE-Module-Basesystem-15-SP3-2022-70,SUSE-SLE-Module-Python2-15-SP3-2022-70 SKIP SUSE-RU-2022:0070-2 as SUSE-SLE-Product-RT-15-SP2-2022-70 is not security or has no CVEs. patches: SUSE-2022-70,SUSE-SLE-Product-RT-15-SP2-2022-70 SKIP SUSE-RU-2022:0071-1 as SUSE-Storage-6-2022-71 is not security or has no CVEs. patches: SUSE-2022-71,SUSE-SLE-Module-Containers-15-SP2-2022-71,SUSE-SLE-Module-Containers-15-SP3-2022-71,SUSE-SLE-Product-HPC-15-2022-71,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-71,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-71,SUSE-SLE-Product-SLES-15-2022-71,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-71,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-71,SUSE-SLE-Product-SLES_SAP-15-2022-71,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-71,SUSE-Storage-6-2022-71 SKIP SUSE-RU-2022:0072-1 as SUSE-Storage-7-2022-72 is not security or has no CVEs. patches: SUSE-2022-72,SUSE-SLE-Module-Basesystem-15-SP3-2022-72,SUSE-SLE-Module-Server-Applications-15-SP3-2022-72,SUSE-SLE-Product-HPC-15-2022-72,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-72,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-72,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-72,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-72,SUSE-SLE-Product-SLES-15-2022-72,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-72,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-72,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-72,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-72,SUSE-SLE-Product-SLES_SAP-15-2022-72,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-72,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-72,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-72,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-72,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-72,SUSE-SUSE-MicroOS-5.0-2022-72,SUSE-SUSE-MicroOS-5.1-2022-72,SUSE-Storage-6-2022-72,SUSE-Storage-7-2022-72 SKIP SUSE-RU-2022:0074-1 as SUSE-SLE-SERVER-12-SP5-2022-74 is not security or has no CVEs. patches: SUSE-2022-74,SUSE-OpenStack-Cloud-9-2022-74,SUSE-OpenStack-Cloud-Crowbar-9-2022-74,SUSE-SLE-SAP-12-SP4-2022-74,SUSE-SLE-SDK-12-SP5-2022-74,SUSE-SLE-SERVER-12-SP4-LTSS-2022-74,SUSE-SLE-SERVER-12-SP5-2022-74 SKIP SUSE-RU-2022:0075-1 as SUSE-SLE-Product-HA-15-SP2-2022-75 is not security or has no CVEs. patches: SUSE-2022-75,SUSE-SLE-Product-HA-15-SP2-2022-75 SKIP SUSE-RU-2022:0076-1 as SUSE-SLE-Product-HA-15-2022-76 is not security or has no CVEs. patches: SUSE-2022-76,SUSE-SLE-Product-HA-15-2022-76 SKIP SUSE-RU-2022:0078-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-78 is not security or has no CVEs. patches: SUSE-2022-78,SUSE-SLE-Module-Development-Tools-15-SP3-2022-78 SKIP SUSE-RU-2022:0078-2 as SUSE-SLE-Product-RT-15-SP2-2022-78 is not security or has no CVEs. patches: SUSE-2022-78,SUSE-SLE-Product-RT-15-SP2-2022-78 SKIP SUSE-RU-2022:0082-1 as SUSE-SLE-Module-HPC-12-2022-82 is not security or has no CVEs. patches: SUSE-2022-82,SUSE-SLE-Module-HPC-12-2022-82 SKIP SUSE-RU-2022:0083-1 as SUSE-SLE-Product-HA-15-SP1-2022-83 is not security or has no CVEs. patches: SUSE-2022-83,SUSE-SLE-Product-HA-15-SP1-2022-83 SKIP SUSE-RU-2022:0084-1 as SUSE-SUSE-MicroOS-5.1-2022-84 is not security or has no CVEs. patches: SUSE-2022-84,SUSE-SLE-Module-Basesystem-15-SP2-2022-84,SUSE-SLE-Module-Basesystem-15-SP3-2022-84,SUSE-SUSE-MicroOS-5.0-2022-84,SUSE-SUSE-MicroOS-5.1-2022-84 SKIP SUSE-RU-2022:0085-1 as SUSE-SLE-SERVER-12-SP5-2022-85 is not security or has no CVEs. patches: SUSE-2022-85,SUSE-SLE-SERVER-12-SP5-2022-85 SKIP SUSE-RU-2022:0087-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-87 is not security or has no CVEs. patches: SUSE-2022-87,SUSE-SLE-Module-Development-Tools-15-SP3-2022-87 SKIP SUSE-RU-2022:0087-2 as SUSE-SLE-Product-RT-15-SP2-2022-87 is not security or has no CVEs. patches: SUSE-2022-87,SUSE-SLE-Product-RT-15-SP2-2022-87 SKIP SUSE-RU-2022:0092-1 as SUSE-Storage-7-2022-92 is not security or has no CVEs. patches: SUSE-2022-92,SUSE-SLE-Module-Basesystem-15-SP3-2022-92,SUSE-SLE-Module-Server-Applications-15-SP3-2022-92,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-92,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-92,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-92,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-92,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-92,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-92,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-92,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-92,SUSE-Storage-7-2022-92 SKIP SUSE-RU-2022:0093-1 as SUSE-Storage-7-2022-93 is not security or has no CVEs. patches: SUSE-2022-93,SUSE-SLE-Module-Basesystem-15-SP3-2022-93,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-93,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-93,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-93,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-93,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-93,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-93,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-93,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-93,SUSE-SUSE-MicroOS-5.0-2022-93,SUSE-SUSE-MicroOS-5.1-2022-93,SUSE-Storage-7-2022-93 SKIP SUSE-RU-2022:0093-2 as SUSE-SLE-Product-RT-15-SP2-2022-93 is not security or has no CVEs. patches: SUSE-2022-93,SUSE-SLE-Product-RT-15-SP2-2022-93 SKIP SUSE-RU-2022:0094-1 as SUSE-SUSE-MicroOS-5.0-2022-94 is not security or has no CVEs. patches: SUSE-2022-94,SUSE-SLE-Module-Basesystem-15-SP2-2022-94,SUSE-SLE-Module-Development-Tools-15-SP2-2022-94,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-94,SUSE-SLE-Module-Python2-15-SP2-2022-94,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-94,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-94,SUSE-SUSE-MicroOS-5.0-2022-94 SKIP SUSE-RU-2022:0095-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2022-95 is not security or has no CVEs. patches: SUSE-2022-95,SUSE-SLE-Module-Basesystem-15-SP3-2022-95,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-95,SUSE-SLE-Module-Server-Applications-15-SP3-2022-95 SKIP SUSE-RU-2022:0096-1 as SUSE-SUSE-MicroOS-5.1-2022-96 is not security or has no CVEs. patches: SUSE-2022-96,SUSE-SLE-Module-Basesystem-15-SP3-2022-96,SUSE-SLE-Module-Development-Tools-15-SP3-2022-96,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-96,SUSE-SLE-Module-Python2-15-SP3-2022-96,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-96,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-96,SUSE-SUSE-MicroOS-5.1-2022-96 SKIP SUSE-RU-2022:0097-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-97 is not security or has no CVEs. patches: SUSE-2022-97,SUSE-SLE-Module-Basesystem-15-SP3-2022-97,SUSE-SLE-Module-Development-Tools-15-SP3-2022-97 SKIP SUSE-RU-2022:0098-1 as SUSE-Storage-7-2022-98 is not security or has no CVEs. patches: SUSE-2022-98,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-98,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-98,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-98,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-98,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-98,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-98,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-98,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-98,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-98,SUSE-Storage-7-2022-98 SKIP SUSE-RU-2022:0098-2 as SUSE-SLE-Product-RT-15-SP2-2022-98 is not security or has no CVEs. patches: SUSE-2022-98,SUSE-SLE-Product-RT-15-SP2-2022-98 SKIP SUSE-RU-2022:0099-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-99 is not security or has no CVEs. patches: SUSE-2022-99,SUSE-SLE-Module-Basesystem-15-SP3-2022-99 SKIP SUSE-RU-2022:0100-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-100 is not security or has no CVEs. patches: SUSE-2022-100,SUSE-SLE-Manager-Tools-15-2022-100,SUSE-SLE-Module-Basesystem-15-SP3-2022-100,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-100,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-100,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-100,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-100 SKIP SUSE-RU-2022:0100-2 as SUSE-SLE-Product-RT-15-SP2-2022-100 is not security or has no CVEs. patches: SUSE-2022-100,SUSE-SLE-Product-RT-15-SP2-2022-100 SKIP SUSE-RU-2022:0105-1 as SUSE-SLE-Product-HA-15-SP3-2022-105 is not security or has no CVEs. patches: SUSE-2022-105,SUSE-SLE-Product-HA-15-SP3-2022-105 SKIP SUSE-RU-2022:0117-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-117 is not security or has no CVEs. patches: SUSE-2022-117,SUSE-SLE-Module-Development-Tools-15-SP3-2022-117 SKIP SUSE-RU-2022:0120-1 as SUSE-SLE-Product-SLES_SAP-15-2022-120 is not security or has no CVEs. patches: SUSE-2022-120,SUSE-SLE-Product-HPC-15-2022-120,SUSE-SLE-Product-SLES-15-2022-120,SUSE-SLE-Product-SLES_SAP-15-2022-120 SKIP SUSE-RU-2022:0121-1 as SUSE-SLE-SERVER-12-SP5-2022-121 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-121,SUSE-2022-121,SUSE-OpenStack-Cloud-8-2022-121,SUSE-OpenStack-Cloud-9-2022-121,SUSE-OpenStack-Cloud-Crowbar-8-2022-121,SUSE-OpenStack-Cloud-Crowbar-9-2022-121,SUSE-SLE-SAP-12-SP3-2022-121,SUSE-SLE-SAP-12-SP4-2022-121,SUSE-SLE-SERVER-12-SP3-2022-121,SUSE-SLE-SERVER-12-SP3-BCL-2022-121,SUSE-SLE-SERVER-12-SP4-LTSS-2022-121,SUSE-SLE-SERVER-12-SP5-2022-121 SKIP SUSE-RU-2022:0123-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-123 is not security or has no CVEs. patches: SUSE-2022-123,SUSE-SLE-Module-Basesystem-15-SP3-2022-123,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-123 SKIP SUSE-RU-2022:0124-1 as SUSE-SUSE-MicroOS-5.1-2022-124 is not security or has no CVEs. patches: SUSE-2022-124,SUSE-SLE-Module-Basesystem-15-SP3-2022-124,SUSE-SUSE-MicroOS-5.0-2022-124,SUSE-SUSE-MicroOS-5.1-2022-124 SKIP SUSE-RU-2022:0124-2 as SUSE-SLE-Product-RT-15-SP2-2022-124 is not security or has no CVEs. patches: SUSE-2022-124,SUSE-SLE-Product-RT-15-SP2-2022-124 SKIP SUSE-RU-2022:0125-1 as SUSE-SUSE-MicroOS-5.1-2022-125 is not security or has no CVEs. patches: SUSE-2022-125,SUSE-SLE-Module-Basesystem-15-SP3-2022-125,SUSE-SUSE-MicroOS-5.1-2022-125 SKIP SUSE-RU-2022:0127-1 as SUSE-SLE-Module-Containers-15-SP3-2022-127 is not security or has no CVEs. patches: SUSE-2022-127,SUSE-SLE-Module-Containers-15-SP3-2022-127 SKIP SUSE-RU-2022:0143-1 as SUSE-Storage-6-2022-143 is not security or has no CVEs. patches: SUSE-2022-143,SUSE-SLE-Module-Basesystem-15-SP2-2022-143,SUSE-SLE-Module-Basesystem-15-SP3-2022-143,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2022-143,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-143,SUSE-SLE-Product-HPC-15-2022-143,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-143,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-143,SUSE-SLE-Product-SLES-15-2022-143,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-143,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-143,SUSE-SLE-Product-SLES_SAP-15-2022-143,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-143,SUSE-Storage-6-2022-143 SKIP SUSE-RU-2022:0146-1 as SUSE-SLE-Module-Web-Scripting-15-SP3-2022-146 is not security or has no CVEs. patches: SUSE-2022-146,SUSE-SLE-Module-Web-Scripting-15-SP3-2022-146 SKIP SUSE-RU-2022:0147-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-147 is not security or has no CVEs. patches: SUSE-2022-147,SUSE-SLE-Module-Development-Tools-15-SP3-2022-147 SKIP SUSE-RU-2022:0148-1 as SUSE-SLE-HA-12-SP5-2022-148 is not security or has no CVEs. patches: SUSE-2022-148,SUSE-SLE-HA-12-SP4-2022-148,SUSE-SLE-HA-12-SP5-2022-148 SKIP SUSE-RU-2022:0152-1 as SUSE-SLE-Module-Web-Scripting-12-2022-152 is not security or has no CVEs. patches: SUSE-2022-152,SUSE-SLE-Module-Web-Scripting-12-2022-152 SKIP SUSE-RU-2022:0153-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-153 is not security or has no CVEs. patches: SUSE-2022-153,SUSE-SLE-Module-Basesystem-15-SP3-2022-153 SKIP SUSE-RU-2022:0153-2 as SUSE-SLE-Product-RT-15-SP2-2022-153 is not security or has no CVEs. patches: SUSE-2022-153,SUSE-SLE-Product-RT-15-SP2-2022-153 SKIP SUSE-RU-2022:0154-1 as SUSE-Storage-7-2022-154 is not security or has no CVEs. patches: SUSE-2022-154,SUSE-Storage-7-2022-154 SKIP SUSE-RU-2022:0158-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-158 is not security or has no CVEs. patches: SUSE-2022-158,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-158,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-158,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-158,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-158 SKIP SUSE-RU-2022:0167-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-167 is not security or has no CVEs. patches: SUSE-2022-167,SUSE-SLE-Module-Public-Cloud-15-2022-167,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-167,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-167,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-167 SKIP SUSE-RU-2022:0170-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-170 is not security or has no CVEs. patches: SUSE-2022-170,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-170,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-170,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-170,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-170 SKIP SUSE-RU-2022:0185-1 as SUSE-SLE-SERVER-12-SP5-2022-185 is not security or has no CVEs. patches: SUSE-2022-185,SUSE-OpenStack-Cloud-9-2022-185,SUSE-OpenStack-Cloud-Crowbar-9-2022-185,SUSE-SLE-SAP-12-SP4-2022-185,SUSE-SLE-SERVER-12-SP4-LTSS-2022-185,SUSE-SLE-SERVER-12-SP5-2022-185 SKIP SUSE-RU-2022:0186-1 as SUSE-Storage-7-2022-186 is not security or has no CVEs. patches: SUSE-2022-186,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-186,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-186,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-186,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-186,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-186,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-186,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-186,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-186,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-186,SUSE-Storage-7-2022-186 SKIP SUSE-RU-2022:0186-2 as SUSE-SLE-Product-RT-15-SP2-2022-186 is not security or has no CVEs. patches: SUSE-2022-186,SUSE-SLE-Product-RT-15-SP2-2022-186 SKIP SUSE-RU-2022:0187-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2022-187 is not security or has no CVEs. patches: SUSE-2022-187,SUSE-SLE-Module-Server-Applications-15-SP3-2022-187 SKIP SUSE-RU-2022:0187-2 as SUSE-SLE-Product-RT-15-SP2-2022-187 is not security or has no CVEs. patches: SUSE-2022-187,SUSE-SLE-Product-RT-15-SP2-2022-187 SKIP SUSE-RU-2022:0188-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-188 is not security or has no CVEs. patches: SUSE-2022-188,SUSE-SLE-Module-Basesystem-15-SP3-2022-188 SKIP SUSE-RU-2022:0188-2 as SUSE-SLE-Product-RT-15-SP2-2022-188 is not security or has no CVEs. patches: SUSE-2022-188,SUSE-SLE-Product-RT-15-SP2-2022-188 SKIP SUSE-RU-2022:0192-1 as SUSE-SLE-SERVER-12-SP5-2022-192 is not security or has no CVEs. patches: SUSE-2022-192,SUSE-SLE-SDK-12-SP5-2022-192,SUSE-SLE-SERVER-12-SP5-2022-192 SKIP SUSE-RU-2022:0193-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-193 is not security or has no CVEs. patches: SUSE-2022-193,SUSE-SLE-Module-Basesystem-15-SP3-2022-193 SKIP SUSE-RU-2022:0194-1 as SUSE-SLE-Product-SLES_SAP-15-2022-194 is not security or has no CVEs. patches: SUSE-2022-194,SUSE-SLE-Product-HPC-15-2022-194,SUSE-SLE-Product-SLES-15-2022-194,SUSE-SLE-Product-SLES_SAP-15-2022-194 SKIP SUSE-RU-2022:0195-1 as SUSE-SLE-SERVER-12-SP5-2022-195 is not security or has no CVEs. patches: SUSE-2022-195,SUSE-SLE-SERVER-12-SP5-2022-195 SKIP SUSE-RU-2022:0196-1 as SUSE-SUSE-MicroOS-5.1-2022-196 is not security or has no CVEs. patches: SUSE-2022-196,SUSE-SLE-Module-Basesystem-15-SP3-2022-196,SUSE-SUSE-MicroOS-5.1-2022-196 SKIP SUSE-RU-2022:0203-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-203 is not security or has no CVEs. patches: SUSE-2022-203,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-203,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-203,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-203 SKIP SUSE-RU-2022:0207-1 as SUSE-SUSE-MicroOS-5.1-2022-207 is not security or has no CVEs. patches: SUSE-2022-207,SUSE-SLE-Module-Basesystem-15-SP3-2022-207,SUSE-SLE-Module-Development-Tools-15-SP3-2022-207,SUSE-SUSE-MicroOS-5.1-2022-207 SKIP SUSE-RU-2022:0208-1 as SUSE-SLE-SERVER-12-SP5-2022-208 is not security or has no CVEs. patches: SUSE-2022-208,SUSE-SLE-SERVER-12-SP5-2022-208 SKIP SUSE-RU-2022:0209-1 as SUSE-SLE-Product-WE-15-SP3-2022-209 is not security or has no CVEs. patches: SUSE-2022-209,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-209,SUSE-SLE-Product-WE-15-SP3-2022-209 SKIP SUSE-RU-2022:0215-1 as SUSE-SUSE-MicroOS-5.1-2022-215 is not security or has no CVEs. patches: SUSE-2022-215,SUSE-SUSE-MicroOS-5.1-2022-215 SKIP SUSE-RU-2022:0216-1 as SUSE-Storage-6-2022-216 is not security or has no CVEs. patches: SUSE-2022-216,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-216,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-216,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-216,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-216,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-216,SUSE-Storage-6-2022-216 SKIP SUSE-RU-2022:0218-1 as SUSE-SLE-SAP-12-SP5-2022-218 is not security or has no CVEs. patches: SUSE-2022-218,SUSE-SLE-SAP-12-SP4-2022-218,SUSE-SLE-SAP-12-SP5-2022-218 SKIP SUSE-RU-2022:0219-1 as SUSE-SLE-Module-SAP-Applications-15-2022-219 is not security or has no CVEs. patches: SUSE-2022-219,SUSE-SLE-Module-SAP-Applications-15-2022-219 SKIP SUSE-RU-2022:0220-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-220 is not security or has no CVEs. patches: SUSE-2022-220,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-220,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-220,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-220 SKIP SUSE-RU-2022:0221-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-221 is not security or has no CVEs. patches: SUSE-2022-221,SUSE-OpenStack-Cloud-9-2022-221,SUSE-OpenStack-Cloud-Crowbar-9-2022-221,SUSE-SLE-SAP-12-SP4-2022-221,SUSE-SLE-SERVER-12-SP4-LTSS-2022-221 SKIP SUSE-RU-2022:0222-1 as SUSE-Storage-7-2022-222 is not security or has no CVEs. patches: SUSE-2022-222,SUSE-SLE-Module-Basesystem-15-SP3-2022-222,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-222,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-222,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-222,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-222,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-222,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-222,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-222,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-222,SUSE-Storage-7-2022-222 SKIP SUSE-RU-2022:0222-2 as SUSE-SLE-Product-RT-15-SP2-2022-222 is not security or has no CVEs. patches: SUSE-2022-222,SUSE-SLE-Product-RT-15-SP2-2022-222 SKIP SUSE-RU-2022:0223-1 as SUSE-SLE-SAP-12-SP3-2022-223 is not security or has no CVEs. patches: SUSE-2022-223,SUSE-SLE-SAP-12-SP3-2022-223 SKIP SUSE-RU-2022:0224-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-224 is not security or has no CVEs. patches: SUSE-2022-224,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-224,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-224,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-224 SKIP SUSE-RU-2022:0225-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-225 is not security or has no CVEs. patches: SUSE-2022-225,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-225 SKIP SUSE-RU-2022:0227-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-227 is not security or has no CVEs. patches: SUSE-2022-227,SUSE-SLE-Module-Basesystem-15-SP3-2022-227,SUSE-SLE-Module-Development-Tools-15-SP3-2022-227 SKIP SUSE-RU-2022:0228-1 as SUSE-SUSE-MicroOS-5.1-2022-228 is not security or has no CVEs. patches: SUSE-2022-228,SUSE-SLE-Module-Basesystem-15-SP3-2022-228,SUSE-SLE-Module-Legacy-15-SP3-2022-228,SUSE-SUSE-MicroOS-5.0-2022-228,SUSE-SUSE-MicroOS-5.1-2022-228 SKIP SUSE-RU-2022:0228-2 as SUSE-SLE-Product-RT-15-SP2-2022-228 is not security or has no CVEs. patches: SUSE-2022-228,SUSE-SLE-Product-RT-15-SP2-2022-228 SKIP SUSE-RU-2022:0273-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-273 is not security or has no CVEs. patches: SUSE-2022-273,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-273,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-273,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-273 ERROR: notice SUSE-RU-2022:0274-1 has no valid patches out of: SUSE-2022-274,SUSE-SLE-Module-Basesystem-15-SP4-2022-274 ERROR: notice SUSE-RU-2022:0275-1 has no valid patches out of: SUSE-2022-275,SUSE-SLE-Module-Basesystem-15-SP4-2022-275 ERROR: notice SUSE-RU-2022:0278-1 has no valid patches out of: SUSE-2022-278,SUSE-SLE-Module-Basesystem-15-SP4-2022-278 ERROR: notice SUSE-RU-2022:0280-1 has no valid patches out of: SUSE-2022-280,SUSE-SLE-Module-Basesystem-15-SP4-2022-280 ERROR: notice SUSE-RU-2022:0281-1 has no valid patches out of: SUSE-2022-281,SUSE-SLE-Module-Basesystem-15-SP4-2022-281 SKIP SUSE-RU-2022:0282-1 as SUSE-2022-282 is not security or has no CVEs. patches: SUSE-2022-282,SUSE-SLE-Module-Basesystem-15-SP4-2022-282 SKIP SUSE-RU-2022:0302-1 as SUSE-SLE-Product-RT-15-SP2-2022-302 is not security or has no CVEs. patches: SUSE-2022-302,SUSE-SLE-Module-Development-Tools-15-SP3-2022-302,SUSE-SLE-Product-RT-15-SP2-2022-302 SKIP SUSE-RU-2022:0303-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-303 is not security or has no CVEs. patches: SUSE-2022-303,SUSE-SLE-Module-Basesystem-15-SP3-2022-303,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-303 ERROR: notice SUSE-RU-2022:0304-1 has no valid patches out of: SUSE-2022-304,SUSE-Ubuntu-18.04-CLIENT-TOOLS-BETA-2022-304 ERROR: notice SUSE-RU-2022:0305-1 has no valid patches out of: SUSE-2022-305,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2022-305 ERROR: notice SUSE-RU-2022:0307-1 has no valid patches out of: SUSE-2022-307,SUSE-Debian-9.0-CLIENT-TOOLS-BETA-2022-307 ERROR: notice SUSE-RU-2022:0308-1 has no valid patches out of: SUSE-2022-308,SUSE-Debian-10-CLIENT-TOOLS-BETA-2022-308 SKIP SUSE-RU-2022:0312-1 as SUSE-SLE-Product-RT-15-SP2-2022-312 is not security or has no CVEs. patches: SUSE-2022-312,SUSE-SLE-Module-Basesystem-15-SP3-2022-312,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-312,SUSE-SLE-Product-RT-15-SP2-2022-312 SKIP SUSE-RU-2022:0313-1 as SUSE-SLE-Product-RT-15-SP2-2022-313 is not security or has no CVEs. patches: SUSE-2022-313,SUSE-SLE-Module-Basesystem-15-SP3-2022-313,SUSE-SLE-Module-Server-Applications-15-SP3-2022-313,SUSE-SLE-Product-RT-15-SP2-2022-313 SKIP SUSE-RU-2022:0314-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-314 is not security or has no CVEs. patches: SUSE-2022-314,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-314,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-314,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-314 SKIP SUSE-RU-2022:0315-1 as SUSE-SLE-SERVER-12-SP5-2022-315 is not security or has no CVEs. patches: SUSE-2022-315,SUSE-SLE-SERVER-12-SP5-2022-315 SKIP SUSE-RU-2022:0316-1 as SUSE-SLE-Product-RT-15-SP2-2022-316 is not security or has no CVEs. patches: SUSE-2022-316,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-316,SUSE-SLE-Product-RT-15-SP2-2022-316 SKIP SUSE-RU-2022:0317-1 as SUSE-SUSE-MicroOS-5.1-2022-317 is not security or has no CVEs. patches: SUSE-2022-317,SUSE-SLE-Module-Basesystem-15-SP3-2022-317,SUSE-SUSE-MicroOS-5.1-2022-317 SKIP SUSE-RU-2022:0318-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-318 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-318,SUSE-2022-318,SUSE-OpenStack-Cloud-8-2022-318,SUSE-OpenStack-Cloud-Crowbar-8-2022-318,SUSE-SLE-SAP-12-SP3-2022-318,SUSE-SLE-SERVER-12-SP2-BCL-2022-318,SUSE-SLE-SERVER-12-SP3-2022-318,SUSE-SLE-SERVER-12-SP3-BCL-2022-318 SKIP SUSE-RU-2022:0319-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-319 is not security or has no CVEs. patches: SUSE-2022-319,SUSE-SLE-Module-Development-Tools-15-SP3-2022-319 SKIP SUSE-RU-2022:0320-1 as SUSE-SLE-SDK-12-SP5-2022-320 is not security or has no CVEs. patches: SUSE-2022-320,SUSE-SLE-HA-12-SP3-2022-320,SUSE-SLE-HA-12-SP4-2022-320,SUSE-SLE-HA-12-SP5-2022-320,SUSE-SLE-SDK-12-SP5-2022-320 SKIP SUSE-RU-2022:0322-1 as SUSE-SUSE-MicroOS-5.1-2022-322 is not security or has no CVEs. patches: SUSE-2022-322,SUSE-SLE-Module-Basesystem-15-SP3-2022-322,SUSE-SLE-Product-RT-15-SP2-2022-322,SUSE-SUSE-MicroOS-5.1-2022-322 SKIP SUSE-RU-2022:0324-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-324 is not security or has no CVEs. patches: SUSE-2022-324,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-324,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-324,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-324 SKIP SUSE-RU-2022:0335-1 as SUSE-SUSE-MicroOS-5.1-2022-335 is not security or has no CVEs. patches: SUSE-2022-335,SUSE-SLE-Module-Basesystem-15-SP3-2022-335,SUSE-SUSE-MicroOS-5.1-2022-335 SKIP SUSE-RU-2022:0336-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-336 is not security or has no CVEs. patches: SUSE-2022-336,SUSE-SLE-INSTALLER-15-SP3-2022-336,SUSE-SLE-Module-Basesystem-15-SP3-2022-336 SKIP SUSE-RU-2022:0337-1 as SUSE-Storage-6-2022-337 is not security or has no CVEs. patches: SUSE-2022-337,SUSE-SLE-INSTALLER-15-SP1-2022-337,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-337,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-337,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-337,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-337,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-337,SUSE-Storage-6-2022-337 SKIP SUSE-RU-2022:0338-1 as SUSE-SLE-Product-SLES_SAP-15-2022-338 is not security or has no CVEs. patches: SUSE-2022-338,SUSE-SLE-INSTALLER-15-2022-338,SUSE-SLE-Product-HPC-15-2022-338,SUSE-SLE-Product-SLES-15-2022-338,SUSE-SLE-Product-SLES_SAP-15-2022-338 SKIP SUSE-RU-2022:0339-1 as SUSE-SLE-Product-RT-15-SP2-2022-339 is not security or has no CVEs. patches: SUSE-2022-339,SUSE-SLE-Module-Basesystem-15-SP3-2022-339,SUSE-SLE-Product-RT-15-SP2-2022-339 SKIP SUSE-RU-2022:0340-1 as SUSE-SUSE-MicroOS-5.1-2022-340 is not security or has no CVEs. patches: SUSE-2022-340,SUSE-SLE-Module-Basesystem-15-SP3-2022-340,SUSE-SLE-Module-Development-Tools-15-SP3-2022-340,SUSE-SLE-Module-Legacy-15-SP3-2022-340,SUSE-SLE-Module-Live-Patching-15-SP3-2022-340,SUSE-SLE-Product-HA-15-SP3-2022-340,SUSE-SLE-Product-WE-15-SP3-2022-340,SUSE-SUSE-MicroOS-5.1-2022-340 SKIP SUSE-RU-2022:0343-1 as SUSE-SUSE-MicroOS-5.1-2022-343 is not security or has no CVEs. patches: SUSE-2022-343,SUSE-SLE-Module-Basesystem-15-SP3-2022-343,SUSE-SUSE-MicroOS-5.1-2022-343 SKIP SUSE-RU-2022:0345-1 as SUSE-Storage-6-2022-345 is not security or has no CVEs. patches: SUSE-2022-345,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-345,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-345,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-345,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-345,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-345,SUSE-Storage-6-2022-345 SKIP SUSE-RU-2022:0346-1 as SUSE-Storage-7-2022-346 is not security or has no CVEs. patches: SUSE-2022-346,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-346,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-346,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-346,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-346,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-346,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-346,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-346,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-346,SUSE-SUSE-MicroOS-5.0-2022-346,SUSE-Storage-7-2022-346 SKIP SUSE-RU-2022:0346-2 as SUSE-SLE-Product-RT-15-SP2-2022-346 is not security or has no CVEs. patches: SUSE-2022-346,SUSE-SLE-Product-RT-15-SP2-2022-346 SKIP SUSE-RU-2022:0347-1 as SUSE-SLE-Module-Public-Cloud-12-2022-347 is not security or has no CVEs. patches: SUSE-2022-347,SUSE-SLE-Module-Public-Cloud-12-2022-347 SKIP SUSE-RU-2022:0348-1 as SUSE-Storage-7-2022-348 is not security or has no CVEs. patches: SUSE-2022-348,SUSE-SLE-INSTALLER-15-SP2-2022-348,SUSE-SLE-Module-Basesystem-15-SP3-2022-348,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-348,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-348,SUSE-SLE-Product-RT-15-SP2-2022-348,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-348,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-348,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-348,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-348,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-348,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-348,SUSE-SUSE-MicroOS-5.0-2022-348,SUSE-SUSE-MicroOS-5.1-2022-348,SUSE-Storage-7-2022-348 SKIP SUSE-RU-2022:0349-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2022-349 is not security or has no CVEs. patches: SUSE-2022-349,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-349 SKIP SUSE-RU-2022:0350-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-350 is not security or has no CVEs. patches: SUSE-2022-350,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-350 SKIP SUSE-RU-2022:0351-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2022-351 is not security or has no CVEs. patches: SUSE-2022-351,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-351 SKIP SUSE-RU-2022:0352-1 as SUSE-SLE-Product-HA-15-SP3-2022-352 is not security or has no CVEs. patches: SUSE-2022-352,SUSE-SLE-Product-HA-15-SP3-2022-352 SKIP SUSE-RU-2022:0353-1 as SUSE-SLE-Product-RT-15-SP2-2022-353 is not security or has no CVEs. patches: SUSE-2022-353,SUSE-SLE-Module-Basesystem-15-SP3-2022-353,SUSE-SLE-Product-RT-15-SP2-2022-353 SKIP SUSE-RU-2022:0357-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-357 is not security or has no CVEs. patches: SUSE-2022-357,SUSE-SLE-Module-Basesystem-15-SP3-2022-357 SKIP SUSE-RU-2022:0368-1 as SUSE-SUSE-MicroOS-5.0-2022-368 is not security or has no CVEs. patches: SUSE-2022-368,SUSE-SLE-Product-RT-15-SP2-2022-368,SUSE-SUSE-MicroOS-5.0-2022-368 SKIP SUSE-RU-2022:0369-1 as SUSE-SUSE-MicroOS-5.1-2022-369 is not security or has no CVEs. patches: SUSE-2022-369,SUSE-SUSE-MicroOS-5.1-2022-369 SKIP SUSE-RU-2022:0373-1 as SUSE-SLE-Product-RT-15-SP2-2022-373 is not security or has no CVEs. patches: SUSE-2022-373,SUSE-SLE-Module-Development-Tools-15-SP3-2022-373,SUSE-SLE-Product-RT-15-SP2-2022-373 SKIP SUSE-RU-2022:0376-1 as SUSE-SLE-Product-HA-15-SP2-2022-376 is not security or has no CVEs. patches: SUSE-2022-376,SUSE-SLE-Product-HA-15-SP1-2022-376,SUSE-SLE-Product-HA-15-SP2-2022-376 SKIP SUSE-RU-2022:0377-1 as SUSE-SLE-Product-HA-15-SP2-2022-377 is not security or has no CVEs. patches: SUSE-2022-377,SUSE-SLE-Product-HA-15-SP2-2022-377 SKIP SUSE-RU-2022:0378-1 as SUSE-SLE-Product-HA-15-SP3-2022-378 is not security or has no CVEs. patches: SUSE-2022-378,SUSE-SLE-Product-HA-15-SP3-2022-378 SKIP SUSE-RU-2022:0379-1 as SUSE-SLE-SERVER-12-SP5-2022-379 is not security or has no CVEs. patches: SUSE-2022-379,SUSE-SLE-SERVER-12-SP5-2022-379 SKIP SUSE-RU-2022:0381-1 as SUSE-SLE-Product-HA-15-SP1-2022-381 is not security or has no CVEs. patches: SUSE-2022-381,SUSE-SLE-Product-HA-15-SP1-2022-381 SKIP SUSE-RU-2022:0382-1 as SUSE-SLE-SERVER-12-SP5-2022-382 is not security or has no CVEs. patches: SUSE-2022-382,SUSE-SLE-HA-12-SP5-2022-382,SUSE-SLE-SDK-12-SP5-2022-382,SUSE-SLE-SERVER-12-SP5-2022-382 SKIP SUSE-RU-2022:0383-1 as SUSE-SUSE-MicroOS-5.1-2022-383 is not security or has no CVEs. patches: SUSE-2022-383,SUSE-SLE-Module-Basesystem-15-SP3-2022-383,SUSE-SLE-Module-Legacy-15-SP3-2022-383,SUSE-SLE-Module-Server-Applications-15-SP3-2022-383,SUSE-SUSE-MicroOS-5.1-2022-383 SKIP SUSE-RU-2022:0386-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-386 is not security or has no CVEs. patches: SUSE-2022-386,SUSE-SLE-INSTALLER-15-SP3-2022-386,SUSE-SLE-Module-Basesystem-15-SP3-2022-386 SKIP SUSE-RU-2022:0387-1 as SUSE-SLE-HA-12-SP4-2022-387 is not security or has no CVEs. patches: SUSE-2022-387,SUSE-SLE-HA-12-SP4-2022-387 SKIP SUSE-RU-2022:0439-1 as SUSE-SLE-Product-SLES-15-SP3-2022-439 is not security or has no CVEs. patches: SUSE-2022-439,SUSE-SLE-INSTALLER-15-SP3-2022-439,SUSE-SLE-Product-SLES-15-SP3-2022-439 SKIP SUSE-RU-2022:0471-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-471 is not security or has no CVEs. patches: SUSE-2022-471,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-471,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-471,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-471 SKIP SUSE-RU-2022:0472-1 as SUSE-SLE-SERVER-12-SP5-2022-472 is not security or has no CVEs. patches: SUSE-2022-472,SUSE-SLE-SDK-12-SP5-2022-472,SUSE-SLE-SERVER-12-SP5-2022-472 SKIP SUSE-RU-2022:0473-1 as SUSE-Storage-6-2022-473 is not security or has no CVEs. patches: SUSE-2022-473,SUSE-SLE-INSTALLER-15-SP1-2022-473,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-473,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-473,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-473,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-473,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-473,SUSE-Storage-6-2022-473 SKIP SUSE-RU-2022:0474-1 as SUSE-SLE-Product-SLES_SAP-15-2022-474 is not security or has no CVEs. patches: SUSE-2022-474,SUSE-SLE-INSTALLER-15-2022-474,SUSE-SLE-Product-HPC-15-2022-474,SUSE-SLE-Product-SLES-15-2022-474,SUSE-SLE-Product-SLES_SAP-15-2022-474 SKIP SUSE-RU-2022:0475-1 as SUSE-SLE-SERVER-12-SP5-2022-475 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-475,SUSE-2022-475,SUSE-OpenStack-Cloud-8-2022-475,SUSE-OpenStack-Cloud-9-2022-475,SUSE-OpenStack-Cloud-Crowbar-8-2022-475,SUSE-OpenStack-Cloud-Crowbar-9-2022-475,SUSE-SLE-SAP-12-SP3-2022-475,SUSE-SLE-SAP-12-SP4-2022-475,SUSE-SLE-SERVER-12-SP2-BCL-2022-475,SUSE-SLE-SERVER-12-SP3-2022-475,SUSE-SLE-SERVER-12-SP3-BCL-2022-475,SUSE-SLE-SERVER-12-SP4-LTSS-2022-475,SUSE-SLE-SERVER-12-SP5-2022-475 SKIP SUSE-RU-2022:0476-1 as SUSE-Storage-7-2022-476 is not security or has no CVEs. patches: SUSE-2022-476,SUSE-SLE-Module-Basesystem-15-SP3-2022-476,SUSE-SLE-Module-Basesystem-15-SP4-2022-476,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-476,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-476,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-476,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-476,SUSE-SLE-Product-RT-15-SP2-2022-476,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-476,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-476,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-476,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-476,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-476,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-476,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-476,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-476,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-476,SUSE-SUSE-MicroOS-5.0-2022-476,SUSE-SUSE-MicroOS-5.1-2022-476,SUSE-Storage-6-2022-476,SUSE-Storage-7-2022-476 SKIP SUSE-RU-2022:0481-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2022-481 is not security or has no CVEs. patches: SUSE-2022-481,SUSE-SLE-SERVER-12-SP5-2022-481,SUSE-SLE-SERVER-INSTALLER-12-SP5-2022-481 SKIP SUSE-RU-2022:0483-1 as SUSE-SLE-HA-12-SP5-2022-483 is not security or has no CVEs. patches: SUSE-2022-483,SUSE-SLE-HA-12-SP4-2022-483,SUSE-SLE-HA-12-SP5-2022-483 SKIP SUSE-RU-2022:0485-1 as SUSE-Storage-7-2022-485 is not security or has no CVEs. patches: SUSE-2022-485,SUSE-SLE-Module-Web-Scripting-15-SP3-2022-485,SUSE-SLE-Module-Web-Scripting-15-SP4-2022-485,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-485,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-485,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-485,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-485,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-485,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-485,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-485,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-485,SUSE-Storage-7-2022-485 SKIP SUSE-RU-2022:0486-1 as SUSE-Storage-7-2022-486 is not security or has no CVEs. patches: SUSE-2022-486,SUSE-SLE-INSTALLER-15-SP2-2022-486,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-486,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-486,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-486,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-486,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-486,SUSE-Storage-7-2022-486 SKIP SUSE-RU-2022:0487-1 as SUSE-SLE-Module-Transactional-Server-15-SP3-2022-487 is not security or has no CVEs. patches: SUSE-2022-487,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-487 SKIP SUSE-RU-2022:0488-1 as SUSE-SLE-SERVER-12-SP5-2022-488 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-488,SUSE-2022-488,SUSE-OpenStack-Cloud-8-2022-488,SUSE-OpenStack-Cloud-9-2022-488,SUSE-OpenStack-Cloud-Crowbar-8-2022-488,SUSE-OpenStack-Cloud-Crowbar-9-2022-488,SUSE-SLE-SAP-12-SP3-2022-488,SUSE-SLE-SAP-12-SP4-2022-488,SUSE-SLE-SDK-12-SP5-2022-488,SUSE-SLE-SERVER-12-SP2-BCL-2022-488,SUSE-SLE-SERVER-12-SP3-2022-488,SUSE-SLE-SERVER-12-SP3-BCL-2022-488,SUSE-SLE-SERVER-12-SP4-LTSS-2022-488,SUSE-SLE-SERVER-12-SP5-2022-488 SKIP SUSE-RU-2022:0489-1 as SUSE-SLE-SERVER-12-SP5-2022-489 is not security or has no CVEs. patches: SUSE-2022-489,SUSE-OpenStack-Cloud-9-2022-489,SUSE-OpenStack-Cloud-Crowbar-9-2022-489,SUSE-SLE-SAP-12-SP4-2022-489,SUSE-SLE-SERVER-12-SP4-LTSS-2022-489,SUSE-SLE-SERVER-12-SP5-2022-489 SKIP SUSE-RU-2022:0490-1 as SUSE-SLE-SERVER-12-SP5-2022-490 is not security or has no CVEs. patches: SUSE-2022-490,SUSE-OpenStack-Cloud-9-2022-490,SUSE-OpenStack-Cloud-Crowbar-9-2022-490,SUSE-SLE-SAP-12-SP4-2022-490,SUSE-SLE-SDK-12-SP5-2022-490,SUSE-SLE-SERVER-12-SP4-LTSS-2022-490,SUSE-SLE-SERVER-12-SP5-2022-490 SKIP SUSE-RU-2022:0511-1 as SUSE-SUSE-MicroOS-5.0-2022-511 is not security or has no CVEs. patches: SUSE-2022-511,SUSE-SLE-Product-RT-15-SP2-2022-511,SUSE-SUSE-MicroOS-5.0-2022-511 SKIP SUSE-RU-2022:0512-1 as SUSE-Storage-7-2022-512 is not security or has no CVEs. patches: SUSE-2022-512,SUSE-SLE-INSTALLER-15-SP2-2022-512,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-512,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-512,SUSE-SLE-Product-RT-15-SP2-2022-512,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-512,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-512,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-512,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-512,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-512,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-512,SUSE-Storage-7-2022-512 SKIP SUSE-RU-2022:0513-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2022-513 is not security or has no CVEs. patches: SUSE-2022-513,SUSE-SLE-Module-Basesystem-15-SP3-2022-513,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-513,SUSE-SLE-Module-Server-Applications-15-SP3-2022-513 SKIP SUSE-RU-2022:0514-1 as SUSE-SLE-SERVER-12-SP5-2022-514 is not security or has no CVEs. patches: SUSE-2022-514,SUSE-SLE-SERVER-12-SP5-2022-514 SKIP SUSE-RU-2022:0515-1 as SUSE-Storage-6-2022-515 is not security or has no CVEs. patches: SUSE-2022-515,SUSE-SLE-INSTALLER-15-SP1-2022-515,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-515,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-515,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-515,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-515,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-515,SUSE-Storage-6-2022-515 SKIP SUSE-RU-2022:0517-1 as SUSE-SLE-SERVER-12-SP5-2022-517 is not security or has no CVEs. patches: SUSE-2022-517,SUSE-OpenStack-Cloud-9-2022-517,SUSE-OpenStack-Cloud-Crowbar-9-2022-517,SUSE-SLE-SAP-12-SP4-2022-517,SUSE-SLE-SDK-12-SP5-2022-517,SUSE-SLE-SERVER-12-SP4-LTSS-2022-517,SUSE-SLE-SERVER-12-SP5-2022-517 SKIP SUSE-RU-2022:0519-1 as SUSE-SUSE-MicroOS-5.1-2022-519 is not security or has no CVEs. patches: SUSE-2022-519,SUSE-SLE-Module-Basesystem-15-SP3-2022-519,SUSE-SLE-Module-Server-Applications-15-SP3-2022-519,SUSE-SLE-Product-RT-15-SP2-2022-519,SUSE-SUSE-MicroOS-5.1-2022-519 SKIP SUSE-RU-2022:0520-1 as SUSE-SUSE-MicroOS-5.1-2022-520 is not security or has no CVEs. patches: SUSE-2022-520,SUSE-SLE-Module-Basesystem-15-SP3-2022-520,SUSE-SLE-Module-Development-Tools-15-SP3-2022-520,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-520,SUSE-SLE-Module-Python2-15-SP3-2022-520,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-520,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-520,SUSE-SUSE-MicroOS-5.1-2022-520 SKIP SUSE-RU-2022:0521-1 as SUSE-SLE-SERVER-12-SP5-2022-521 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-521,SUSE-2022-521,SUSE-OpenStack-Cloud-8-2022-521,SUSE-OpenStack-Cloud-9-2022-521,SUSE-OpenStack-Cloud-Crowbar-8-2022-521,SUSE-OpenStack-Cloud-Crowbar-9-2022-521,SUSE-SLE-SAP-12-SP3-2022-521,SUSE-SLE-SAP-12-SP4-2022-521,SUSE-SLE-SERVER-12-SP2-BCL-2022-521,SUSE-SLE-SERVER-12-SP3-2022-521,SUSE-SLE-SERVER-12-SP3-BCL-2022-521,SUSE-SLE-SERVER-12-SP4-LTSS-2022-521,SUSE-SLE-SERVER-12-SP5-2022-521 SKIP SUSE-RU-2022:0522-1 as SUSE-Storage-7-2022-522 is not security or has no CVEs. patches: SUSE-2022-522,SUSE-SLE-Module-Basesystem-15-SP3-2022-522,SUSE-SLE-Module-Basesystem-15-SP4-2022-522,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-522,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-522,SUSE-SLE-Product-HPC-15-2022-522,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-522,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-522,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-522,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-522,SUSE-SLE-Product-RT-15-SP2-2022-522,SUSE-SLE-Product-SLES-15-2022-522,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-522,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-522,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-522,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-522,SUSE-SLE-Product-SLES_SAP-15-2022-522,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-522,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-522,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-522,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-522,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-522,SUSE-Storage-6-2022-522,SUSE-Storage-7-2022-522 SKIP SUSE-RU-2022:0523-1 as SUSE-Storage-7-2022-523 is not security or has no CVEs. patches: SUSE-2022-523,SUSE-SLE-INSTALLER-15-SP1-2022-523,SUSE-SLE-Module-Basesystem-15-SP4-2022-523,SUSE-SLE-Product-HPC-15-2022-523,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-523,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-523,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-523,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-523,SUSE-SLE-Product-RT-15-SP2-2022-523,SUSE-SLE-Product-SLES-15-2022-523,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-523,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-523,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-523,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-523,SUSE-SLE-Product-SLES_SAP-15-2022-523,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-523,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-523,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-523,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-523,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-523,SUSE-Storage-6-2022-523,SUSE-Storage-7-2022-523 SKIP SUSE-RU-2022:0527-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-527 is not security or has no CVEs. patches: SUSE-2022-527,SUSE-SLE-Module-Basesystem-15-SP3-2022-527 SKIP SUSE-RU-2022:0528-1 as SUSE-SLE-Product-HA-15-SP3-2022-528 is not security or has no CVEs. patches: SUSE-2022-528,SUSE-SLE-Product-HA-15-SP3-2022-528 SKIP SUSE-RU-2022:0532-1 as SUSE-SLE-Product-HA-15-SP1-2022-532 is not security or has no CVEs. patches: SUSE-2022-532,SUSE-SLE-Product-HA-15-SP1-2022-532 SKIP SUSE-RU-2022:0533-1 as SUSE-SUSE-MicroOS-5.1-2022-533 is not security or has no CVEs. patches: SUSE-2022-533,SUSE-SLE-Module-Development-Tools-15-SP3-2022-533,SUSE-SLE-Product-RT-15-SP2-2022-533,SUSE-SUSE-MicroOS-5.0-2022-533,SUSE-SUSE-MicroOS-5.1-2022-533 SKIP SUSE-RU-2022:0535-1 as SUSE-SLE-WE-12-SP5-2022-535 is not security or has no CVEs. patches: SUSE-2022-535,SUSE-SLE-SDK-12-SP5-2022-535,SUSE-SLE-WE-12-SP5-2022-535 SKIP SUSE-RU-2022:0536-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-536 is not security or has no CVEs. patches: SUSE-2022-536,SUSE-SLE-Module-Public-Cloud-12-2022-536,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-536 SKIP SUSE-RU-2022:0537-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-537 is not security or has no CVEs. patches: SUSE-2022-537,SUSE-SLE-Module-Basesystem-15-SP3-2022-537 SKIP SUSE-RU-2022:0545-1 as SUSE-SLE-Module-Containers-15-SP3-2022-545 is not security or has no CVEs. patches: SUSE-2022-545,SUSE-SLE-Module-Containers-15-SP3-2022-545 SKIP SUSE-RU-2022:0546-1 as SUSE-Storage-7-2022-546 is not security or has no CVEs. patches: SUSE-2022-546,SUSE-SLE-Module-Development-Tools-15-SP3-2022-546,SUSE-SLE-Module-Development-Tools-15-SP4-2022-546,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-546,SUSE-SLE-Module-Server-Applications-15-SP3-2022-546,SUSE-SLE-Module-Server-Applications-15-SP4-2022-546,SUSE-SLE-Product-HA-15-2022-546,SUSE-SLE-Product-HA-15-SP1-2022-546,SUSE-SLE-Product-HA-15-SP2-2022-546,SUSE-SLE-Product-HA-15-SP3-2022-546,SUSE-SLE-Product-HA-15-SP4-2022-546,SUSE-SLE-Product-HPC-15-2022-546,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-546,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-546,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-546,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-546,SUSE-SLE-Product-RT-15-SP2-2022-546,SUSE-SLE-Product-SLES-15-2022-546,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-546,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-546,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-546,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-546,SUSE-SLE-Product-SLES_SAP-15-2022-546,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-546,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-546,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-546,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-546,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-546,SUSE-Storage-6-2022-546,SUSE-Storage-7-2022-546 SKIP SUSE-RU-2022:0547-1 as SUSE-SLE-Module-Containers-12-2022-547 is not security or has no CVEs. patches: SUSE-2022-547,SUSE-SLE-Module-Containers-12-2022-547 SKIP SUSE-RU-2022:0548-1 as SUSE-SUSE-MicroOS-5.1-2022-548 is not security or has no CVEs. patches: SUSE-2022-548,SUSE-SLE-Module-Basesystem-15-SP3-2022-548,SUSE-SUSE-MicroOS-5.1-2022-548 SKIP SUSE-RU-2022:0557-1 as SUSE-SLE-HA-12-SP3-2022-557 is not security or has no CVEs. patches: SUSE-2022-557,SUSE-SLE-HA-12-SP3-2022-557 SKIP SUSE-RU-2022:0566-1 as SUSE-SLE-SERVER-12-SP5-2022-566 is not security or has no CVEs. patches: SUSE-2022-566,SUSE-SLE-SDK-12-SP5-2022-566,SUSE-SLE-SERVER-12-SP5-2022-566 SKIP SUSE-RU-2022:0567-1 as SUSE-SLE-SERVER-12-SP5-2022-567 is not security or has no CVEs. patches: SUSE-2022-567,SUSE-SLE-SERVER-12-SP5-2022-567 SKIP SUSE-RU-2022:0572-1 as SUSE-SUSE-MicroOS-5.1-2022-572 is not security or has no CVEs. patches: SUSE-2022-572,SUSE-SLE-Module-Basesystem-15-SP3-2022-572,SUSE-SLE-Product-RT-15-SP2-2022-572,SUSE-SUSE-MicroOS-5.0-2022-572,SUSE-SUSE-MicroOS-5.1-2022-572 SKIP SUSE-RU-2022:0573-1 as SUSE-SLE-SERVER-12-SP5-2022-573 is not security or has no CVEs. patches: SUSE-2022-573,SUSE-SLE-SDK-12-SP5-2022-573,SUSE-SLE-SERVER-12-SP5-2022-573 SKIP SUSE-RU-2022:0579-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-579 is not security or has no CVEs. patches: SUSE-2022-579,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-579,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-579,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-579 SKIP SUSE-RU-2022:0580-1 as SUSE-SUSE-MicroOS-5.1-2022-580 is not security or has no CVEs. patches: SUSE-2022-580,SUSE-SLE-Module-Basesystem-15-SP3-2022-580,SUSE-SUSE-MicroOS-5.1-2022-580 SKIP SUSE-RU-2022:0582-1 as SUSE-Storage-6-2022-582 is not security or has no CVEs. patches: SUSE-2022-582,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-582,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-582,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-582,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-582,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-582,SUSE-Storage-6-2022-582 SKIP SUSE-RU-2022:0583-1 as SUSE-Storage-7-2022-583 is not security or has no CVEs. patches: SUSE-2022-583,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-583,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-583,SUSE-SLE-Product-RT-15-SP2-2022-583,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-583,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-583,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-583,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-583,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-583,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-583,SUSE-SUSE-MicroOS-5.0-2022-583,SUSE-Storage-7-2022-583 SKIP SUSE-RU-2022:0584-1 as SUSE-SUSE-MicroOS-5.1-2022-584 is not security or has no CVEs. patches: SUSE-2022-584,SUSE-SLE-Module-Basesystem-15-SP3-2022-584,SUSE-SLE-Module-Server-Applications-15-SP3-2022-584,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-584,SUSE-SUSE-MicroOS-5.1-2022-584 SKIP SUSE-RU-2022:0585-1 as SUSE-SLE-Product-SLES_SAP-15-2022-585 is not security or has no CVEs. patches: SUSE-2022-585,SUSE-SLE-Product-HPC-15-2022-585,SUSE-SLE-Product-SLES-15-2022-585,SUSE-SLE-Product-SLES_SAP-15-2022-585 SKIP SUSE-RU-2022:0586-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2022-586 is not security or has no CVEs. patches: SUSE-2022-586,SUSE-SLE-Manager-Tools-12-2022-586,SUSE-SLE-Module-Adv-Systems-Management-12-2022-586 ERROR: notice SUSE-RU-2022:0587-1 has no valid patches out of: SUSE-2022-587,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-587 ERROR: notice SUSE-RU-2022:0588-1 has no valid patches out of: SUSE-2022-588,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2022-588 SKIP SUSE-RU-2022:0593-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-593 is not security or has no CVEs. patches: SUSE-2022-593,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-593 SKIP SUSE-RU-2022:0595-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-595 is not security or has no CVEs. patches: SUSE-2022-595,SUSE-SLE-Manager-Tools-15-2022-595,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-595,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-595 SKIP SUSE-RU-2022:0596-1 as SUSE-SLE-Manager-Tools-12-2022-596 is not security or has no CVEs. patches: SUSE-2022-596,SUSE-SLE-Manager-Tools-12-2022-596 SKIP SUSE-RU-2022:0597-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-597 is not security or has no CVEs. patches: SUSE-2022-597,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-597 SKIP SUSE-RU-2022:0598-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-598 is not security or has no CVEs. patches: SUSE-2022-598,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2022-598,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2022-598,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-598 SKIP SUSE-RU-2022:0602-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-602 is not security or has no CVEs. patches: SUSE-2022-602,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-602 SKIP SUSE-RU-2022:0603-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-603 is not security or has no CVEs. patches: SUSE-2022-603,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-603 SKIP SUSE-RU-2022:0604-1 as SUSE-SLE-Product-RT-15-SP2-2022-604 is not security or has no CVEs. patches: SUSE-2022-604,SUSE-SLE-Module-Basesystem-15-SP3-2022-604,SUSE-SLE-Module-Server-Applications-15-SP3-2022-604,SUSE-SLE-Product-RT-15-SP2-2022-604 SKIP SUSE-RU-2022:0651-1 as SUSE-SLE-Product-HA-15-SP3-2022-651 is not security or has no CVEs. patches: SUSE-2022-651,SUSE-SLE-Product-HA-15-SP2-2022-651,SUSE-SLE-Product-HA-15-SP3-2022-651 SKIP SUSE-RU-2022:0652-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-652 is not security or has no CVEs. patches: SUSE-2022-652,SUSE-SLE-Module-Basesystem-15-SP3-2022-652 SKIP SUSE-RU-2022:0656-1 as SUSE-SLE-SERVER-12-SP5-2022-656 is not security or has no CVEs. patches: SUSE-2022-656,SUSE-SLE-SERVER-12-SP5-2022-656 SKIP SUSE-RU-2022:0673-1 as SUSE-SLE-SERVER-12-SP5-2022-673 is not security or has no CVEs. patches: SUSE-2022-673,SUSE-SLE-SDK-12-SP5-2022-673,SUSE-SLE-SERVER-12-SP5-2022-673 SKIP SUSE-RU-2022:0674-1 as SUSE-SUSE-MicroOS-5.1-2022-674 is not security or has no CVEs. patches: SUSE-2022-674,SUSE-SLE-INSTALLER-15-SP3-2022-674,SUSE-SLE-Module-Basesystem-15-SP3-2022-674,SUSE-SLE-Product-RT-15-SP2-2022-674,SUSE-SUSE-MicroOS-5.0-2022-674,SUSE-SUSE-MicroOS-5.1-2022-674 SKIP SUSE-RU-2022:0680-1 as SUSE-SLE-Module-Public-Cloud-12-2022-680 is not security or has no CVEs. patches: SUSE-2022-680,SUSE-SLE-Module-Public-Cloud-12-2022-680 SKIP SUSE-RU-2022:0681-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-681 is not security or has no CVEs. patches: SUSE-2022-681,SUSE-SLE-Module-Public-Cloud-15-2022-681,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-681,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-681,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-681,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-681 SKIP SUSE-RU-2022:0682-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-682 is not security or has no CVEs. patches: SUSE-2022-682,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-682,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-682,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-682 SKIP SUSE-RU-2022:0683-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-683 is not security or has no CVEs. patches: SUSE-2022-683,SUSE-SLE-Module-Public-Cloud-12-2022-683,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-683 SKIP SUSE-RU-2022:0684-1 as SUSE-SLE-SERVER-12-SP5-2022-684 is not security or has no CVEs. patches: SUSE-2022-684,SUSE-SLE-SERVER-12-SP5-2022-684 SKIP SUSE-RU-2022:0685-1 as SUSE-SLE-Module-HPC-15-SP3-2022-685 is not security or has no CVEs. patches: SUSE-2022-685,SUSE-SLE-Module-HPC-15-SP3-2022-685 SKIP SUSE-RU-2022:0686-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-686 is not security or has no CVEs. patches: SUSE-2022-686,SUSE-SLE-Module-Basesystem-15-SP3-2022-686 SKIP SUSE-RU-2022:0687-1 as SUSE-SUSE-MicroOS-5.1-2022-687 is not security or has no CVEs. patches: SUSE-2022-687,SUSE-SLE-Module-Basesystem-15-SP3-2022-687,SUSE-SLE-Module-Server-Applications-15-SP3-2022-687,SUSE-SUSE-MicroOS-5.1-2022-687 SKIP SUSE-RU-2022:0688-1 as SUSE-SLE-SERVER-12-SP5-2022-688 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-688,SUSE-2022-688,SUSE-OpenStack-Cloud-8-2022-688,SUSE-OpenStack-Cloud-9-2022-688,SUSE-OpenStack-Cloud-Crowbar-8-2022-688,SUSE-OpenStack-Cloud-Crowbar-9-2022-688,SUSE-SLE-SAP-12-SP3-2022-688,SUSE-SLE-SAP-12-SP4-2022-688,SUSE-SLE-SERVER-12-SP2-BCL-2022-688,SUSE-SLE-SERVER-12-SP3-2022-688,SUSE-SLE-SERVER-12-SP3-BCL-2022-688,SUSE-SLE-SERVER-12-SP4-LTSS-2022-688,SUSE-SLE-SERVER-12-SP5-2022-688 SKIP SUSE-RU-2022:0689-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-689 is not security or has no CVEs. patches: SUSE-2022-689,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-689,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-689 SKIP SUSE-RU-2022:0691-1 as SUSE-SLE-Product-HA-15-SP2-2022-691 is not security or has no CVEs. patches: SUSE-2022-691,SUSE-SLE-Product-HA-15-SP2-2022-691 SKIP SUSE-RU-2022:0692-1 as SUSE-Storage-7-2022-692 is not security or has no CVEs. patches: SUSE-2022-692,SUSE-SLE-Module-Basesystem-15-SP3-2022-692,SUSE-SLE-Module-Basesystem-15-SP4-2022-692,SUSE-SLE-Product-HPC-15-2022-692,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-692,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-692,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-692,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-692,SUSE-SLE-Product-RT-15-SP2-2022-692,SUSE-SLE-Product-SLES-15-2022-692,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-692,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-692,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-692,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-692,SUSE-SLE-Product-SLES_SAP-15-2022-692,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-692,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-692,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-692,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-692,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-692,SUSE-Storage-6-2022-692,SUSE-Storage-7-2022-692 SKIP SUSE-RU-2022:0697-1 as SUSE-SUSE-MicroOS-5.1-2022-697 is not security or has no CVEs. patches: SUSE-2022-697,SUSE-SLE-INSTALLER-15-SP3-2022-697,SUSE-SLE-Module-Basesystem-15-SP3-2022-697,SUSE-SUSE-MicroOS-5.1-2022-697 SKIP SUSE-RU-2022:0700-1 as SUSE-SLE-SERVER-12-SP5-2022-700 is not security or has no CVEs. patches: SUSE-2022-700,SUSE-SLE-SDK-12-SP5-2022-700,SUSE-SLE-SERVER-12-SP5-2022-700 SKIP SUSE-RU-2022:0701-1 as SUSE-Storage-7-2022-701 is not security or has no CVEs. patches: SUSE-2022-701,SUSE-SLE-Product-HPC-15-2022-701,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-701,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-701,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-701,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-701,SUSE-SLE-Product-RT-15-SP2-2022-701,SUSE-SLE-Product-SLES-15-2022-701,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-701,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-701,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-701,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-701,SUSE-SLE-Product-SLES_SAP-15-2022-701,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-701,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-701,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-701,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-701,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-701,SUSE-SUSE-MicroOS-5.0-2022-701,SUSE-Storage-6-2022-701,SUSE-Storage-7-2022-701 SKIP SUSE-RU-2022:0706-1 as SUSE-SUSE-MicroOS-5.1-2022-706 is not security or has no CVEs. patches: SUSE-2022-706,SUSE-SUSE-MicroOS-5.1-2022-706 SKIP SUSE-RU-2022:0707-1 as SUSE-SUSE-MicroOS-5.1-2022-707 is not security or has no CVEs. patches: SUSE-2022-707,SUSE-SUSE-MicroOS-5.1-2022-707 SKIP SUSE-RU-2022:0708-1 as SUSE-SLE-Product-RT-15-SP2-2022-708 is not security or has no CVEs. patches: SUSE-2022-708,SUSE-SLE-Product-RT-15-SP2-2022-708 SKIP SUSE-RU-2022:0710-1 as SUSE-SLE-SERVER-12-SP5-2022-710 is not security or has no CVEs. patches: SUSE-2022-710,SUSE-SLE-HA-12-SP5-2022-710,SUSE-SLE-SDK-12-SP5-2022-710,SUSE-SLE-SERVER-12-SP5-2022-710 SKIP SUSE-RU-2022:0711-1 as SUSE-SUSE-MicroOS-5.1-2022-711 is not security or has no CVEs. patches: SUSE-2022-711,SUSE-SLE-Module-Basesystem-15-SP3-2022-711,SUSE-SUSE-MicroOS-5.1-2022-711 SKIP SUSE-RU-2022:0728-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-728 is not security or has no CVEs. patches: SUSE-2022-728,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-728 SKIP SUSE-RU-2022:0738-1 as SUSE-SLE-SERVER-12-SP5-2022-738 is not security or has no CVEs. patches: SUSE-2022-738,SUSE-SLE-SERVER-12-SP5-2022-738 SKIP SUSE-RU-2022:0739-1 as SUSE-SUSE-MicroOS-5.1-2022-739 is not security or has no CVEs. patches: SUSE-2022-739,SUSE-SLE-Module-Basesystem-15-SP3-2022-739,SUSE-SUSE-MicroOS-5.1-2022-739 SKIP SUSE-RU-2022:0740-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-740 is not security or has no CVEs. patches: SUSE-2022-740,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-740,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-740,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-740 ERROR: notice SUSE-RU-2022:0744-1 has no valid patches out of: SUSE-2022-744,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2022-744 ERROR: notice SUSE-RU-2022:0745-1 has no valid patches out of: SUSE-2022-745,SUSE-Debian-10-CLIENT-TOOLS-BETA-2022-745 ERROR: notice SUSE-RU-2022:0746-1 has no valid patches out of: SUSE-2022-746,SUSE-Debian-9.0-CLIENT-TOOLS-BETA-2022-746 ERROR: notice SUSE-RU-2022:0747-1 has no valid patches out of: SUSE-2022-747,SUSE-Ubuntu-18.04-CLIENT-TOOLS-BETA-2022-747 SKIP SUSE-RU-2022:0771-1 as SUSE-SUSE-MicroOS-5.1-2022-771 is not security or has no CVEs. patches: SUSE-2022-771,SUSE-SLE-Module-Basesystem-15-SP3-2022-771,SUSE-SUSE-MicroOS-5.1-2022-771 SKIP SUSE-RU-2022:0771-2 as SUSE-SUSE-MicroOS-5.2-2022-771 is not security or has no CVEs. patches: SUSE-2022-771,SUSE-SUSE-MicroOS-5.2-2022-771 SKIP SUSE-RU-2022:0772-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-772 is not security or has no CVEs. patches: SUSE-2022-772,SUSE-SLE-Module-Basesystem-15-SP3-2022-772 SKIP SUSE-RU-2022:0773-1 as SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-773 is not security or has no CVEs. patches: SUSE-2022-773,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-773 SKIP SUSE-RU-2022:0775-1 as SUSE-SUSE-MicroOS-5.1-2022-775 is not security or has no CVEs. patches: SUSE-2022-775,SUSE-SLE-Module-Basesystem-15-SP3-2022-775,SUSE-SUSE-MicroOS-5.1-2022-775 SKIP SUSE-RU-2022:0776-1 as SUSE-SLE-Product-RT-15-SP2-2022-776 is not security or has no CVEs. patches: SUSE-2022-776,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-776,SUSE-SLE-Product-RT-15-SP2-2022-776 SKIP SUSE-RU-2022:0780-1 as SUSE-SUSE-MicroOS-5.1-2022-780 is not security or has no CVEs. patches: SUSE-2022-780,SUSE-SLE-Module-Basesystem-15-SP3-2022-780,SUSE-SUSE-MicroOS-5.1-2022-780 SKIP SUSE-RU-2022:0785-1 as SUSE-SLE-SERVER-12-SP5-2022-785 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-785,SUSE-2022-785,SUSE-OpenStack-Cloud-8-2022-785,SUSE-OpenStack-Cloud-9-2022-785,SUSE-OpenStack-Cloud-Crowbar-8-2022-785,SUSE-OpenStack-Cloud-Crowbar-9-2022-785,SUSE-SLE-SAP-12-SP3-2022-785,SUSE-SLE-SAP-12-SP4-2022-785,SUSE-SLE-SERVER-12-SP2-BCL-2022-785,SUSE-SLE-SERVER-12-SP3-2022-785,SUSE-SLE-SERVER-12-SP3-BCL-2022-785,SUSE-SLE-SERVER-12-SP4-LTSS-2022-785,SUSE-SLE-SERVER-12-SP5-2022-785 SKIP SUSE-RU-2022:0787-1 as SUSE-SUSE-MicroOS-5.1-2022-787 is not security or has no CVEs. patches: SUSE-2022-787,SUSE-SLE-Module-Basesystem-15-SP3-2022-787,SUSE-SLE-Module-Development-Tools-15-SP3-2022-787,SUSE-SLE-Module-Legacy-15-SP3-2022-787,SUSE-SLE-Product-RT-15-SP2-2022-787,SUSE-SUSE-MicroOS-5.0-2022-787,SUSE-SUSE-MicroOS-5.1-2022-787 SKIP SUSE-RU-2022:0788-1 as SUSE-Storage-7-2022-788 is not security or has no CVEs. patches: SUSE-2022-788,SUSE-SLE-INSTALLER-15-SP2-2022-788,SUSE-SLE-Module-Basesystem-15-SP3-2022-788,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-788,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-788,SUSE-SLE-Product-RT-15-SP2-2022-788,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-788,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-788,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-788,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-788,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-788,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-788,SUSE-SUSE-MicroOS-5.0-2022-788,SUSE-SUSE-MicroOS-5.1-2022-788,SUSE-Storage-7-2022-788 SKIP SUSE-RU-2022:0788-2 as SUSE-SUSE-MicroOS-5.2-2022-788 is not security or has no CVEs. patches: SUSE-2022-788,SUSE-SUSE-MicroOS-5.2-2022-788 SKIP SUSE-RU-2022:0789-1 as SUSE-SUSE-MicroOS-5.1-2022-789 is not security or has no CVEs. patches: SUSE-2022-789,SUSE-SLE-Module-Basesystem-15-SP3-2022-789,SUSE-SLE-Product-RT-15-SP2-2022-789,SUSE-SUSE-MicroOS-5.0-2022-789,SUSE-SUSE-MicroOS-5.1-2022-789 SKIP SUSE-RU-2022:0789-2 as SUSE-SUSE-MicroOS-5.2-2022-789 is not security or has no CVEs. patches: SUSE-2022-789,SUSE-SUSE-MicroOS-5.2-2022-789 SKIP SUSE-RU-2022:0790-1 as SUSE-SLE-SDK-12-SP5-2022-790 is not security or has no CVEs. patches: SUSE-2022-790,SUSE-SLE-HA-12-SP5-2022-790,SUSE-SLE-SDK-12-SP5-2022-790 SKIP SUSE-RU-2022:0791-1 as SUSE-Storage-7-2022-791 is not security or has no CVEs. patches: SUSE-2022-791,SUSE-SLE-Module-Basesystem-15-SP3-2022-791,SUSE-SLE-Module-Basesystem-15-SP4-2022-791,SUSE-SLE-Product-HPC-15-2022-791,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-791,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-791,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-791,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-791,SUSE-SLE-Product-RT-15-SP2-2022-791,SUSE-SLE-Product-SLES-15-2022-791,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-791,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-791,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-791,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-791,SUSE-SLE-Product-SLES_SAP-15-2022-791,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-791,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-791,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-791,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-791,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-791,SUSE-Storage-6-2022-791,SUSE-Storage-7-2022-791 SKIP SUSE-RU-2022:0792-1 as SUSE-Storage-7-2022-792 is not security or has no CVEs. patches: SUSE-2022-792,SUSE-SLE-Module-Basesystem-15-SP3-2022-792,SUSE-SLE-Module-Basesystem-15-SP4-2022-792,SUSE-SLE-Product-HPC-15-2022-792,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-792,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-792,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-792,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-792,SUSE-SLE-Product-RT-15-SP2-2022-792,SUSE-SLE-Product-SLES-15-2022-792,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-792,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-792,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-792,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-792,SUSE-SLE-Product-SLES_SAP-15-2022-792,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-792,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-792,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-792,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-792,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-792,SUSE-SUSE-MicroOS-5.0-2022-792,SUSE-SUSE-MicroOS-5.1-2022-792,SUSE-Storage-6-2022-792,SUSE-Storage-7-2022-792 SKIP SUSE-RU-2022:0792-2 as SUSE-SUSE-MicroOS-5.2-2022-792 is not security or has no CVEs. patches: SUSE-2022-792,SUSE-SUSE-MicroOS-5.2-2022-792 SKIP SUSE-RU-2022:0793-1 as SUSE-SLE-Manager-Tools-15-2022-793 is not security or has no CVEs. patches: SUSE-2022-793,SUSE-SLE-Manager-Tools-15-2022-793 SKIP SUSE-RU-2022:0794-1 as SUSE-SLE-Manager-Tools-12-2022-794 is not security or has no CVEs. patches: SUSE-2022-794,SUSE-SLE-Manager-Tools-12-2022-794 SKIP SUSE-RU-2022:0795-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-795 is not security or has no CVEs. patches: SUSE-2022-795,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-795,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-795,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-795 SKIP SUSE-RU-2022:0796-1 as SUSE-Storage-6-2022-796 is not security or has no CVEs. patches: SUSE-2022-796,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-796,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-796,SUSE-Storage-6-2022-796 SKIP SUSE-RU-2022:0797-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-797 is not security or has no CVEs. patches: SUSE-2022-797,SUSE-SLE-Manager-Tools-15-2022-797,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-797,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-797 SKIP SUSE-RU-2022:0798-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-798 is not security or has no CVEs. patches: SUSE-2022-798,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-798 SKIP SUSE-RU-2022:0799-1 as SUSE-SUSE-MicroOS-5.1-2022-799 is not security or has no CVEs. patches: SUSE-2022-799,SUSE-SLE-Module-Basesystem-15-SP3-2022-799,SUSE-SUSE-MicroOS-5.1-2022-799 SKIP SUSE-RU-2022:0800-1 as SUSE-SLE-SERVER-12-SP5-2022-800 is not security or has no CVEs. patches: SUSE-2022-800,SUSE-SLE-SDK-12-SP5-2022-800,SUSE-SLE-SERVER-12-SP5-2022-800 SKIP SUSE-RU-2022:0801-1 as SUSE-SLE-SERVER-12-SP5-2022-801 is not security or has no CVEs. patches: SUSE-2022-801,SUSE-SLE-SERVER-12-SP5-2022-801 SKIP SUSE-RU-2022:0806-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-806 is not security or has no CVEs. patches: SUSE-2022-806,SUSE-SLE-Module-Basesystem-15-SP3-2022-806 SKIP SUSE-RU-2022:0807-1 as SUSE-SLE-SERVER-12-SP5-2022-807 is not security or has no CVEs. patches: SUSE-2022-807,SUSE-SLE-SERVER-12-SP5-2022-807 SKIP SUSE-RU-2022:0808-1 as SUSE-SUSE-MicroOS-5.1-2022-808 is not security or has no CVEs. patches: SUSE-2022-808,SUSE-SLE-Module-Basesystem-15-SP3-2022-808,SUSE-SLE-Product-RT-15-SP2-2022-808,SUSE-SUSE-MicroOS-5.0-2022-808,SUSE-SUSE-MicroOS-5.1-2022-808 SKIP SUSE-RU-2022:0808-2 as SUSE-SUSE-MicroOS-5.2-2022-808 is not security or has no CVEs. patches: SUSE-2022-808,SUSE-SUSE-MicroOS-5.2-2022-808 SKIP SUSE-RU-2022:0812-1 as SUSE-SLE-HA-12-SP5-2022-812 is not security or has no CVEs. patches: SUSE-2022-812,SUSE-SLE-HA-12-SP4-2022-812,SUSE-SLE-HA-12-SP5-2022-812 SKIP SUSE-RU-2022:0827-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-827 is not security or has no CVEs. patches: SUSE-2022-827,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-827,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-827,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-827 SKIP SUSE-RU-2022:0833-1 as SUSE-SUSE-MicroOS-5.1-2022-833 is not security or has no CVEs. patches: SUSE-2022-833,SUSE-SLE-Module-Basesystem-15-SP3-2022-833,SUSE-SLE-Module-Basesystem-15-SP4-2022-833,SUSE-SUSE-MicroOS-5.1-2022-833 SKIP SUSE-RU-2022:0833-2 as SUSE-SUSE-MicroOS-5.2-2022-833 is not security or has no CVEs. patches: SUSE-2022-833,SUSE-SUSE-MicroOS-5.2-2022-833 SKIP SUSE-RU-2022:0834-1 as SUSE-SLE-Product-RT-15-SP2-2022-834 is not security or has no CVEs. patches: SUSE-2022-834,SUSE-SLE-Product-RT-15-SP2-2022-834 SKIP SUSE-RU-2022:0835-1 as SUSE-SLE-Product-RT-15-SP2-2022-835 is not security or has no CVEs. patches: SUSE-2022-835,SUSE-SLE-Product-RT-15-SP2-2022-835 SKIP SUSE-RU-2022:0836-1 as SUSE-SLE-Product-RT-15-SP2-2022-836 is not security or has no CVEs. patches: SUSE-2022-836,SUSE-SLE-Module-Development-Tools-15-SP3-2022-836,SUSE-SLE-Product-RT-15-SP2-2022-836 SKIP SUSE-RU-2022:0846-1 as SUSE-SLE-Product-RT-15-SP2-2022-846 is not security or has no CVEs. patches: SUSE-2022-846,SUSE-SLE-Module-Basesystem-15-SP3-2022-846,SUSE-SLE-Module-Development-Tools-15-SP3-2022-846,SUSE-SLE-Product-RT-15-SP2-2022-846 SKIP SUSE-RU-2022:0848-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-848 is not security or has no CVEs. patches: SUSE-2022-848,SUSE-SLE-Module-Development-Tools-15-SP3-2022-848 SKIP SUSE-RU-2022:0849-1 as SUSE-SUSE-MicroOS-5.1-2022-849 is not security or has no CVEs. patches: SUSE-2022-849,SUSE-SLE-Module-Development-Tools-15-SP3-2022-849,SUSE-SLE-Product-RT-15-SP2-2022-849,SUSE-SUSE-MicroOS-5.0-2022-849,SUSE-SUSE-MicroOS-5.1-2022-849 SKIP SUSE-RU-2022:0852-1 as SUSE-Storage-7-2022-852 is not security or has no CVEs. patches: SUSE-2022-852,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-852,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-852,SUSE-SLE-Product-RT-15-SP2-2022-852,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-852,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-852,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-852,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-852,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-852,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-852,SUSE-Storage-7-2022-852 SKIP SUSE-RU-2022:0862-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-862 is not security or has no CVEs. patches: SUSE-2022-862,SUSE-SLE-Module-SAP-Applications-15-2022-862,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-862,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-862,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-862,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-862 SKIP SUSE-RU-2022:0863-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-863 is not security or has no CVEs. patches: SUSE-2022-863,SUSE-SLE-Module-SAP-Applications-15-2022-863,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-863,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-863,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-863,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-863 SKIP SUSE-RU-2022:0864-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-864 is not security or has no CVEs. patches: SUSE-2022-864,SUSE-SLE-Module-SAP-Applications-15-2022-864,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-864,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-864,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-864,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-864 SKIP SUSE-RU-2022:0865-1 as SUSE-SLE-SAP-12-SP5-2022-865 is not security or has no CVEs. patches: SUSE-2022-865,SUSE-SLE-SAP-12-SP3-2022-865,SUSE-SLE-SAP-12-SP4-2022-865,SUSE-SLE-SAP-12-SP5-2022-865 SKIP SUSE-RU-2022:0866-1 as SUSE-SLE-SAP-12-SP5-2022-866 is not security or has no CVEs. patches: SUSE-2022-866,SUSE-SLE-SAP-12-SP3-2022-866,SUSE-SLE-SAP-12-SP4-2022-866,SUSE-SLE-SAP-12-SP5-2022-866 SKIP SUSE-RU-2022:0867-1 as SUSE-SUSE-MicroOS-5.0-2022-867 is not security or has no CVEs. patches: SUSE-2022-867,SUSE-SLE-Product-RT-15-SP2-2022-867,SUSE-SUSE-MicroOS-5.0-2022-867 SKIP SUSE-RU-2022:0869-1 as SUSE-SUSE-MicroOS-5.1-2022-869 is not security or has no CVEs. patches: SUSE-2022-869,SUSE-SLE-Module-Basesystem-15-SP3-2022-869,SUSE-SUSE-MicroOS-5.1-2022-869 SKIP SUSE-RU-2022:0869-2 as SUSE-SUSE-MicroOS-5.2-2022-869 is not security or has no CVEs. patches: SUSE-2022-869,SUSE-SUSE-MicroOS-5.2-2022-869 SKIP SUSE-RU-2022:0874-1 as SUSE-SUSE-MicroOS-5.1-2022-874 is not security or has no CVEs. patches: SUSE-2022-874,SUSE-SLE-Module-Basesystem-15-SP3-2022-874,SUSE-SLE-Module-Basesystem-15-SP4-2022-874,SUSE-SLE-Module-Development-Tools-15-SP3-2022-874,SUSE-SLE-Module-Development-Tools-15-SP4-2022-874,SUSE-SLE-Module-Legacy-15-SP3-2022-874,SUSE-SLE-Product-RT-15-SP2-2022-874,SUSE-SUSE-MicroOS-5.0-2022-874,SUSE-SUSE-MicroOS-5.1-2022-874 SKIP SUSE-RU-2022:0875-1 as SUSE-SLE-Product-SLES_SAP-15-2022-875 is not security or has no CVEs. patches: SUSE-2022-875,SUSE-SLE-Product-HPC-15-2022-875,SUSE-SLE-Product-SLES-15-2022-875,SUSE-SLE-Product-SLES_SAP-15-2022-875 SKIP SUSE-RU-2022:0876-1 as SUSE-SLE-Product-WE-15-SP3-2022-876 is not security or has no CVEs. patches: SUSE-2022-876,SUSE-SLE-Module-Basesystem-15-SP3-2022-876,SUSE-SLE-Module-Development-Tools-15-SP3-2022-876,SUSE-SLE-Product-RT-15-SP2-2022-876,SUSE-SLE-Product-WE-15-SP3-2022-876 SKIP SUSE-RU-2022:0883-1 as SUSE-SLE-SERVER-12-SP5-2022-883 is not security or has no CVEs. patches: SUSE-2022-883,SUSE-SLE-SERVER-12-SP5-2022-883 SKIP SUSE-RU-2022:0884-1 as SUSE-SUSE-MicroOS-5.1-2022-884 is not security or has no CVEs. patches: SUSE-2022-884,SUSE-SLE-Module-Basesystem-15-SP3-2022-884,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-884,SUSE-SLE-Module-Python2-15-SP3-2022-884,SUSE-SLE-Module-Server-Applications-15-SP3-2022-884,SUSE-SLE-Product-RT-15-SP2-2022-884,SUSE-SUSE-MicroOS-5.0-2022-884,SUSE-SUSE-MicroOS-5.1-2022-884 SKIP SUSE-RU-2022:0887-1 as SUSE-SLE-SERVER-12-SP5-2022-887 is not security or has no CVEs. patches: SUSE-2022-887,SUSE-SLE-SERVER-12-SP5-2022-887 SKIP SUSE-RU-2022:0888-1 as SUSE-SLE-Product-RT-15-SP2-2022-888 is not security or has no CVEs. patches: SUSE-2022-888,SUSE-SLE-Module-Basesystem-15-SP3-2022-888,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-888,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-888,SUSE-SLE-Product-RT-15-SP2-2022-888 SKIP SUSE-RU-2022:0888-2 as SUSE-SUSE-MicroOS-5.2-2022-888 is not security or has no CVEs. patches: SUSE-2022-888,SUSE-SUSE-MicroOS-5.2-2022-888 SKIP SUSE-RU-2022:0889-1 as SUSE-SLE-Product-RT-15-SP2-2022-889 is not security or has no CVEs. patches: SUSE-2022-889,SUSE-SLE-Module-Legacy-15-SP3-2022-889,SUSE-SLE-Product-RT-15-SP2-2022-889 SKIP SUSE-RU-2022:0890-1 as SUSE-SLE-SERVER-12-SP5-2022-890 is not security or has no CVEs. patches: SUSE-2022-890,SUSE-SLE-SERVER-12-SP5-2022-890 SKIP SUSE-RU-2022:0891-1 as SUSE-SLE-SERVER-12-SP5-2022-891 is not security or has no CVEs. patches: SUSE-2022-891,SUSE-SLE-SDK-12-SP5-2022-891,SUSE-SLE-SERVER-12-SP5-2022-891 SKIP SUSE-RU-2022:0892-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-892 is not security or has no CVEs. patches: SUSE-2022-892,SUSE-SLE-Module-Basesystem-15-SP3-2022-892,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-892,SUSE-SLE-Module-Development-Tools-15-SP3-2022-892 SKIP SUSE-RU-2022:0893-1 as SUSE-SLE-Product-RT-15-SP2-2022-893 is not security or has no CVEs. patches: SUSE-2022-893,SUSE-SLE-Module-Basesystem-15-SP3-2022-893,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-893,SUSE-SLE-Module-Server-Applications-15-SP3-2022-893,SUSE-SLE-Product-RT-15-SP2-2022-893 SKIP SUSE-RU-2022:0896-1 as SUSE-SLE-SERVER-12-SP5-2022-896 is not security or has no CVEs. patches: SUSE-2022-896,SUSE-SLE-SDK-12-SP5-2022-896,SUSE-SLE-SERVER-12-SP5-2022-896 SKIP SUSE-RU-2022:0897-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2022-898 is not security or has no CVEs. patches: SUSE-2022-897,SUSE-SLE-Live-Patching-12-2022-897,SUSE-SLE-Live-Patching-12-SP3-2022-897,SUSE-SLE-Live-Patching-12-SP4-2022-897,SUSE-SLE-Live-Patching-12-SP5-2022-897,SUSE-SLE-Module-Live-Patching-15-2022-898,SUSE-SLE-Module-Live-Patching-15-SP1-2022-898,SUSE-SLE-Module-Live-Patching-15-SP2-2022-898,SUSE-SLE-Module-Live-Patching-15-SP3-2022-898 SKIP SUSE-RU-2022:0899-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-899 is not security or has no CVEs. patches: SUSE-2022-899,SUSE-SLE-Module-Basesystem-15-SP3-2022-899 SKIP SUSE-RU-2022:0900-1 as SUSE-SLE-SERVER-12-SP5-2022-900 is not security or has no CVEs. patches: SUSE-2022-900,SUSE-SLE-SDK-12-SP5-2022-900,SUSE-SLE-SERVER-12-SP5-2022-900 SKIP SUSE-RU-2022:0904-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-904 is not security or has no CVEs. patches: SUSE-2022-904,SUSE-SLE-Module-Development-Tools-15-SP3-2022-904 SKIP SUSE-RU-2022:0905-1 as SUSE-SUSE-MicroOS-5.1-2022-905 is not security or has no CVEs. patches: SUSE-2022-905,SUSE-SLE-Module-Basesystem-15-SP3-2022-905,SUSE-SLE-Module-Server-Applications-15-SP3-2022-905,SUSE-SUSE-MicroOS-5.1-2022-905 SKIP SUSE-RU-2022:0912-1 as SUSE-SLE-SERVER-12-SP5-2022-912 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-912,SUSE-2022-912,SUSE-OpenStack-Cloud-8-2022-912,SUSE-OpenStack-Cloud-9-2022-912,SUSE-OpenStack-Cloud-Crowbar-8-2022-912,SUSE-OpenStack-Cloud-Crowbar-9-2022-912,SUSE-SLE-SAP-12-SP3-2022-912,SUSE-SLE-SAP-12-SP4-2022-912,SUSE-SLE-SERVER-12-SP2-BCL-2022-912,SUSE-SLE-SERVER-12-SP3-2022-912,SUSE-SLE-SERVER-12-SP3-BCL-2022-912,SUSE-SLE-SERVER-12-SP4-LTSS-2022-912,SUSE-SLE-SERVER-12-SP5-2022-912 SKIP SUSE-RU-2022:0914-1 as SUSE-SUSE-MicroOS-5.0-2022-914 is not security or has no CVEs. patches: SUSE-2022-914,SUSE-SLE-Product-RT-15-SP2-2022-914,SUSE-SUSE-MicroOS-5.0-2022-914 SKIP SUSE-RU-2022:0919-1 as SUSE-2022-919 is not security or has no CVEs. patches: SUSE-2022-919,SUSE-SLE-Module-Basesystem-15-SP4-2022-919 ERROR: notice SUSE-RU-2022:0920-1 has no valid patches out of: SUSE-2022-920,SUSE-SLE-Module-Basesystem-15-SP4-2022-920 ERROR: notice SUSE-RU-2022:0921-1 has no valid patches out of: SUSE-2022-921,SUSE-SLE-Module-Basesystem-15-SP4-2022-921 ERROR: notice SUSE-RU-2022:0924-1 has no valid patches out of: SUSE-2022-924,SUSE-SLE-Module-Basesystem-15-SP4-2022-924 ERROR: notice SUSE-RU-2022:0926-1 has no valid patches out of: SUSE-2022-926,SUSE-SLE-Module-Basesystem-15-SP4-2022-926 ERROR: notice SUSE-RU-2022:0927-1 has no valid patches out of: SUSE-2022-927,SUSE-SLE-Module-Basesystem-15-SP4-2022-927 SKIP SUSE-RU-2022:0936-1 as SUSE-Storage-7-2022-936 is not security or has no CVEs. patches: SUSE-2022-936,SUSE-SLE-Module-Basesystem-15-SP3-2022-936,SUSE-SLE-Module-Basesystem-15-SP4-2022-936,SUSE-SLE-Product-HPC-15-2022-936,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-936,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-936,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-936,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-936,SUSE-SLE-Product-RT-15-SP2-2022-936,SUSE-SLE-Product-SLES-15-2022-936,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-936,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-936,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-936,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-936,SUSE-SLE-Product-SLES_SAP-15-2022-936,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-936,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-936,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-936,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-936,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-936,SUSE-Storage-6-2022-936,SUSE-Storage-7-2022-936 SKIP SUSE-RU-2022:0947-1 as SUSE-SLE-Product-RT-15-SP2-2022-947 is not security or has no CVEs. patches: SUSE-2022-947,SUSE-SLE-Module-Server-Applications-15-SP3-2022-947,SUSE-SLE-Product-RT-15-SP2-2022-947 SKIP SUSE-RU-2022:0948-1 as SUSE-SUSE-MicroOS-5.1-2022-948 is not security or has no CVEs. patches: SUSE-2022-948,SUSE-SLE-Module-Basesystem-15-SP3-2022-948,SUSE-SUSE-MicroOS-5.1-2022-948 SKIP SUSE-RU-2022:0948-2 as SUSE-SUSE-MicroOS-5.2-2022-948 is not security or has no CVEs. patches: SUSE-2022-948,SUSE-SUSE-MicroOS-5.2-2022-948 SKIP SUSE-RU-2022:0951-1 as SUSE-Storage-7-2022-951 is not security or has no CVEs. patches: SUSE-2022-951,SUSE-Storage-7-2022-951 SKIP SUSE-RU-2022:0952-1 as SUSE-SLE-Product-RT-15-SP2-2022-952 is not security or has no CVEs. patches: SUSE-2022-952,SUSE-SLE-Module-Development-Tools-15-SP3-2022-952,SUSE-SLE-Product-RT-15-SP2-2022-952 SKIP SUSE-RU-2022:0956-1 as SUSE-SLE-SERVER-12-SP5-2022-956 is not security or has no CVEs. patches: SUSE-2022-956,SUSE-SLE-SERVER-12-SP5-2022-956 SKIP SUSE-RU-2022:0957-1 as SUSE-SLE-Module-Server-Applications-15-SP3-2022-957 is not security or has no CVEs. patches: SUSE-2022-957,SUSE-SLE-Module-Basesystem-15-SP3-2022-957,SUSE-SLE-Module-HPC-15-SP3-2022-957,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-957,SUSE-SLE-Module-Server-Applications-15-SP3-2022-957 SKIP SUSE-RU-2022:0958-1 as SUSE-Storage-6-2022-958 is not security or has no CVEs. patches: SUSE-2022-958,SUSE-Storage-6-2022-958 SKIP SUSE-RU-2022:0959-1 as SUSE-SLE-SDK-12-SP5-2022-959 is not security or has no CVEs. patches: SUSE-2022-959,SUSE-SLE-HA-12-SP3-2022-959,SUSE-SLE-HA-12-SP4-2022-959,SUSE-SLE-HA-12-SP5-2022-959,SUSE-SLE-SDK-12-SP5-2022-959 SKIP SUSE-RU-2022:1019-1 as SUSE-SLE-WE-12-SP5-2022-1019 is not security or has no CVEs. patches: SUSE-2022-1019,SUSE-SLE-HA-12-SP3-2022-1019,SUSE-SLE-HA-12-SP4-2022-1019,SUSE-SLE-HA-12-SP5-2022-1019,SUSE-SLE-SDK-12-SP5-2022-1019,SUSE-SLE-SERVER-12-SP5-2022-1019,SUSE-SLE-WE-12-SP5-2022-1019 SKIP SUSE-RU-2022:1020-1 as SUSE-SLE-SERVER-12-SP5-2022-1020 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1020,SUSE-2022-1020,SUSE-OpenStack-Cloud-8-2022-1020,SUSE-OpenStack-Cloud-9-2022-1020,SUSE-OpenStack-Cloud-Crowbar-8-2022-1020,SUSE-OpenStack-Cloud-Crowbar-9-2022-1020,SUSE-SLE-SAP-12-SP3-2022-1020,SUSE-SLE-SAP-12-SP4-2022-1020,SUSE-SLE-SERVER-12-SP2-BCL-2022-1020,SUSE-SLE-SERVER-12-SP3-2022-1020,SUSE-SLE-SERVER-12-SP3-BCL-2022-1020,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1020,SUSE-SLE-SERVER-12-SP5-2022-1020 SKIP SUSE-RU-2022:1021-1 as SUSE-Storage-7-2022-1021 is not security or has no CVEs. patches: SUSE-2022-1021,SUSE-SLE-INSTALLER-15-SP1-2022-1021,SUSE-SLE-Module-Basesystem-15-SP4-2022-1021,SUSE-SLE-Product-HPC-15-2022-1021,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1021,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1021,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1021,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1021,SUSE-SLE-Product-RT-15-SP2-2022-1021,SUSE-SLE-Product-SLES-15-2022-1021,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1021,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1021,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1021,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1021,SUSE-SLE-Product-SLES_SAP-15-2022-1021,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1021,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1021,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1021,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1021,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1021,SUSE-Storage-6-2022-1021,SUSE-Storage-7-2022-1021 SKIP SUSE-RU-2022:1028-1 as SUSE-SUSE-MicroOS-5.1-2022-1028 is not security or has no CVEs. patches: SUSE-2022-1028,SUSE-SLE-Module-Basesystem-15-SP3-2022-1028,SUSE-SUSE-MicroOS-5.1-2022-1028 SKIP SUSE-RU-2022:1032-1 as SUSE-Storage-7-2022-1032 is not security or has no CVEs. patches: SUSE-2022-1032,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1032,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1032,SUSE-SLE-Product-RT-15-SP2-2022-1032,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1032,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1032,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1032,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1032,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1032,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1032,SUSE-SUSE-MicroOS-5.0-2022-1032,SUSE-Storage-7-2022-1032 SKIP SUSE-RU-2022:1033-1 as SUSE-SLE-Product-RT-15-SP2-2022-1033 is not security or has no CVEs. patches: SUSE-2022-1033,SUSE-SLE-Module-Basesystem-15-SP3-2022-1033,SUSE-SLE-Module-Basesystem-15-SP4-2022-1033,SUSE-SLE-Module-Legacy-15-SP4-2022-1033,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1033,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1033,SUSE-SLE-Product-RT-15-SP2-2022-1033 SKIP SUSE-RU-2022:1046-1 as SUSE-SUSE-MicroOS-5.1-2022-1046 is not security or has no CVEs. patches: SUSE-2022-1046,SUSE-SLE-Module-Basesystem-15-SP3-2022-1046,SUSE-SLE-Module-Basesystem-15-SP4-2022-1046,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1046,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1046,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1046,SUSE-SUSE-MicroOS-5.1-2022-1046 SKIP SUSE-RU-2022:1047-1 as SUSE-SUSE-MicroOS-5.1-2022-1047 is not security or has no CVEs. patches: SUSE-2022-1047,SUSE-SLE-Module-Basesystem-15-SP3-2022-1047,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1047,SUSE-SLE-Product-RT-15-SP2-2022-1047,SUSE-SUSE-MicroOS-5.0-2022-1047,SUSE-SUSE-MicroOS-5.1-2022-1047 SKIP SUSE-RU-2022:1063-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-1063 is not security or has no CVEs. patches: SUSE-2022-1063,SUSE-SLE-Module-Public-Cloud-12-2022-1063,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-1063 SKIP SUSE-RU-2022:1066-1 as SUSE-Storage-7-2022-1066 is not security or has no CVEs. patches: SUSE-2022-1066,SUSE-SLE-Module-Basesystem-15-SP3-2022-1066,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1066,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1066,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1066,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1066,SUSE-SLE-Product-RT-15-SP2-2022-1066,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1066,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1066,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1066,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1066,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1066,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1066,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1066,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1066,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1066,SUSE-Storage-6-2022-1066,SUSE-Storage-7-2022-1066 SKIP SUSE-RU-2022:1067-1 as SUSE-SLE-SERVER-12-SP5-2022-1067 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1067,SUSE-2022-1067,SUSE-OpenStack-Cloud-8-2022-1067,SUSE-OpenStack-Cloud-9-2022-1067,SUSE-OpenStack-Cloud-Crowbar-8-2022-1067,SUSE-OpenStack-Cloud-Crowbar-9-2022-1067,SUSE-SLE-Module-Toolchain-12-2022-1067,SUSE-SLE-SAP-12-SP3-2022-1067,SUSE-SLE-SAP-12-SP4-2022-1067,SUSE-SLE-SERVER-12-SP2-BCL-2022-1067,SUSE-SLE-SERVER-12-SP3-2022-1067,SUSE-SLE-SERVER-12-SP3-BCL-2022-1067,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1067,SUSE-SLE-SERVER-12-SP5-2022-1067 SKIP SUSE-RU-2022:1070-1 as SUSE-SLE-Product-SLES-15-SP3-2022-1070 is not security or has no CVEs. patches: SUSE-2022-1070,SUSE-SLE-INSTALLER-15-SP3-2022-1070,SUSE-SLE-Product-SLES-15-SP3-2022-1070 SKIP SUSE-RU-2022:1071-1 as SUSE-SLE-Product-SLES_SAP-15-2022-1071 is not security or has no CVEs. patches: SUSE-2022-1071,SUSE-SLE-INSTALLER-15-2022-1071,SUSE-SLE-Product-SLES-15-2022-1071,SUSE-SLE-Product-SLES_SAP-15-2022-1071 SKIP SUSE-RU-2022:1074-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1074 is not security or has no CVEs. patches: SUSE-2022-1074,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1074,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1074,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1074 ERROR: notice SUSE-RU-2022:1075-1 has no valid patches out of: SUSE-2022-1075,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2022-1075 ERROR: notice SUSE-RU-2022:1076-1 has no valid patches out of: SUSE-2022-1076,SUSE-Ubuntu-18.04-CLIENT-TOOLS-BETA-2022-1076 ERROR: notice SUSE-RU-2022:1079-1 has no valid patches out of: SUSE-2022-1079,SUSE-Debian-10-CLIENT-TOOLS-BETA-2022-1079 ERROR: notice SUSE-RU-2022:1080-1 has no valid patches out of: SUSE-2022-1080,SUSE-Ubuntu-18.04-CLIENT-TOOLS-BETA-2022-1080 SKIP SUSE-RU-2022:1081-1 as SUSE-2022-1081 is not security or has no CVEs. patches: SUSE-2022-1081,SUSE-SLE-Manager-Tools-15-BETA-2022-1081 SKIP SUSE-RU-2022:1082-1 as SUSE-2022-1082 is not security or has no CVEs. patches: SUSE-2022-1082,SUSE-SLE-Manager-Tools-12-BETA-2022-1082 ERROR: notice SUSE-RU-2022:1083-1 has no valid patches out of: SUSE-2022-1083,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2022-1083 ERROR: notice SUSE-RU-2022:1084-1 has no valid patches out of: SUSE-2022-1084,SUSE-Debian-10-CLIENT-TOOLS-BETA-2022-1084 ERROR: notice SUSE-RU-2022:1086-1 has no valid patches out of: SUSE-2022-1086,SUSE-Debian-11-CLIENT-TOOLS-BETA-2022-1086 ERROR: notice SUSE-RU-2022:1087-1 has no valid patches out of: SUSE-2022-1087,SUSE-Debian-11-CLIENT-TOOLS-BETA-2022-1087 SKIP SUSE-RU-2022:1089-1 as SUSE-2022-1089 is not security or has no CVEs. patches: SUSE-2022-1089,SUSE-SLE-Manager-Tools-12-BETA-2022-1089 SKIP SUSE-RU-2022:1090-1 as SUSE-2022-1090 is not security or has no CVEs. patches: SUSE-2022-1090,SUSE-SLE-Manager-Tools-15-BETA-2022-1090 SKIP SUSE-RU-2022:1092-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-1092 is not security or has no CVEs. patches: SUSE-2022-1092,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1092,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1092,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1092,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1092,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-1092 SKIP SUSE-RU-2022:1095-1 as SUSE-SUSE-MicroOS-5.1-2022-1095 is not security or has no CVEs. patches: SUSE-2022-1095,SUSE-SLE-Module-Basesystem-15-SP3-2022-1095,SUSE-SUSE-MicroOS-5.1-2022-1095 SKIP SUSE-RU-2022:1095-2 as SUSE-SUSE-MicroOS-5.2-2022-1095 is not security or has no CVEs. patches: SUSE-2022-1095,SUSE-SUSE-MicroOS-5.2-2022-1095 SKIP SUSE-RU-2022:1096-1 as SUSE-SLE-Product-RT-15-SP2-2022-1096 is not security or has no CVEs. patches: SUSE-2022-1096,SUSE-SLE-Product-RT-15-SP2-2022-1096 SKIP SUSE-RU-2022:1097-1 as SUSE-Storage-7-2022-1097 is not security or has no CVEs. patches: SUSE-2022-1097,SUSE-SLE-Module-Basesystem-15-SP3-2022-1097,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1097,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1097,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1097,SUSE-SLE-Product-RT-15-SP2-2022-1097,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1097,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1097,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1097,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1097,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1097,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1097,SUSE-SLE-Product-WE-15-SP3-2022-1097,SUSE-SLE-Product-WE-15-SP4-2022-1097,SUSE-Storage-7-2022-1097 SKIP SUSE-RU-2022:1098-1 as SUSE-Storage-7-2022-1098 is not security or has no CVEs. patches: SUSE-2022-1098,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1098,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1098,SUSE-SLE-Product-RT-15-SP2-2022-1098,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1098,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1098,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1098,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1098,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1098,SUSE-Storage-7-2022-1098 SKIP SUSE-RU-2022:1099-1 as SUSE-SUSE-MicroOS-5.1-2022-1099 is not security or has no CVEs. patches: SUSE-2022-1099,SUSE-SLE-Module-Basesystem-15-SP3-2022-1099,SUSE-SLE-Module-Basesystem-15-SP4-2022-1099,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1099,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1099,SUSE-SLE-Product-RT-15-SP2-2022-1099,SUSE-SUSE-MicroOS-5.0-2022-1099,SUSE-SUSE-MicroOS-5.1-2022-1099 SKIP SUSE-RU-2022:1099-2 as SUSE-SUSE-MicroOS-5.2-2022-1099 is not security or has no CVEs. patches: SUSE-2022-1099,SUSE-SUSE-MicroOS-5.2-2022-1099 SKIP SUSE-RU-2022:1104-1 as SUSE-SLE-WE-12-SP5-2022-1104 is not security or has no CVEs. patches: SUSE-2022-1104,SUSE-SLE-SDK-12-SP5-2022-1104,SUSE-SLE-SERVER-12-SP5-2022-1104,SUSE-SLE-WE-12-SP5-2022-1104 SKIP SUSE-RU-2022:1106-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-1106 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1106,SUSE-2022-1106,SUSE-OpenStack-Cloud-8-2022-1106,SUSE-OpenStack-Cloud-Crowbar-8-2022-1106,SUSE-SLE-SAP-12-SP3-2022-1106,SUSE-SLE-SERVER-12-SP3-2022-1106,SUSE-SLE-SERVER-12-SP3-BCL-2022-1106 SKIP SUSE-RU-2022:1107-1 as SUSE-SUSE-MicroOS-5.1-2022-1107 is not security or has no CVEs. patches: SUSE-2022-1107,SUSE-SLE-Module-Basesystem-15-SP3-2022-1107,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1107,SUSE-SUSE-MicroOS-5.1-2022-1107 SKIP SUSE-RU-2022:1107-2 as SUSE-SUSE-MicroOS-5.2-2022-1107 is not security or has no CVEs. patches: SUSE-2022-1107,SUSE-SUSE-MicroOS-5.2-2022-1107 SKIP SUSE-RU-2022:1109-1 as SUSE-Storage-7-2022-1109 is not security or has no CVEs. patches: SUSE-2022-1109,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1109,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1109,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1109,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1109,SUSE-SLE-Product-RT-15-SP2-2022-1109,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1109,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1109,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1109,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1109,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1109,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1109,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1109,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1109,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1109,SUSE-SUSE-MicroOS-5.0-2022-1109,SUSE-Storage-6-2022-1109,SUSE-Storage-7-2022-1109 SKIP SUSE-RU-2022:1110-1 as SUSE-Storage-6-2022-1110 is not security or has no CVEs. patches: SUSE-2022-1110,SUSE-Storage-6-2022-1110 SKIP SUSE-RU-2022:1117-1 as SUSE-SLE-SERVER-12-SP5-2022-1117 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1117,SUSE-2022-1117,SUSE-OpenStack-Cloud-8-2022-1117,SUSE-OpenStack-Cloud-9-2022-1117,SUSE-OpenStack-Cloud-Crowbar-8-2022-1117,SUSE-OpenStack-Cloud-Crowbar-9-2022-1117,SUSE-SLE-SAP-12-SP3-2022-1117,SUSE-SLE-SAP-12-SP4-2022-1117,SUSE-SLE-SERVER-12-SP2-BCL-2022-1117,SUSE-SLE-SERVER-12-SP3-2022-1117,SUSE-SLE-SERVER-12-SP3-BCL-2022-1117,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1117,SUSE-SLE-SERVER-12-SP5-2022-1117 SKIP SUSE-RU-2022:1118-1 as SUSE-Storage-7-2022-1118 is not security or has no CVEs. patches: SUSE-2022-1118,SUSE-SLE-Module-Basesystem-15-SP3-2022-1118,SUSE-SLE-Module-Basesystem-15-SP4-2022-1118,SUSE-SLE-Product-HPC-15-2022-1118,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1118,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1118,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1118,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1118,SUSE-SLE-Product-RT-15-SP2-2022-1118,SUSE-SLE-Product-SLES-15-2022-1118,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1118,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1118,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1118,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1118,SUSE-SLE-Product-SLES_SAP-15-2022-1118,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1118,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1118,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1118,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1118,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1118,SUSE-SUSE-MicroOS-5.0-2022-1118,SUSE-SUSE-MicroOS-5.1-2022-1118,SUSE-Storage-6-2022-1118,SUSE-Storage-7-2022-1118 SKIP SUSE-RU-2022:1118-2 as SUSE-SUSE-MicroOS-5.2-2022-1118 is not security or has no CVEs. patches: SUSE-2022-1118,SUSE-SUSE-MicroOS-5.2-2022-1118 SKIP SUSE-RU-2022:1119-1 as SUSE-SUSE-MicroOS-5.1-2022-1119 is not security or has no CVEs. patches: SUSE-2022-1119,SUSE-SLE-Module-Basesystem-15-SP3-2022-1119,SUSE-SLE-Module-Basesystem-15-SP4-2022-1119,SUSE-SUSE-MicroOS-5.1-2022-1119 SKIP SUSE-RU-2022:1119-2 as SUSE-SUSE-MicroOS-5.2-2022-1119 is not security or has no CVEs. patches: SUSE-2022-1119,SUSE-SUSE-MicroOS-5.2-2022-1119 SKIP SUSE-RU-2022:1121-1 as SUSE-SLE-Module-Public-Cloud-15-2022-1121 is not security or has no CVEs. patches: SUSE-2022-1121,SUSE-SLE-Module-Public-Cloud-15-2022-1121 SKIP SUSE-RU-2022:1122-1 as SUSE-SLE-Product-HA-15-SP1-2022-1122 is not security or has no CVEs. patches: SUSE-2022-1122,SUSE-SLE-Product-HA-15-SP1-2022-1122 SKIP SUSE-RU-2022:1124-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-1124 is not security or has no CVEs. patches: SUSE-2022-1124,SUSE-SLE-Module-Basesystem-15-SP3-2022-1124,SUSE-SLE-Module-Basesystem-15-SP4-2022-1124 SKIP SUSE-RU-2022:1126-1 as SUSE-SUSE-MicroOS-5.1-2022-1126 is not security or has no CVEs. patches: SUSE-2022-1126,SUSE-SLE-Module-Basesystem-15-SP3-2022-1126,SUSE-SLE-Module-Basesystem-15-SP4-2022-1126,SUSE-SLE-Product-RT-15-SP2-2022-1126,SUSE-SUSE-MicroOS-5.0-2022-1126,SUSE-SUSE-MicroOS-5.1-2022-1126 SKIP SUSE-RU-2022:1126-2 as SUSE-SUSE-MicroOS-5.2-2022-1126 is not security or has no CVEs. patches: SUSE-2022-1126,SUSE-SUSE-MicroOS-5.2-2022-1126 SKIP SUSE-RU-2022:1132-1 as SUSE-SUSE-MicroOS-5.1-2022-1132 is not security or has no CVEs. patches: SUSE-2022-1132,SUSE-SLE-Module-Basesystem-15-SP3-2022-1132,SUSE-SUSE-MicroOS-5.1-2022-1132 SKIP SUSE-RU-2022:1132-2 as SUSE-SUSE-MicroOS-5.2-2022-1132 is not security or has no CVEs. patches: SUSE-2022-1132,SUSE-SUSE-MicroOS-5.2-2022-1132 SKIP SUSE-RU-2022:1133-1 as SUSE-SLE-SERVER-12-SP5-2022-1133 is not security or has no CVEs. patches: SUSE-2022-1133,SUSE-SLE-SERVER-12-SP5-2022-1133 SKIP SUSE-RU-2022:1135-1 as SUSE-Storage-7-2022-1135 is not security or has no CVEs. patches: SUSE-2022-1135,SUSE-SLE-Product-HPC-15-2022-1135,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1135,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1135,SUSE-SLE-Product-RT-15-SP2-2022-1135,SUSE-SLE-Product-SLES-15-2022-1135,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1135,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1135,SUSE-SLE-Product-SLES_SAP-15-2022-1135,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1135,SUSE-SUSE-MicroOS-5.0-2022-1135,SUSE-Storage-6-2022-1135,SUSE-Storage-7-2022-1135 SKIP SUSE-RU-2022:1136-1 as SUSE-SLE-HA-12-SP5-2022-1136 is not security or has no CVEs. patches: SUSE-2022-1136,SUSE-SLE-HA-12-SP4-2022-1136,SUSE-SLE-HA-12-SP5-2022-1136 SKIP SUSE-RU-2022:1137-1 as SUSE-SLE-Product-HA-15-2022-1137 is not security or has no CVEs. patches: SUSE-2022-1137,SUSE-SLE-Product-HA-15-2022-1137 SKIP SUSE-RU-2022:1138-1 as SUSE-SLE-Product-WE-15-SP3-2022-1138 is not security or has no CVEs. patches: SUSE-2022-1138,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1138,SUSE-SLE-Product-WE-15-SP3-2022-1138 SKIP SUSE-RU-2022:1143-1 as SUSE-SUSE-MicroOS-5.2-2022-1143 is not security or has no CVEs. patches: SUSE-2022-1143,SUSE-SLE-Module-Basesystem-15-SP3-2022-1143,SUSE-SUSE-MicroOS-5.0-2022-1143,SUSE-SUSE-MicroOS-5.1-2022-1143,SUSE-SUSE-MicroOS-5.2-2022-1143 SKIP SUSE-RU-2022:1145-1 as openSUSE-SLE-15.3-2022-1145 is not security or has no CVEs. patches: SUSE-2022-1145,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1145,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1145,SUSE-SLE-Product-RT-15-SP2-2022-1145,openSUSE-SLE-15.3-2022-1145,openSUSE-SLE-15.4-2022-1145 SKIP SUSE-RU-2022:1146-1 as openSUSE-SLE-15.3-2022-1146 is not security or has no CVEs. patches: SUSE-2022-1146,SUSE-SLE-Module-Basesystem-15-SP3-2022-1146,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1146,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1146,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1146,SUSE-SLE-Product-RT-15-SP2-2022-1146,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1146,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1146,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1146,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1146,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1146,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1146,SUSE-Storage-7-2022-1146,openSUSE-SLE-15.3-2022-1146,openSUSE-SLE-15.4-2022-1146 SKIP SUSE-RU-2022:1147-1 as openSUSE-SLE-15.3-2022-1147 is not security or has no CVEs. patches: SUSE-2022-1147,SUSE-SLE-Module-Containers-15-SP3-2022-1147,SUSE-SLE-Module-Containers-15-SP4-2022-1147,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1147,SUSE-SLE-Product-HPC-15-2022-1147,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1147,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1147,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1147,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1147,SUSE-SLE-Product-SLES-15-2022-1147,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1147,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1147,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1147,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1147,SUSE-SLE-Product-SLES_SAP-15-2022-1147,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1147,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1147,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1147,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1147,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1147,SUSE-SUSE-MicroOS-5.0-2022-1147,SUSE-SUSE-MicroOS-5.1-2022-1147,SUSE-Storage-6-2022-1147,SUSE-Storage-7-2022-1147,openSUSE-SLE-15.3-2022-1147,openSUSE-SLE-15.4-2022-1147 SKIP SUSE-RU-2022:1150-1 as openSUSE-SLE-15.3-2022-1150 is not security or has no CVEs. patches: SUSE-2022-1150,SUSE-SLE-Module-Basesystem-15-SP3-2022-1150,SUSE-SLE-Module-Basesystem-15-SP4-2022-1150,SUSE-SLE-Product-HPC-15-2022-1150,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1150,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1150,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1150,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1150,SUSE-SLE-Product-RT-15-SP2-2022-1150,SUSE-SLE-Product-SLES-15-2022-1150,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1150,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1150,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1150,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1150,SUSE-SLE-Product-SLES_SAP-15-2022-1150,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1150,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1150,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1150,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1150,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1150,SUSE-SUSE-MicroOS-5.0-2022-1150,SUSE-SUSE-MicroOS-5.1-2022-1150,SUSE-Storage-6-2022-1150,SUSE-Storage-7-2022-1150,openSUSE-SLE-15.3-2022-1150,openSUSE-SLE-15.4-2022-1150 SKIP SUSE-RU-2022:1152-1 as SUSE-SLE-Product-HA-15-SP2-2022-1152 is not security or has no CVEs. patches: SUSE-2022-1152,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-1152,SUSE-SLE-Product-HA-15-SP1-2022-1152,SUSE-SLE-Product-HA-15-SP2-2022-1152 SKIP SUSE-RU-2022:1153-1 as SUSE-SLE-HA-12-SP3-2022-1153 is not security or has no CVEs. patches: SUSE-2022-1153,SUSE-SLE-HA-12-SP3-2022-1153 SKIP SUSE-RU-2022:1154-1 as SUSE-SLE-HA-12-SP5-2022-1154 is not security or has no CVEs. patches: SUSE-2022-1154,SUSE-SLE-HA-12-SP4-2022-1154,SUSE-SLE-HA-12-SP5-2022-1154 SKIP SUSE-RU-2022:1155-1 as openSUSE-SLE-15.3-2022-1155 is not security or has no CVEs. patches: SUSE-2022-1155,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-1155,SUSE-SLE-Product-HA-15-SP3-2022-1155,SUSE-SLE-Product-HA-15-SP4-2022-1155,openSUSE-SLE-15.3-2022-1155,openSUSE-SLE-15.4-2022-1155 SKIP SUSE-RU-2022:1165-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-1165 is not security or has no CVEs. patches: SUSE-2022-1165,SUSE-SLE-Module-Public-Cloud-12-2022-1165,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-1165 SKIP SUSE-RU-2022:1166-1 as openSUSE-SLE-15.3-2022-1166 is not security or has no CVEs. patches: SUSE-2022-1166,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1166,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1166,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1166,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1166,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-1166,openSUSE-SLE-15.3-2022-1166,openSUSE-SLE-15.4-2022-1166 SKIP SUSE-RU-2022:1169-1 as SUSE-SLE-SERVER-12-SP5-2022-1169 is not security or has no CVEs. patches: SUSE-2022-1169,SUSE-SLE-SDK-12-SP5-2022-1169,SUSE-SLE-SERVER-12-SP5-2022-1169 SKIP SUSE-RU-2022:1170-1 as openSUSE-SLE-15.3-2022-1170 is not security or has no CVEs. patches: SUSE-2022-1170,SUSE-SLE-Module-Basesystem-15-SP3-2022-1170,SUSE-SUSE-MicroOS-5.1-2022-1170,openSUSE-SLE-15.3-2022-1170,openSUSE-SLE-15.4-2022-1170 SKIP SUSE-RU-2022:1171-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-1171 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1171,SUSE-2022-1171,SUSE-OpenStack-Cloud-8-2022-1171,SUSE-OpenStack-Cloud-9-2022-1171,SUSE-OpenStack-Cloud-Crowbar-8-2022-1171,SUSE-OpenStack-Cloud-Crowbar-9-2022-1171,SUSE-SLE-SAP-12-SP3-2022-1171,SUSE-SLE-SAP-12-SP4-2022-1171,SUSE-SLE-SERVER-12-SP2-BCL-2022-1171,SUSE-SLE-SERVER-12-SP3-2022-1171,SUSE-SLE-SERVER-12-SP3-BCL-2022-1171,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1171 SKIP SUSE-RU-2022:1175-1 as openSUSE-SLE-15.3-2022-1175 is not security or has no CVEs. patches: SUSE-2022-1175,SUSE-SLE-Product-HA-15-SP2-2022-1175,SUSE-SLE-Product-HA-15-SP3-2022-1175,openSUSE-SLE-15.3-2022-1175 SKIP SUSE-RU-2022:1178-1 as SUSE-SLE-SERVER-12-SP5-2022-1178 is not security or has no CVEs. patches: SUSE-2022-1178,SUSE-SLE-SDK-12-SP5-2022-1178,SUSE-SLE-SERVER-12-SP5-2022-1178 SKIP SUSE-RU-2022:1179-1 as openSUSE-SLE-15.3-2022-1179 is not security or has no CVEs. patches: SUSE-2022-1179,SUSE-SLE-Module-Basesystem-15-SP3-2022-1179,SUSE-SLE-Module-Basesystem-15-SP4-2022-1179,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1179,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1179,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1179,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1179,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1179,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1179,SUSE-SLE-Product-RT-15-SP2-2022-1179,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1179,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1179,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1179,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1179,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1179,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1179,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1179,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1179,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1179,SUSE-Storage-6-2022-1179,SUSE-Storage-7-2022-1179,openSUSE-SLE-15.3-2022-1179,openSUSE-SLE-15.4-2022-1179 SKIP SUSE-RU-2022:1190-1 as openSUSE-SLE-15.3-2022-1190 is not security or has no CVEs. patches: SUSE-2022-1190,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1190,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1190,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1190,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1190,openSUSE-SLE-15.3-2022-1190,openSUSE-SLE-15.4-2022-1190 SKIP SUSE-RU-2022:1200-1 as openSUSE-SLE-15.3-2022-1200 is not security or has no CVEs. patches: SUSE-2022-1200,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-1200,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-1200,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-1200,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-1200,openSUSE-SLE-15.3-2022-1200,openSUSE-SLE-15.4-2022-1200 SKIP SUSE-RU-2022:1201-1 as openSUSE-SLE-15.3-2022-1201 is not security or has no CVEs. patches: SUSE-2022-1201,SUSE-SLE-Module-Basesystem-15-SP3-2022-1201,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-1201,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1201,openSUSE-SLE-15.3-2022-1201 SKIP SUSE-RU-2022:1202-1 as SUSE-Storage-7-2022-1202 is not security or has no CVEs. patches: SUSE-2022-1202,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1202,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1202,SUSE-SLE-Product-RT-15-SP2-2022-1202,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1202,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1202,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1202,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1202,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1202,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1202,SUSE-SUSE-MicroOS-5.0-2022-1202,SUSE-Storage-7-2022-1202 SKIP SUSE-RU-2022:1203-1 as openSUSE-SLE-15.3-2022-1203 is not security or has no CVEs. patches: SUSE-2022-1203,SUSE-SLE-Module-Basesystem-15-SP3-2022-1203,SUSE-SLE-Product-HA-15-SP2-2022-1203,SUSE-SLE-Product-HA-15-SP3-2022-1203,SUSE-SLE-Product-RT-15-SP2-2022-1203,SUSE-SUSE-MicroOS-5.0-2022-1203,SUSE-SUSE-MicroOS-5.1-2022-1203,openSUSE-SLE-15.3-2022-1203 SKIP SUSE-RU-2022:1204-1 as openSUSE-SLE-15.3-2022-1204 is not security or has no CVEs. patches: SUSE-2022-1204,SUSE-SLE-Manager-Tools-15-2022-1204,SUSE-SLE-Module-Basesystem-15-SP3-2022-1204,SUSE-SLE-Module-Basesystem-15-SP4-2022-1204,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-1204,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-1204,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-1204,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-1204,SUSE-SLE-Product-RT-15-SP2-2022-1204,openSUSE-SLE-15.3-2022-1204,openSUSE-SLE-15.4-2022-1204 SKIP SUSE-RU-2022:1205-1 as SUSE-SLE-Module-SAP-Applications-15-2022-1205 is not security or has no CVEs. patches: SUSE-2022-1205,SUSE-SLE-Module-SAP-Applications-15-2022-1205 SKIP SUSE-RU-2022:1206-1 as SUSE-SLE-SERVER-12-SP5-2022-1206 is not security or has no CVEs. patches: SUSE-2022-1206,SUSE-SLE-SERVER-12-SP5-2022-1206 SKIP SUSE-RU-2022:1208-1 as openSUSE-SLE-15.3-2022-1208 is not security or has no CVEs. patches: SUSE-2022-1208,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1208,SUSE-SLE-Product-RT-15-SP2-2022-1208,openSUSE-SLE-15.3-2022-1208,openSUSE-SLE-15.4-2022-1208 SKIP SUSE-RU-2022:1209-1 as SUSE-SLE-SERVER-12-SP5-2022-1209 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1209,SUSE-2022-1209,SUSE-OpenStack-Cloud-8-2022-1209,SUSE-OpenStack-Cloud-9-2022-1209,SUSE-OpenStack-Cloud-Crowbar-8-2022-1209,SUSE-OpenStack-Cloud-Crowbar-9-2022-1209,SUSE-SLE-SAP-12-SP3-2022-1209,SUSE-SLE-SAP-12-SP4-2022-1209,SUSE-SLE-SDK-12-SP5-2022-1209,SUSE-SLE-SERVER-12-SP3-2022-1209,SUSE-SLE-SERVER-12-SP3-BCL-2022-1209,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1209,SUSE-SLE-SERVER-12-SP5-2022-1209 SKIP SUSE-RU-2022:1251-1 as SUSE-SLE-SERVER-12-SP5-2022-1251 is not security or has no CVEs. patches: SUSE-2022-1251,SUSE-SLE-SERVER-12-SP5-2022-1251 SKIP SUSE-RU-2022:1253-1 as openSUSE-SLE-15.3-2022-1253 is not security or has no CVEs. patches: SUSE-2022-1253,SUSE-SLE-Module-Containers-15-SP3-2022-1253,SUSE-SLE-Module-Containers-15-SP4-2022-1253,openSUSE-SLE-15.3-2022-1253,openSUSE-SLE-15.4-2022-1253 SKIP SUSE-RU-2022:1262-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-1262 is not security or has no CVEs. patches: SUSE-2022-1262,SUSE-SLE-Module-Public-Cloud-12-2022-1262,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-1262 SKIP SUSE-RU-2022:1263-1 as openSUSE-SLE-15.3-2022-1263 is not security or has no CVEs. patches: SUSE-2022-1263,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1263,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1263,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1263,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1263,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-1263,openSUSE-SLE-15.3-2022-1263,openSUSE-SLE-15.4-2022-1263 SKIP SUSE-RU-2022:1279-1 as openSUSE-SLE-15.3-2022-1279 is not security or has no CVEs. patches: SUSE-2022-1279,SUSE-SLE-Module-Basesystem-15-SP3-2022-1279,SUSE-SLE-Module-Basesystem-15-SP4-2022-1279,SUSE-SLE-Product-RT-15-SP2-2022-1279,openSUSE-SLE-15.3-2022-1279,openSUSE-SLE-15.4-2022-1279 SKIP SUSE-RU-2022:1280-1 as openSUSE-SLE-15.3-2022-1280 is not security or has no CVEs. patches: SUSE-2022-1280,SUSE-SLE-Module-SAP-Applications-15-2022-1280,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-1280,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-1280,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-1280,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-1280,openSUSE-SLE-15.3-2022-1280,openSUSE-SLE-15.4-2022-1280 SKIP SUSE-RU-2022:1281-1 as openSUSE-SLE-15.3-2022-1281 is not security or has no CVEs. patches: SUSE-2022-1281,SUSE-SLE-Module-Basesystem-15-SP3-2022-1281,SUSE-SLE-Module-Basesystem-15-SP4-2022-1281,SUSE-SUSE-MicroOS-5.1-2022-1281,openSUSE-SLE-15.3-2022-1281,openSUSE-SLE-15.4-2022-1281 SKIP SUSE-RU-2022:1282-1 as SUSE-SLE-WE-12-SP5-2022-1282 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1282,SUSE-2022-1282,SUSE-OpenStack-Cloud-8-2022-1282,SUSE-OpenStack-Cloud-9-2022-1282,SUSE-OpenStack-Cloud-Crowbar-8-2022-1282,SUSE-OpenStack-Cloud-Crowbar-9-2022-1282,SUSE-SLE-SAP-12-SP3-2022-1282,SUSE-SLE-SAP-12-SP4-2022-1282,SUSE-SLE-SDK-12-SP5-2022-1282,SUSE-SLE-SERVER-12-SP2-BCL-2022-1282,SUSE-SLE-SERVER-12-SP3-2022-1282,SUSE-SLE-SERVER-12-SP3-BCL-2022-1282,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1282,SUSE-SLE-SERVER-12-SP5-2022-1282,SUSE-SLE-WE-12-SP5-2022-1282 SKIP SUSE-RU-2022:1284-1 as openSUSE-SLE-15.3-2022-1284 is not security or has no CVEs. patches: SUSE-2022-1284,openSUSE-SLE-15.3-2022-1284,openSUSE-SLE-15.4-2022-1284 SKIP SUSE-RU-2022:1286-1 as SUSE-SLE-SAP-12-SP5-2022-1286 is not security or has no CVEs. patches: SUSE-2022-1286,SUSE-SLE-SAP-12-SP3-2022-1286,SUSE-SLE-SAP-12-SP4-2022-1286,SUSE-SLE-SAP-12-SP5-2022-1286 SKIP SUSE-RU-2022:1299-1 as openSUSE-SLE-15.3-2022-1299 is not security or has no CVEs. patches: SUSE-2022-1299,SUSE-SLE-Module-Basesystem-15-SP3-2022-1299,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1299,SUSE-SLE-Product-RT-15-SP2-2022-1299,openSUSE-SLE-15.3-2022-1299 SKIP SUSE-RU-2022:1301-1 as openSUSE-SLE-15.3-2022-1301 is not security or has no CVEs. patches: SUSE-2022-1301,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1301,openSUSE-SLE-15.3-2022-1301 SKIP SUSE-RU-2022:1302-1 as openSUSE-SLE-15.3-2022-1302 is not security or has no CVEs. patches: SUSE-2022-1302,SUSE-SLE-Module-Basesystem-15-SP3-2022-1302,SUSE-SLE-Product-RT-15-SP2-2022-1302,SUSE-SUSE-MicroOS-5.0-2022-1302,SUSE-SUSE-MicroOS-5.1-2022-1302,SUSE-SUSE-MicroOS-5.2-2022-1302,openSUSE-SLE-15.3-2022-1302 SKIP SUSE-RU-2022:1373-1 as openSUSE-SLE-15.3-2022-1373 is not security or has no CVEs. patches: SUSE-2022-1373,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1373,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1373,SUSE-SLE-Product-RT-15-SP2-2022-1373,openSUSE-SLE-15.3-2022-1373,openSUSE-SLE-15.4-2022-1373 SKIP SUSE-RU-2022:1374-1 as openSUSE-SLE-15.3-2022-1374 is not security or has no CVEs. patches: SUSE-2022-1374,SUSE-SLE-Module-Basesystem-15-SP3-2022-1374,SUSE-SLE-Module-Basesystem-15-SP4-2022-1374,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1374,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1374,SUSE-SLE-Module-Legacy-15-SP3-2022-1374,SUSE-SLE-Product-RT-15-SP2-2022-1374,SUSE-SUSE-MicroOS-5.0-2022-1374,SUSE-SUSE-MicroOS-5.1-2022-1374,SUSE-SUSE-MicroOS-5.2-2022-1374,openSUSE-SLE-15.3-2022-1374,openSUSE-SLE-15.4-2022-1374 ERROR: notice SUSE-RU-2022:1386-1 has no valid patches out of: SUSE-2022-1386,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-1386 SKIP SUSE-RU-2022:1387-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-1387 is not security or has no CVEs. patches: SUSE-2022-1387,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2022-1387,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2022-1387,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-1387 ERROR: notice SUSE-RU-2022:1388-1 has no valid patches out of: SUSE-2022-1388,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2022-1388 SKIP SUSE-RU-2022:1394-1 as SUSE-SLE-Manager-Tools-12-2022-1394 is not security or has no CVEs. patches: SUSE-2022-1394,SUSE-SLE-Manager-Tools-12-2022-1394 SKIP SUSE-RU-2022:1397-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-1397 is not security or has no CVEs. patches: SUSE-2022-1397,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-1397 SKIP SUSE-RU-2022:1399-1 as openSUSE-SLE-15.3-2022-1399 is not security or has no CVEs. patches: SUSE-2022-1399,SUSE-SLE-Module-Containers-15-SP3-2022-1399,SUSE-SUSE-MicroOS-5.1-2022-1399,SUSE-SUSE-MicroOS-5.2-2022-1399,SUSE-Storage-7.1-2022-1399,openSUSE-SLE-15.3-2022-1399 SKIP SUSE-RU-2022:1401-1 as openSUSE-SLE-15.3-2022-1401 is not security or has no CVEs. patches: SUSE-2022-1401,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1401,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1401,SUSE-SLE-Product-RT-15-SP2-2022-1401,openSUSE-SLE-15.3-2022-1401,openSUSE-SLE-15.4-2022-1401 SKIP SUSE-RU-2022:1403-1 as openSUSE-SLE-15.3-2022-1403 is not security or has no CVEs. patches: SUSE-2022-1403,SUSE-SLE-Product-HA-15-SP1-2022-1403,SUSE-SLE-Product-HA-15-SP2-2022-1403,SUSE-SLE-Product-HA-15-SP3-2022-1403,openSUSE-SLE-15.3-2022-1403 SKIP SUSE-RU-2022:1404-1 as SUSE-SLE-SDK-12-SP5-2022-1404 is not security or has no CVEs. patches: SUSE-2022-1404,SUSE-SLE-HA-12-SP3-2022-1404,SUSE-SLE-HA-12-SP4-2022-1404,SUSE-SLE-HA-12-SP5-2022-1404,SUSE-SLE-SDK-12-SP5-2022-1404 SKIP SUSE-RU-2022:1405-1 as openSUSE-SLE-15.3-2022-1405 is not security or has no CVEs. patches: SUSE-2022-1405,SUSE-SLE-Module-Basesystem-15-SP3-2022-1405,SUSE-SLE-Module-Basesystem-15-SP4-2022-1405,SUSE-SLE-Product-RT-15-SP2-2022-1405,openSUSE-SLE-15.3-2022-1405 SKIP SUSE-RU-2022:1406-1 as SUSE-SLE-SERVER-12-SP5-2022-1406 is not security or has no CVEs. patches: SUSE-2022-1406,SUSE-SLE-SERVER-12-SP5-2022-1406 SKIP SUSE-RU-2022:1409-1 as openSUSE-SLE-15.3-2022-1409 is not security or has no CVEs. patches: SUSE-2022-1409,SUSE-SLE-Module-Basesystem-15-SP3-2022-1409,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1409,SUSE-SLE-Product-RT-15-SP2-2022-1409,SUSE-SUSE-MicroOS-5.0-2022-1409,SUSE-SUSE-MicroOS-5.1-2022-1409,openSUSE-SLE-15.3-2022-1409 SKIP SUSE-RU-2022:1412-1 as SUSE-Storage-6-2022-1412 is not security or has no CVEs. patches: SUSE-2022-1412,SUSE-Storage-6-2022-1412 SKIP SUSE-RU-2022:1413-1 as SUSE-Storage-7.1-2022-1413 is not security or has no CVEs. patches: SUSE-2022-1413,SUSE-Storage-7.1-2022-1413 SKIP SUSE-RU-2022:1420-1 as openSUSE-SLE-15.4-2022-1420 is not security or has no CVEs. patches: SUSE-2022-1420,SUSE-SLE-Module-Live-Patching-15-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP3-2022-1420,openSUSE-SLE-15.4-2022-1420 SKIP SUSE-RU-2022:1421-1 as SUSE-SLE-Module-Live-Patching-15-SP3-2022-1420 is not security or has no CVEs. patches: SUSE-2022-1421,SUSE-SLE-Live-Patching-12-2022-1421,SUSE-SLE-Live-Patching-12-SP3-2022-1421,SUSE-SLE-Live-Patching-12-SP4-2022-1421,SUSE-SLE-Live-Patching-12-SP5-2022-1421,SUSE-SLE-Module-Live-Patching-15-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP1-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP2-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP3-2022-1420,SUSE-SLE-Module-Live-Patching-15-SP4-2022-1420 SKIP SUSE-RU-2022:1422-1 as openSUSE-SLE-15.3-2022-1422 is not security or has no CVEs. patches: SUSE-2022-1422,SUSE-SLE-Module-Basesystem-15-SP3-2022-1422,SUSE-SUSE-MicroOS-5.1-2022-1422,openSUSE-SLE-15.3-2022-1422 SKIP SUSE-RU-2022:1423-1 as openSUSE-SLE-15.3-2022-1423 is not security or has no CVEs. patches: SUSE-2022-1423,SUSE-SLE-Product-HA-15-SP3-2022-1423,openSUSE-SLE-15.3-2022-1423 SKIP SUSE-RU-2022:1424-1 as SUSE-Storage-7-2022-1424 is not security or has no CVEs. patches: SUSE-2022-1424,SUSE-Storage-7-2022-1424 SKIP SUSE-RU-2022:1438-1 as openSUSE-SLE-15.4-2022-1438 is not security or has no CVEs. patches: SUSE-2022-1438,SUSE-SLE-Module-Basesystem-15-SP3-2022-1438,SUSE-SLE-Module-Basesystem-15-SP4-2022-1438,SUSE-SLE-Product-RT-15-SP2-2022-1438,SUSE-SUSE-MicroOS-5.0-2022-1438,SUSE-SUSE-MicroOS-5.1-2022-1438,openSUSE-SLE-15.3-2022-1438,openSUSE-SLE-15.4-2022-1438 SKIP SUSE-RU-2022:1439-1 as openSUSE-SLE-15.4-2022-1439 is not security or has no CVEs. patches: SUSE-2022-1439,SUSE-SLE-Module-Basesystem-15-SP3-2022-1439,SUSE-SLE-Module-Basesystem-15-SP4-2022-1439,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1439,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1439,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1439,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1439,SUSE-SLE-Product-RT-15-SP2-2022-1439,openSUSE-SLE-15.3-2022-1439,openSUSE-SLE-15.4-2022-1439 SKIP SUSE-RU-2022:1445-1 as openSUSE-SLE-15.3-2022-1445 is not security or has no CVEs. patches: SUSE-2022-1445,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1445,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1445,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1445,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1445,openSUSE-SLE-15.3-2022-1445 SKIP SUSE-RU-2022:1449-1 as openSUSE-SLE-15.3-2022-1449 is not security or has no CVEs. patches: SUSE-2022-1449,SUSE-SLE-Module-Basesystem-15-SP3-2022-1449,SUSE-SUSE-MicroOS-5.2-2022-1449,openSUSE-SLE-15.3-2022-1449 SKIP SUSE-RU-2022:1450-1 as openSUSE-SLE-15.4-2022-1450 is not security or has no CVEs. patches: SUSE-2022-1450,SUSE-SLE-Module-HPC-15-SP3-2022-1450,SUSE-SLE-Module-HPC-15-SP4-2022-1450,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1450,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1450,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1450,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1450,SUSE-SLE-Product-RT-15-SP2-2022-1450,openSUSE-SLE-15.3-2022-1450,openSUSE-SLE-15.4-2022-1450 SKIP SUSE-RU-2022:1451-1 as openSUSE-SLE-15.4-2022-1451 is not security or has no CVEs. patches: SUSE-2022-1451,SUSE-SLE-Module-Basesystem-15-SP3-2022-1451,SUSE-SLE-Module-Basesystem-15-SP4-2022-1451,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1451,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1451,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1451,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1451,SUSE-SUSE-MicroOS-5.1-2022-1451,SUSE-SUSE-MicroOS-5.2-2022-1451,openSUSE-SLE-15.3-2022-1451,openSUSE-SLE-15.4-2022-1451 SKIP SUSE-RU-2022:1452-1 as SUSE-Storage-7-2022-1452 is not security or has no CVEs. patches: SUSE-2022-1452,SUSE-SLE-Product-HPC-15-2022-1452,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1452,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1452,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1452,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1452,SUSE-SLE-Product-RT-15-SP2-2022-1452,SUSE-SLE-Product-SLES-15-2022-1452,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1452,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1452,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1452,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1452,SUSE-SLE-Product-SLES_SAP-15-2022-1452,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1452,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1452,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1452,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1452,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1452,SUSE-SUSE-MicroOS-5.0-2022-1452,SUSE-Storage-6-2022-1452,SUSE-Storage-7-2022-1452 SKIP SUSE-RU-2022:1457-1 as openSUSE-SLE-15.4-2022-1457 is not security or has no CVEs. patches: SUSE-2022-1457,SUSE-SLE-Module-Legacy-15-SP3-2022-1457,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1457,SUSE-SLE-Product-RT-15-SP2-2022-1457,openSUSE-SLE-15.3-2022-1457,openSUSE-SLE-15.4-2022-1457 SKIP SUSE-RU-2022:1458-1 as openSUSE-SLE-15.3-2022-1458 is not security or has no CVEs. patches: SUSE-2022-1458,SUSE-SLE-Module-Basesystem-15-SP3-2022-1458,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1458,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1458,openSUSE-SLE-15.3-2022-1458 SKIP SUSE-RU-2022:1460-1 as openSUSE-SLE-15.4-2022-1460 is not security or has no CVEs. patches: SUSE-2022-1460,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1460,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1460,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1460,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1460,openSUSE-SLE-15.3-2022-1460,openSUSE-SLE-15.4-2022-1460 SKIP SUSE-RU-2022:1463-1 as openSUSE-SLE-15.4-2022-1463 is not security or has no CVEs. patches: SUSE-2022-1463,SUSE-SLE-Module-Basesystem-15-SP3-2022-1463,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1463,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1463,SUSE-SLE-Product-RT-15-SP2-2022-1463,openSUSE-SLE-15.3-2022-1463,openSUSE-SLE-15.4-2022-1463 SKIP SUSE-RU-2022:1464-1 as openSUSE-SLE-15.4-2022-1464 is not security or has no CVEs. patches: SUSE-2022-1464,SUSE-SLE-Module-Basesystem-15-SP3-2022-1464,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1464,SUSE-SLE-Product-RT-15-SP2-2022-1464,SUSE-SLE-Product-WE-15-SP3-2022-1464,openSUSE-SLE-15.3-2022-1464,openSUSE-SLE-15.4-2022-1464 SKIP SUSE-RU-2022:1469-1 as SUSE-Storage-7-2022-1469 is not security or has no CVEs. patches: SUSE-2022-1469,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1469,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1469,SUSE-SLE-Product-RT-15-SP2-2022-1469,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1469,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1469,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1469,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1469,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1469,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1469,SUSE-Storage-7-2022-1469 SKIP SUSE-RU-2022:1470-1 as openSUSE-SLE-15.4-2022-1470 is not security or has no CVEs. patches: SUSE-2022-1470,SUSE-SLE-Product-HA-15-SP1-2022-1470,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1470,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1470,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1470,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1470,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1470,SUSE-Storage-6-2022-1470,openSUSE-SLE-15.4-2022-1470 SKIP SUSE-RU-2022:1471-1 as openSUSE-SLE-15.4-2022-1471 is not security or has no CVEs. patches: SUSE-2022-1471,SUSE-SLE-Product-HA-15-SP2-2022-1471,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1471,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1471,SUSE-SLE-Product-RT-15-SP2-2022-1471,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1471,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1471,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1471,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1471,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1471,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1471,SUSE-Storage-7-2022-1471,openSUSE-SLE-15.4-2022-1471 SKIP SUSE-RU-2022:1472-1 as openSUSE-SLE-15.4-2022-1472 is not security or has no CVEs. patches: SUSE-2022-1472,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1472,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1472,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1472,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1472,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1472,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1472,openSUSE-SLE-15.3-2022-1472,openSUSE-SLE-15.4-2022-1472 SKIP SUSE-RU-2022:1481-1 as openSUSE-SLE-15.3-2022-1481 is not security or has no CVEs. patches: SUSE-2022-1481,SUSE-SLE-Module-Basesystem-15-SP3-2022-1481,SUSE-SLE-Product-RT-15-SP2-2022-1481,openSUSE-SLE-15.3-2022-1481 SKIP SUSE-RU-2022:1482-1 as openSUSE-SLE-15.4-2022-1482 is not security or has no CVEs. patches: SUSE-2022-1482,SUSE-SLE-Module-Basesystem-15-SP3-2022-1482,SUSE-SLE-Module-Basesystem-15-SP4-2022-1482,SUSE-SUSE-MicroOS-5.1-2022-1482,openSUSE-SLE-15.3-2022-1482,openSUSE-SLE-15.4-2022-1482 SKIP SUSE-RU-2022:1487-1 as SUSE-SLE-SERVER-12-SP5-2022-1487 is not security or has no CVEs. patches: SUSE-2022-1487,SUSE-SLE-SDK-12-SP5-2022-1487,SUSE-SLE-SERVER-12-SP5-2022-1487 SKIP SUSE-RU-2022:14874-1 as slessp4-mozilla-nss-14874 is not security or has no CVEs. patches: sleposp3-mozilla-nss-14874,slessp4-mozilla-nss-14874 SKIP SUSE-RU-2022:1488-1 as SUSE-Storage-6-2022-1488 is not security or has no CVEs. patches: SUSE-2022-1488,SUSE-SLE-Product-HPC-15-2022-1488,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1488,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1488,SUSE-SLE-Product-SLES-15-2022-1488,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1488,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1488,SUSE-SLE-Product-SLES_SAP-15-2022-1488,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1488,SUSE-Storage-6-2022-1488 SKIP SUSE-RU-2022:1489-1 as SUSE-Storage-7-2022-1489 is not security or has no CVEs. patches: SUSE-2022-1489,SUSE-SLE-INSTALLER-15-SP2-2022-1489,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1489,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1489,SUSE-SLE-Product-RT-15-SP2-2022-1489,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1489,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1489,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1489,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1489,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1489,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1489,SUSE-Storage-7-2022-1489 SKIP SUSE-RU-2022:1490-1 as openSUSE-SLE-15.4-2022-1490 is not security or has no CVEs. patches: SUSE-2022-1490,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1490,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1490,SUSE-SLE-Product-WE-15-SP3-2022-1490,SUSE-SLE-Product-WE-15-SP4-2022-1490,openSUSE-SLE-15.3-2022-1490,openSUSE-SLE-15.4-2022-1490 ERROR: notice SUSE-RU-2022:14900-1 has no valid patches out of: suse-ubu184ct-client-tools-202202-14900 ERROR: notice SUSE-RU-2022:14901-1 has no valid patches out of: suse-ubu204ct-client-tools-202202-14901 SKIP SUSE-RU-2022:14902-1 as slesctsp4-client-tools-202202-14902 is not security or has no CVEs. patches: slesctsp3-client-tools-202202-14902,slesctsp4-client-tools-202202-14902 SKIP SUSE-RU-2022:1491-1 as openSUSE-SLE-15.4-2022-1491 is not security or has no CVEs. patches: SUSE-2022-1491,SUSE-SLE-Module-Basesystem-15-SP3-2022-1491,SUSE-SLE-Module-Basesystem-15-SP4-2022-1491,SUSE-SLE-Product-RT-15-SP2-2022-1491,SUSE-SUSE-MicroOS-5.0-2022-1491,SUSE-SUSE-MicroOS-5.1-2022-1491,SUSE-SUSE-MicroOS-5.2-2022-1491,openSUSE-SLE-15.3-2022-1491,openSUSE-SLE-15.4-2022-1491 SKIP SUSE-RU-2022:14912-1 as slessp4-suse-build-key-14912 is not security or has no CVEs. patches: sleposp3-suse-build-key-14912,slessp4-suse-build-key-14912 SKIP SUSE-RU-2022:14913-1 as slessp4-sssd-14913 is not security or has no CVEs. patches: secsp3-sssd-14913,sleposp3-sssd-14913,slessp4-sssd-14913 ERROR: notice SUSE-RU-2022:14945-1 has no valid patches out of: suse-ubu204ct-client-tools-202204-14945 ERROR: notice SUSE-RU-2022:14946-1 has no valid patches out of: suse-ubu184ct-client-tools-202204-14946 SKIP SUSE-RU-2022:14948-1 as slesctsp4-client-tools-202204-14948 is not security or has no CVEs. patches: slesctsp3-client-tools-202204-14948,slesctsp4-client-tools-202204-14948 SKIP SUSE-RU-2022:1495-1 as SUSE-Storage-7-2022-1495 is not security or has no CVEs. patches: SUSE-2022-1495,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1495,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1495,SUSE-SLE-Product-RT-15-SP2-2022-1495,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1495,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1495,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1495,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1495,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1495,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1495,SUSE-Storage-7-2022-1495 SKIP SUSE-RU-2022:1496-1 as openSUSE-SLE-15.4-2022-1496 is not security or has no CVEs. patches: SUSE-2022-1496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1496,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1496,openSUSE-SLE-15.3-2022-1496,openSUSE-SLE-15.4-2022-1496 SKIP SUSE-RU-2022:1497-1 as openSUSE-SLE-15.3-2022-1497 is not security or has no CVEs. patches: SUSE-2022-1497,SUSE-SLE-INSTALLER-15-SP3-2022-1497,SUSE-SLE-Module-Basesystem-15-SP3-2022-1497,openSUSE-SLE-15.3-2022-1497 SKIP SUSE-RU-2022:1498-1 as openSUSE-SLE-15.4-2022-1498 is not security or has no CVEs. patches: SUSE-2022-1498,openSUSE-SLE-15.3-2022-1498,openSUSE-SLE-15.4-2022-1498 SKIP SUSE-RU-2022:1499-1 as SUSE-Storage-6-2022-1499 is not security or has no CVEs. patches: SUSE-2022-1499,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1499,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1499,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1499,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1499,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1499,SUSE-Storage-6-2022-1499 SKIP SUSE-RU-2022:1500-1 as openSUSE-SLE-15.4-2022-1500 is not security or has no CVEs. patches: SUSE-2022-1500,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-1500,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-1500,openSUSE-SLE-15.3-2022-1500,openSUSE-SLE-15.4-2022-1500 SKIP SUSE-RU-2022:1501-1 as openSUSE-SLE-15.4-2022-1501 is not security or has no CVEs. patches: SUSE-2022-1501,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1501,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1501,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1501,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1501,openSUSE-SLE-15.3-2022-1501,openSUSE-SLE-15.4-2022-1501 ERROR: notice SUSE-RU-2022:15025-1 has no valid patches out of: suse-ubu224ct-client-tools-202208-15025 SKIP SUSE-RU-2022:1503-1 as openSUSE-SLE-15.4-2022-1503 is not security or has no CVEs. patches: SUSE-2022-1503,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1503,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1503,SUSE-SLE-Product-RT-15-SP2-2022-1503,openSUSE-SLE-15.3-2022-1503,openSUSE-SLE-15.4-2022-1503 ERROR: notice SUSE-RU-2022:15077-1 has no valid patches out of: suse-ubu224ct-client-tools-202209-15077 ERROR: notice SUSE-RU-2022:15078-1 has no valid patches out of: suse-ubu204ct-client-tools-202209-15078 ERROR: notice SUSE-RU-2022:15079-1 has no valid patches out of: suse-ubu184ct-client-tools-202209-15079 ERROR: notice SUSE-RU-2022:15082-1 has no valid patches out of: suse-ubu204ct-client-tools-202209-15082 ERROR: notice SUSE-RU-2022:15083-1 has no valid patches out of: suse-ubu184ct-client-tools-202209-15083 ERROR: notice SUSE-RU-2022:15084-1 has no valid patches out of: suse-ubu224ct-client-tools-202209-15084 ERROR: notice SUSE-RU-2022:15117-1 has no valid patches out of: suse-ubu224ct-client-tools-202211-15117 ERROR: notice SUSE-RU-2022:15119-1 has no valid patches out of: suse-ubu204ct-client-tools-202211-15119 ERROR: notice SUSE-RU-2022:15120-1 has no valid patches out of: suse-ubu204ct-client-tools-202211-15120 ERROR: notice SUSE-RU-2022:15122-1 has no valid patches out of: suse-ubu184ct-client-tools-202211-15122 ERROR: notice SUSE-RU-2022:15123-1 has no valid patches out of: suse-ubu184ct-client-tools-202211-15123 ERROR: notice SUSE-RU-2022:15124-1 has no valid patches out of: suse-ubu224ct-client-tools-202211-15124 SKIP SUSE-RU-2022:1517-1 as openSUSE-SLE-15.4-2022-1517 is not security or has no CVEs. patches: SUSE-2022-1517,SUSE-SLE-Module-Basesystem-15-SP3-2022-1517,SUSE-SLE-Module-Basesystem-15-SP4-2022-1517,SUSE-SLE-Product-RT-15-SP2-2022-1517,openSUSE-SLE-15.3-2022-1517,openSUSE-SLE-15.4-2022-1517 SKIP SUSE-RU-2022:1518-1 as openSUSE-SLE-15.4-2022-1518 is not security or has no CVEs. patches: SUSE-2022-1518,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1518,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1518,SUSE-SLE-Product-RT-15-SP2-2022-1518,openSUSE-SLE-15.3-2022-1518,openSUSE-SLE-15.4-2022-1518 SKIP SUSE-RU-2022:1522-1 as openSUSE-SLE-15.3-2022-1522 is not security or has no CVEs. patches: SUSE-2022-1522,SUSE-SLE-Module-Basesystem-15-SP3-2022-1522,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1522,SUSE-SLE-Product-RT-15-SP2-2022-1522,SUSE-SLE-Product-WE-15-SP3-2022-1522,SUSE-SUSE-MicroOS-5.0-2022-1522,SUSE-SUSE-MicroOS-5.1-2022-1522,SUSE-SUSE-MicroOS-5.2-2022-1522,openSUSE-SLE-15.3-2022-1522 ERROR: notice SUSE-RU-2022:1525-1 has no valid patches out of: SUSE-2022-1525,SUSE-Debian-11-CLIENT-TOOLS-BETA-2022-1525 SKIP SUSE-RU-2022:1542-1 as openSUSE-SLE-15.4-2022-1542 is not security or has no CVEs. patches: SUSE-2022-1542,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1542,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1542,SUSE-SLE-Product-RT-15-SP2-2022-1542,openSUSE-SLE-15.3-2022-1542,openSUSE-SLE-15.4-2022-1542 SKIP SUSE-RU-2022:1543-1 as openSUSE-SLE-15.4-2022-1543 is not security or has no CVEs. patches: SUSE-2022-1543,SUSE-SLE-Product-HPC-15-2022-1543,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1543,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1543,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1543,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1543,SUSE-SLE-Product-RT-15-SP2-2022-1543,SUSE-SLE-Product-SLES-15-2022-1543,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1543,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1543,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1543,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1543,SUSE-SLE-Product-SLES_SAP-15-2022-1543,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1543,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1543,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1543,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1543,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1543,SUSE-Storage-6-2022-1543,SUSE-Storage-7-2022-1543,openSUSE-SLE-15.4-2022-1543 SKIP SUSE-RU-2022:1544-1 as openSUSE-SLE-15.3-2022-1544 is not security or has no CVEs. patches: SUSE-2022-1544,SUSE-SLE-Module-Basesystem-15-SP3-2022-1544,SUSE-SLE-Product-RT-15-SP2-2022-1544,SUSE-SUSE-MicroOS-5.1-2022-1544,SUSE-SUSE-MicroOS-5.2-2022-1544,openSUSE-SLE-15.3-2022-1544 SKIP SUSE-RU-2022:1551-1 as openSUSE-SLE-15.4-2022-1551 is not security or has no CVEs. patches: SUSE-2022-1551,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1551,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1551,openSUSE-SLE-15.3-2022-1551,openSUSE-SLE-15.4-2022-1551 SKIP SUSE-RU-2022:1555-1 as openSUSE-SLE-15.4-2022-1555 is not security or has no CVEs. patches: SUSE-2022-1555,SUSE-SLE-Module-Basesystem-15-SP3-2022-1555,SUSE-SLE-Module-Basesystem-15-SP4-2022-1555,SUSE-SLE-Product-RT-15-SP2-2022-1555,openSUSE-SLE-15.3-2022-1555,openSUSE-SLE-15.4-2022-1555 SKIP SUSE-RU-2022:1556-1 as openSUSE-SLE-15.4-2022-1556 is not security or has no CVEs. patches: SUSE-2022-1556,SUSE-SLE-Module-Basesystem-15-SP3-2022-1556,SUSE-SLE-Module-Basesystem-15-SP4-2022-1556,SUSE-SLE-Product-RT-15-SP2-2022-1556,SUSE-SUSE-MicroOS-5.0-2022-1556,SUSE-SUSE-MicroOS-5.1-2022-1556,SUSE-SUSE-MicroOS-5.2-2022-1556,openSUSE-SLE-15.3-2022-1556,openSUSE-SLE-15.4-2022-1556 SKIP SUSE-RU-2022:1557-1 as SUSE-SLE-SERVER-12-SP5-2022-1557 is not security or has no CVEs. patches: SUSE-2022-1557,SUSE-SLE-SERVER-12-SP5-2022-1557 SKIP SUSE-RU-2022:1558-1 as openSUSE-SLE-15.3-2022-1558 is not security or has no CVEs. patches: SUSE-2022-1558,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1558,openSUSE-SLE-15.3-2022-1558 SKIP SUSE-RU-2022:1559-1 as openSUSE-SLE-15.3-2022-1559 is not security or has no CVEs. patches: SUSE-2022-1559,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1559,SUSE-SUSE-MicroOS-5.1-2022-1559,SUSE-SUSE-MicroOS-5.2-2022-1559,openSUSE-SLE-15.3-2022-1559 SKIP SUSE-RU-2022:1561-1 as openSUSE-SLE-15.3-2022-1561 is not security or has no CVEs. patches: SUSE-2022-1561,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1561,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1561,SUSE-SLE-Product-RT-15-SP2-2022-1561,SUSE-SUSE-MicroOS-5.0-2022-1561,SUSE-SUSE-MicroOS-5.1-2022-1561,SUSE-SUSE-MicroOS-5.2-2022-1561,openSUSE-SLE-15.3-2022-1561 SKIP SUSE-RU-2022:1562-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-1562 is not security or has no CVEs. patches: SUSE-2022-1562,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-1562,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-1562,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-1562,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-1562 SKIP SUSE-RU-2022:1566-1 as openSUSE-SLE-15.4-2022-1566 is not security or has no CVEs. patches: SUSE-2022-1566,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1566,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1566,SUSE-SLE-Product-RT-15-SP2-2022-1566,openSUSE-SLE-15.3-2022-1566,openSUSE-SLE-15.4-2022-1566 SKIP SUSE-RU-2022:1595-1 as openSUSE-SLE-15.4-2022-1595 is not security or has no CVEs. patches: SUSE-2022-1595,SUSE-SLE-Module-Basesystem-15-SP3-2022-1595,SUSE-SLE-Module-Basesystem-15-SP4-2022-1595,SUSE-SLE-Product-RT-15-SP2-2022-1595,openSUSE-SLE-15.3-2022-1595,openSUSE-SLE-15.4-2022-1595 SKIP SUSE-RU-2022:1624-1 as SUSE-SLE-SDK-12-SP5-2022-1624 is not security or has no CVEs. patches: SUSE-2022-1624,SUSE-SLE-HA-12-SP3-2022-1624,SUSE-SLE-HA-12-SP4-2022-1624,SUSE-SLE-HA-12-SP5-2022-1624,SUSE-SLE-SDK-12-SP5-2022-1624 SKIP SUSE-RU-2022:1625-1 as openSUSE-SLE-15.4-2022-1625 is not security or has no CVEs. patches: SUSE-2022-1625,SUSE-SLE-Module-Basesystem-15-SP3-2022-1625,SUSE-SLE-Module-Basesystem-15-SP4-2022-1625,SUSE-SLE-Product-RT-15-SP2-2022-1625,openSUSE-SLE-15.3-2022-1625,openSUSE-SLE-15.4-2022-1625 SKIP SUSE-RU-2022:1626-1 as openSUSE-SLE-15.4-2022-1626 is not security or has no CVEs. patches: SUSE-2022-1626,SUSE-SLE-Module-Basesystem-15-SP3-2022-1626,SUSE-SUSE-MicroOS-5.1-2022-1626,SUSE-SUSE-MicroOS-5.2-2022-1626,openSUSE-SLE-15.3-2022-1626,openSUSE-SLE-15.4-2022-1626 SKIP SUSE-RU-2022:1627-1 as openSUSE-SLE-15.4-2022-1627 is not security or has no CVEs. patches: SUSE-2022-1627,SUSE-SLE-Product-HA-15-2022-1627,SUSE-SLE-Product-HA-15-SP1-2022-1627,SUSE-SLE-Product-HA-15-SP2-2022-1627,SUSE-SLE-Product-HA-15-SP3-2022-1627,openSUSE-SLE-15.3-2022-1627,openSUSE-SLE-15.4-2022-1627 SKIP SUSE-RU-2022:1642-1 as openSUSE-SLE-15.3-2022-1642 is not security or has no CVEs. patches: SUSE-2022-1642,SUSE-SLE-Module-Basesystem-15-SP3-2022-1642,openSUSE-SLE-15.3-2022-1642 SKIP SUSE-RU-2022:1643-1 as openSUSE-SLE-15.3-2022-1643 is not security or has no CVEs. patches: SUSE-2022-1643,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1643,openSUSE-SLE-15.3-2022-1643 SKIP SUSE-RU-2022:1655-1 as openSUSE-SLE-15.4-2022-1655 is not security or has no CVEs. patches: SUSE-2022-1655,SUSE-SLE-Module-Basesystem-15-SP3-2022-1655,SUSE-SLE-Module-Basesystem-15-SP4-2022-1655,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1655,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1655,SUSE-SLE-Module-Legacy-15-SP3-2022-1655,SUSE-SLE-Module-Legacy-15-SP4-2022-1655,SUSE-SLE-Product-RT-15-SP2-2022-1655,SUSE-SUSE-MicroOS-5.0-2022-1655,SUSE-SUSE-MicroOS-5.1-2022-1655,SUSE-SUSE-MicroOS-5.2-2022-1655,openSUSE-SLE-15.3-2022-1655,openSUSE-SLE-15.4-2022-1655 SKIP SUSE-RU-2022:1656-1 as openSUSE-SLE-15.4-2022-1656 is not security or has no CVEs. patches: SUSE-2022-1656,SUSE-SLE-Module-Basesystem-15-SP3-2022-1656,SUSE-SLE-Module-Basesystem-15-SP4-2022-1656,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1656,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1656,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1656,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1656,openSUSE-SLE-15.3-2022-1656,openSUSE-SLE-15.4-2022-1656 SKIP SUSE-RU-2022:1658-1 as openSUSE-SLE-15.4-2022-1658 is not security or has no CVEs. patches: SUSE-2022-1658,SUSE-SLE-Module-Basesystem-15-SP3-2022-1658,SUSE-SLE-Module-Basesystem-15-SP4-2022-1658,SUSE-SUSE-MicroOS-5.1-2022-1658,SUSE-SUSE-MicroOS-5.2-2022-1658,openSUSE-SLE-15.3-2022-1658,openSUSE-SLE-15.4-2022-1658 SKIP SUSE-RU-2022:1659-1 as openSUSE-SLE-15.4-2022-1659 is not security or has no CVEs. patches: SUSE-2022-1659,SUSE-SLE-Module-Basesystem-15-SP3-2022-1659,SUSE-SLE-Module-Basesystem-15-SP4-2022-1659,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1659,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1659,SUSE-SUSE-MicroOS-5.2-2022-1659,openSUSE-SLE-15.3-2022-1659,openSUSE-SLE-15.4-2022-1659 SKIP SUSE-RU-2022:1660-1 as openSUSE-SLE-15.4-2022-1660 is not security or has no CVEs. patches: SUSE-2022-1660,SUSE-SLE-Module-Basesystem-15-SP3-2022-1660,SUSE-SLE-Module-Basesystem-15-SP4-2022-1660,openSUSE-SLE-15.3-2022-1660,openSUSE-SLE-15.4-2022-1660 SKIP SUSE-RU-2022:1661-1 as openSUSE-SLE-15.4-2022-1661 is not security or has no CVEs. patches: SUSE-2022-1661,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1661,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1661,openSUSE-SLE-15.3-2022-1661,openSUSE-SLE-15.4-2022-1661 SKIP SUSE-RU-2022:1662-1 as SUSE-Storage-6-2022-1662 is not security or has no CVEs. patches: SUSE-2022-1662,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1662,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1662,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1662,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1662,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1662,SUSE-Storage-6-2022-1662 SKIP SUSE-RU-2022:1672-1 as SUSE-SLE-Product-HA-15-SP1-2022-1672 is not security or has no CVEs. patches: SUSE-2022-1672,SUSE-SLE-Product-HA-15-SP1-2022-1672 SKIP SUSE-RU-2022:1679-1 as openSUSE-SLE-15.4-2022-1679 is not security or has no CVEs. patches: SUSE-2022-1679,SUSE-SLE-Module-Basesystem-15-SP3-2022-1679,SUSE-SUSE-MicroOS-5.1-2022-1679,SUSE-SUSE-MicroOS-5.2-2022-1679,openSUSE-SLE-15.3-2022-1679,openSUSE-SLE-15.4-2022-1679 SKIP SUSE-RU-2022:1681-1 as openSUSE-SLE-15.3-2022-1681 is not security or has no CVEs. patches: SUSE-2022-1681,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1681,openSUSE-SLE-15.3-2022-1681 SKIP SUSE-RU-2022:1682-1 as SUSE-SLE-SERVER-12-SP5-2022-1682 is not security or has no CVEs. patches: SUSE-2022-1682,SUSE-SLE-SDK-12-SP5-2022-1682,SUSE-SLE-SERVER-12-SP5-2022-1682 SKIP SUSE-RU-2022:1684-1 as openSUSE-SLE-15.3-2022-1684 is not security or has no CVEs. patches: SUSE-2022-1684,SUSE-SLE-INSTALLER-15-SP3-2022-1684,SUSE-SLE-Product-SLES-15-SP3-2022-1684,openSUSE-SLE-15.3-2022-1684 SKIP SUSE-RU-2022:1691-1 as openSUSE-SLE-15.3-2022-1691 is not security or has no CVEs. patches: SUSE-2022-1691,SUSE-SLE-INSTALLER-15-SP3-2022-1691,SUSE-SLE-Module-Basesystem-15-SP3-2022-1691,SUSE-SUSE-MicroOS-5.1-2022-1691,SUSE-SUSE-MicroOS-5.2-2022-1691,openSUSE-SLE-15.3-2022-1691 SKIP SUSE-RU-2022:1692-1 as openSUSE-SLE-15.3-2022-1692 is not security or has no CVEs. patches: SUSE-2022-1692,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1692,openSUSE-SLE-15.3-2022-1692 SKIP SUSE-RU-2022:1696-1 as SUSE-SUSE-MicroOS-5.1-2022-1696 is not security or has no CVEs. patches: SUSE-2022-1696,SUSE-SUSE-MicroOS-5.1-2022-1696 SKIP SUSE-RU-2022:1697-1 as SUSE-SUSE-MicroOS-5.2-2022-1697 is not security or has no CVEs. patches: SUSE-2022-1697,SUSE-SUSE-MicroOS-5.2-2022-1697 SKIP SUSE-RU-2022:1699-1 as openSUSE-SLE-15.4-2022-1699 is not security or has no CVEs. patches: SUSE-2022-1699,openSUSE-SLE-15.3-2022-1699,openSUSE-SLE-15.4-2022-1699 SKIP SUSE-RU-2022:1700-1 as openSUSE-SLE-15.3-2022-1700 is not security or has no CVEs. patches: SUSE-2022-1700,SUSE-SLE-Product-HA-15-SP2-2022-1700,SUSE-SLE-Product-HA-15-SP3-2022-1700,openSUSE-SLE-15.3-2022-1700 SKIP SUSE-RU-2022:1701-1 as SUSE-SLE-SERVER-12-SP5-2022-1701 is not security or has no CVEs. patches: SUSE-2022-1701,SUSE-SLE-SDK-12-SP5-2022-1701,SUSE-SLE-SERVER-12-SP5-2022-1701 SKIP SUSE-RU-2022:1703-1 as openSUSE-SLE-15.4-2022-1703 is not security or has no CVEs. patches: SUSE-2022-1703,SUSE-SLE-Manager-Tools-15-2022-1703,SUSE-SLE-Module-Basesystem-15-SP3-2022-1703,SUSE-SLE-Module-Basesystem-15-SP4-2022-1703,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-1703,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-1703,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-1703,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-1703,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-1703,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-1703,SUSE-SLE-Product-RT-15-SP2-2022-1703,SUSE-SUSE-MicroOS-5.2-2022-1703,openSUSE-SLE-15.3-2022-1703,openSUSE-SLE-15.4-2022-1703 SKIP SUSE-RU-2022:1704-1 as openSUSE-SLE-15.4-2022-1704 is not security or has no CVEs. patches: SUSE-2022-1704,openSUSE-SLE-15.3-2022-1704,openSUSE-SLE-15.4-2022-1704 SKIP SUSE-RU-2022:1709-1 as openSUSE-SLE-15.4-2022-1709 is not security or has no CVEs. patches: SUSE-2022-1709,SUSE-SLE-Module-Basesystem-15-SP3-2022-1709,SUSE-SLE-Module-Basesystem-15-SP4-2022-1709,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1709,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1709,SUSE-SLE-Product-RT-15-SP2-2022-1709,SUSE-SUSE-MicroOS-5.1-2022-1709,SUSE-SUSE-MicroOS-5.2-2022-1709,openSUSE-SLE-15.3-2022-1709,openSUSE-SLE-15.4-2022-1709 SKIP SUSE-RU-2022:1710-1 as openSUSE-SLE-15.3-2022-1710 is not security or has no CVEs. patches: SUSE-2022-1710,SUSE-SLE-Module-Basesystem-15-SP3-2022-1710,SUSE-SUSE-MicroOS-5.1-2022-1710,SUSE-SUSE-MicroOS-5.2-2022-1710,openSUSE-SLE-15.3-2022-1710 SKIP SUSE-RU-2022:1711-1 as SUSE-Storage-7-2022-1711 is not security or has no CVEs. patches: SUSE-2022-1711,SUSE-Storage-7-2022-1711 SKIP SUSE-RU-2022:1713-1 as openSUSE-SLE-15.4-2022-1713 is not security or has no CVEs. patches: SUSE-2022-1713,openSUSE-SLE-15.3-2022-1713,openSUSE-SLE-15.4-2022-1713 SKIP SUSE-RU-2022:1715-1 as openSUSE-SLE-15.4-2022-1715 is not security or has no CVEs. patches: SUSE-2022-1715,openSUSE-SLE-15.3-2022-1715,openSUSE-SLE-15.4-2022-1715 SKIP SUSE-RU-2022:1716-1 as SUSE-SLE-Product-HA-15-SP1-2022-1716 is not security or has no CVEs. patches: SUSE-2022-1716,SUSE-SLE-Product-HA-15-SP1-2022-1716 SKIP SUSE-RU-2022:1720-1 as openSUSE-SLE-15.4-2022-1720 is not security or has no CVEs. patches: SUSE-2022-1720,SUSE-SLE-Module-Basesystem-15-SP3-2022-1720,SUSE-SLE-Module-Basesystem-15-SP4-2022-1720,SUSE-SLE-Module-Python2-15-SP3-2022-1720,openSUSE-SLE-15.3-2022-1720,openSUSE-SLE-15.4-2022-1720 SKIP SUSE-RU-2022:1722-1 as openSUSE-SLE-15.3-2022-1722 is not security or has no CVEs. patches: SUSE-2022-1722,SUSE-SLE-Product-HA-15-SP3-2022-1722,openSUSE-SLE-15.3-2022-1722 SKIP SUSE-RU-2022:1752-1 as openSUSE-SLE-15.3-2022-1752 is not security or has no CVEs. patches: SUSE-2022-1752,SUSE-SLE-Module-Basesystem-15-SP3-2022-1752,SUSE-SLE-Module-Python2-15-SP3-2022-1752,SUSE-SLE-Product-HA-15-SP3-2022-1752,SUSE-SUSE-MicroOS-5.2-2022-1752,SUSE-Storage-7.1-2022-1752,openSUSE-SLE-15.3-2022-1752 SKIP SUSE-RU-2022:1753-1 as SUSE-SUSE-MicroOS-5.1-2022-1753 is not security or has no CVEs. patches: SUSE-2022-1753,SUSE-SUSE-MicroOS-5.1-2022-1753 SKIP SUSE-RU-2022:1754-1 as SUSE-SUSE-MicroOS-5.2-2022-1754 is not security or has no CVEs. patches: SUSE-2022-1754,SUSE-SUSE-MicroOS-5.2-2022-1754 SKIP SUSE-RU-2022:1761-1 as openSUSE-SLE-15.4-2022-1761 is not security or has no CVEs. patches: SUSE-2022-1761,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1761,openSUSE-SLE-15.3-2022-1761,openSUSE-SLE-15.4-2022-1761 SKIP SUSE-RU-2022:1761-2 as SUSE-SLE-Module-Development-Tools-15-SP4-2022-1761 is not security or has no CVEs. patches: SUSE-2022-1761,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1761 SKIP SUSE-RU-2022:1802-1 as openSUSE-SLE-15.4-2022-1802 is not security or has no CVEs. patches: SUSE-2022-1802,SUSE-SLE-INSTALLER-15-SP3-2022-1802,SUSE-SLE-Module-Basesystem-15-SP3-2022-1802,openSUSE-SLE-15.3-2022-1802,openSUSE-SLE-15.4-2022-1802 SKIP SUSE-RU-2022:1812-1 as openSUSE-SLE-15.3-2022-1812 is not security or has no CVEs. patches: SUSE-2022-1812,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1812,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1812,openSUSE-SLE-15.3-2022-1812 SKIP SUSE-RU-2022:1813-1 as SUSE-SLE-SERVER-12-SP5-2022-1813 is not security or has no CVEs. patches: SUSE-2022-1813,SUSE-SLE-SERVER-12-SP5-2022-1813 SKIP SUSE-RU-2022:1813-2 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-1813 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1813,SUSE-2022-1813,SUSE-OpenStack-Cloud-8-2022-1813,SUSE-OpenStack-Cloud-9-2022-1813,SUSE-OpenStack-Cloud-Crowbar-8-2022-1813,SUSE-OpenStack-Cloud-Crowbar-9-2022-1813,SUSE-SLE-SAP-12-SP3-2022-1813,SUSE-SLE-SAP-12-SP4-2022-1813,SUSE-SLE-SERVER-12-SP3-2022-1813,SUSE-SLE-SERVER-12-SP3-BCL-2022-1813,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1813 SKIP SUSE-RU-2022:1814-1 as openSUSE-SLE-15.4-2022-1814 is not security or has no CVEs. patches: SUSE-2022-1814,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1814,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1814,openSUSE-SLE-15.3-2022-1814,openSUSE-SLE-15.4-2022-1814 SKIP SUSE-RU-2022:1814-2 as SUSE-Storage-7-2022-1814 is not security or has no CVEs. patches: SUSE-2022-1814,SUSE-SLE-Product-HPC-15-2022-1814,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1814,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1814,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1814,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1814,SUSE-SLE-Product-SLES-15-2022-1814,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1814,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1814,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1814,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1814,SUSE-SLE-Product-SLES_SAP-15-2022-1814,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1814,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1814,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1814,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1814,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1814,SUSE-Storage-6-2022-1814,SUSE-Storage-7-2022-1814 SKIP SUSE-RU-2022:1820-1 as openSUSE-SLE-15.4-2022-1820 is not security or has no CVEs. patches: SUSE-2022-1820,SUSE-SLE-Module-Basesystem-15-SP3-2022-1820,SUSE-SLE-Module-Basesystem-15-SP4-2022-1820,openSUSE-SLE-15.3-2022-1820,openSUSE-SLE-15.4-2022-1820 SKIP SUSE-RU-2022:1821-1 as openSUSE-SLE-15.4-2022-1821 is not security or has no CVEs. patches: SUSE-2022-1821,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-1821,SUSE-SLE-Module-Transactional-Server-15-SP4-2022-1821,openSUSE-SLE-15.3-2022-1821,openSUSE-SLE-15.4-2022-1821 SKIP SUSE-RU-2022:1822-1 as SUSE-SLE-Module-Legacy-15-SP3-2022-1822 is not security or has no CVEs. patches: SUSE-2022-1822,SUSE-SLE-Module-Legacy-15-SP3-2022-1822 SKIP SUSE-RU-2022:1823-1 as SUSE-SLE-SERVER-12-SP5-2022-1823 is not security or has no CVEs. patches: SUSE-2022-1823,SUSE-SLE-HA-12-SP5-2022-1823,SUSE-SLE-SDK-12-SP5-2022-1823,SUSE-SLE-SERVER-12-SP5-2022-1823 SKIP SUSE-RU-2022:1824-1 as openSUSE-SLE-15.4-2022-1824 is not security or has no CVEs. patches: SUSE-2022-1824,SUSE-SLE-Module-Basesystem-15-SP3-2022-1824,SUSE-SLE-Module-Basesystem-15-SP4-2022-1824,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1824,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1824,openSUSE-SLE-15.3-2022-1824,openSUSE-SLE-15.4-2022-1824 SKIP SUSE-RU-2022:1825-1 as SUSE-SLE-SERVER-12-SP5-2022-1825 is not security or has no CVEs. patches: SUSE-2022-1825,SUSE-SLE-SDK-12-SP5-2022-1825,SUSE-SLE-SERVER-12-SP5-2022-1825 SKIP SUSE-RU-2022:1826-1 as openSUSE-SLE-15.4-2022-1826 is not security or has no CVEs. patches: SUSE-2022-1826,SUSE-SLE-Module-Basesystem-15-SP3-2022-1826,SUSE-SLE-Module-Basesystem-15-SP4-2022-1826,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1826,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1826,openSUSE-SLE-15.3-2022-1826,openSUSE-SLE-15.4-2022-1826 SKIP SUSE-RU-2022:1827-1 as openSUSE-SLE-15.4-2022-1827 is not security or has no CVEs. patches: SUSE-2022-1827,SUSE-SLE-Module-Basesystem-15-SP3-2022-1827,SUSE-SLE-Module-Basesystem-15-SP4-2022-1827,openSUSE-SLE-15.3-2022-1827,openSUSE-SLE-15.4-2022-1827 SKIP SUSE-RU-2022:1828-1 as openSUSE-SLE-15.4-2022-1828 is not security or has no CVEs. patches: SUSE-2022-1828,SUSE-SLE-Module-Basesystem-15-SP3-2022-1828,SUSE-SLE-Module-Basesystem-15-SP4-2022-1828,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1828,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1828,SUSE-SLE-Product-WE-15-SP3-2022-1828,SUSE-SLE-Product-WE-15-SP4-2022-1828,openSUSE-SLE-15.3-2022-1828,openSUSE-SLE-15.4-2022-1828 SKIP SUSE-RU-2022:1837-1 as openSUSE-SLE-15.4-2022-1837 is not security or has no CVEs. patches: SUSE-2022-1837,SUSE-SLE-Module-HPC-15-SP3-2022-1837,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1837,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1837,openSUSE-SLE-15.3-2022-1837,openSUSE-SLE-15.4-2022-1837 SKIP SUSE-RU-2022:1838-1 as openSUSE-SLE-15.3-2022-1838 is not security or has no CVEs. patches: SUSE-2022-1838,SUSE-SLE-Module-Basesystem-15-SP3-2022-1838,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1838,SUSE-SUSE-MicroOS-5.1-2022-1838,SUSE-SUSE-MicroOS-5.2-2022-1838,openSUSE-SLE-15.3-2022-1838 SKIP SUSE-RU-2022:1839-1 as SUSE-Storage-7-2022-1839 is not security or has no CVEs. patches: SUSE-2022-1839,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1839,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1839,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1839,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1839,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1839,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1839,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1839,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1839,SUSE-Storage-7-2022-1839 SKIP SUSE-RU-2022:1843-1 as openSUSE-SLE-15.4-2022-1843 is not security or has no CVEs. patches: SUSE-2022-1843,SUSE-SLE-Module-Basesystem-15-SP3-2022-1843,SUSE-SLE-Module-Basesystem-15-SP4-2022-1843,SUSE-SLE-Product-HPC-15-2022-1843,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1843,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1843,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1843,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1843,SUSE-SLE-Product-RT-15-SP2-2022-1843,SUSE-SLE-Product-SLES-15-2022-1843,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1843,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1843,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1843,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1843,SUSE-SLE-Product-SLES_SAP-15-2022-1843,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1843,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1843,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1843,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1843,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1843,SUSE-SUSE-MicroOS-5.0-2022-1843,SUSE-SUSE-MicroOS-5.1-2022-1843,SUSE-SUSE-MicroOS-5.2-2022-1843,SUSE-Storage-6-2022-1843,SUSE-Storage-7-2022-1843,openSUSE-SLE-15.3-2022-1843,openSUSE-SLE-15.4-2022-1843 SKIP SUSE-RU-2022:1850-1 as openSUSE-SLE-15.4-2022-1850 is not security or has no CVEs. patches: SUSE-2022-1850,SUSE-SLE-Module-Basesystem-15-SP3-2022-1850,SUSE-SLE-Module-Basesystem-15-SP4-2022-1850,openSUSE-SLE-15.3-2022-1850,openSUSE-SLE-15.4-2022-1850 SKIP SUSE-RU-2022:1851-1 as openSUSE-SLE-15.4-2022-1851 is not security or has no CVEs. patches: SUSE-2022-1851,SUSE-SLE-Module-Basesystem-15-SP3-2022-1851,SUSE-SLE-Module-Basesystem-15-SP4-2022-1851,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1851,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1851,openSUSE-SLE-15.3-2022-1851,openSUSE-SLE-15.4-2022-1851 SKIP SUSE-RU-2022:1864-1 as openSUSE-SLE-15.4-2022-1864 is not security or has no CVEs. patches: SUSE-2022-1864,SUSE-SLE-Module-Basesystem-15-SP3-2022-1864,SUSE-SLE-Module-Basesystem-15-SP4-2022-1864,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1864,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1864,openSUSE-SLE-15.3-2022-1864,openSUSE-SLE-15.4-2022-1864 SKIP SUSE-RU-2022:1865-1 as openSUSE-SLE-15.4-2022-1865 is not security or has no CVEs. patches: SUSE-2022-1865,SUSE-SLE-Module-Basesystem-15-SP3-2022-1865,SUSE-SLE-Module-Basesystem-15-SP4-2022-1865,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1865,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1865,openSUSE-SLE-15.3-2022-1865,openSUSE-SLE-15.4-2022-1865 SKIP SUSE-RU-2022:1866-1 as openSUSE-SLE-15.4-2022-1866 is not security or has no CVEs. patches: SUSE-2022-1866,SUSE-SLE-Module-Basesystem-15-SP3-2022-1866,SUSE-SUSE-MicroOS-5.1-2022-1866,SUSE-SUSE-MicroOS-5.2-2022-1866,SUSE-Storage-7-2022-1866,openSUSE-SLE-15.3-2022-1866,openSUSE-SLE-15.4-2022-1866 SKIP SUSE-RU-2022:1867-1 as openSUSE-SLE-15.4-2022-1867 is not security or has no CVEs. patches: SUSE-2022-1867,SUSE-SLE-Module-Basesystem-15-SP3-2022-1867,SUSE-SLE-Module-Basesystem-15-SP4-2022-1867,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1867,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1867,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1867,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1867,openSUSE-SLE-15.3-2022-1867,openSUSE-SLE-15.4-2022-1867 SKIP SUSE-RU-2022:1868-1 as openSUSE-SLE-15.4-2022-1868 is not security or has no CVEs. patches: SUSE-2022-1868,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1868,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1868,openSUSE-SLE-15.3-2022-1868,openSUSE-SLE-15.4-2022-1868 SKIP SUSE-RU-2022:1871-1 as openSUSE-SLE-15.4-2022-1871 is not security or has no CVEs. patches: SUSE-2022-1871,SUSE-SLE-Module-Basesystem-15-SP3-2022-1871,SUSE-SLE-Module-Basesystem-15-SP4-2022-1871,SUSE-SUSE-MicroOS-5.1-2022-1871,SUSE-SUSE-MicroOS-5.2-2022-1871,openSUSE-SLE-15.3-2022-1871,openSUSE-SLE-15.4-2022-1871 SKIP SUSE-RU-2022:1872-1 as openSUSE-SLE-15.4-2022-1872 is not security or has no CVEs. patches: SUSE-2022-1872,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1872,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1872,openSUSE-SLE-15.3-2022-1872,openSUSE-SLE-15.4-2022-1872 SKIP SUSE-RU-2022:1875-1 as openSUSE-SLE-15.4-2022-1875 is not security or has no CVEs. patches: SUSE-2022-1875,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1875,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1875,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1875,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1875,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1875,openSUSE-SLE-15.3-2022-1875,openSUSE-SLE-15.4-2022-1875 SKIP SUSE-RU-2022:1876-1 as openSUSE-SLE-15.4-2022-1876 is not security or has no CVEs. patches: SUSE-2022-1876,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1876,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-1876,SUSE-SLE-Product-WE-15-SP3-2022-1876,SUSE-SLE-Product-WE-15-SP4-2022-1876,openSUSE-SLE-15.3-2022-1876,openSUSE-SLE-15.4-2022-1876 SKIP SUSE-RU-2022:1877-1 as SUSE-SLE-SERVER-12-SP5-2022-1877 is not security or has no CVEs. patches: SUSE-2022-1877,SUSE-OpenStack-Cloud-9-2022-1877,SUSE-OpenStack-Cloud-Crowbar-9-2022-1877,SUSE-SLE-SAP-12-SP4-2022-1877,SUSE-SLE-SDK-12-SP5-2022-1877,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1877,SUSE-SLE-SERVER-12-SP5-2022-1877 SKIP SUSE-RU-2022:1878-1 as SUSE-SLE-SERVER-12-SP5-2022-1878 is not security or has no CVEs. patches: SUSE-2022-1878,SUSE-SLE-SERVER-12-SP5-2022-1878 SKIP SUSE-RU-2022:1880-1 as SUSE-SLE-SERVER-12-SP5-2022-1880 is not security or has no CVEs. patches: SUSE-2022-1880,SUSE-SLE-SERVER-12-SP5-2022-1880 SKIP SUSE-RU-2022:1881-1 as SUSE-SLE-SERVER-12-SP5-2022-1881 is not security or has no CVEs. patches: SUSE-2022-1881,SUSE-SLE-SDK-12-SP5-2022-1881,SUSE-SLE-SERVER-12-SP5-2022-1881 SKIP SUSE-RU-2022:1887-1 as openSUSE-SLE-15.4-2022-1887 is not security or has no CVEs. patches: SUSE-2022-1887,SUSE-SLE-Module-Basesystem-15-SP3-2022-1887,SUSE-SLE-Module-Basesystem-15-SP4-2022-1887,SUSE-SLE-Product-RT-15-SP2-2022-1887,SUSE-SUSE-MicroOS-5.0-2022-1887,SUSE-SUSE-MicroOS-5.1-2022-1887,SUSE-SUSE-MicroOS-5.2-2022-1887,openSUSE-SLE-15.3-2022-1887,openSUSE-SLE-15.4-2022-1887 SKIP SUSE-RU-2022:1896-1 as openSUSE-SLE-15.3-2022-1896 is not security or has no CVEs. patches: SUSE-2022-1896,SUSE-SLE-Module-Basesystem-15-SP3-2022-1896,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1896,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1896,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1896,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1896,SUSE-SLE-Product-RT-15-SP2-2022-1896,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1896,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1896,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1896,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1896,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1896,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1896,SUSE-Storage-7-2022-1896,openSUSE-SLE-15.3-2022-1896 SKIP SUSE-RU-2022:1899-1 as openSUSE-SLE-15.4-2022-1899 is not security or has no CVEs. patches: SUSE-2022-1899,SUSE-SLE-Module-Basesystem-15-SP3-2022-1899,SUSE-SLE-Module-Basesystem-15-SP4-2022-1899,SUSE-SUSE-MicroOS-5.1-2022-1899,SUSE-SUSE-MicroOS-5.2-2022-1899,openSUSE-SLE-15.3-2022-1899,openSUSE-SLE-15.4-2022-1899 SKIP SUSE-RU-2022:1900-1 as openSUSE-SLE-15.4-2022-1900 is not security or has no CVEs. patches: SUSE-2022-1900,SUSE-SLE-Module-Server-Applications-15-SP3-2022-1900,SUSE-SLE-Module-Server-Applications-15-SP4-2022-1900,openSUSE-SLE-15.3-2022-1900,openSUSE-SLE-15.4-2022-1900 SKIP SUSE-RU-2022:1902-1 as SUSE-SLE-SERVER-12-SP5-2022-1902 is not security or has no CVEs. patches: SUSE-2022-1902,SUSE-SLE-SDK-12-SP5-2022-1902,SUSE-SLE-SERVER-12-SP5-2022-1902 SKIP SUSE-RU-2022:1904-1 as openSUSE-SLE-15.4-2022-1904 is not security or has no CVEs. patches: SUSE-2022-1904,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1904,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1904,openSUSE-SLE-15.3-2022-1904,openSUSE-SLE-15.4-2022-1904 SKIP SUSE-RU-2022:1905-1 as openSUSE-SLE-15.3-2022-1905 is not security or has no CVEs. patches: SUSE-2022-1905,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1905,openSUSE-SLE-15.3-2022-1905 SKIP SUSE-RU-2022:1906-1 as openSUSE-SLE-15.3-2022-1906 is not security or has no CVEs. patches: SUSE-2022-1906,SUSE-SLE-Module-Basesystem-15-SP3-2022-1906,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1906,SUSE-SLE-Product-WE-15-SP3-2022-1906,SUSE-SUSE-MicroOS-5.1-2022-1906,SUSE-SUSE-MicroOS-5.2-2022-1906,openSUSE-SLE-15.3-2022-1906 SKIP SUSE-RU-2022:1907-1 as openSUSE-SLE-15.4-2022-1907 is not security or has no CVEs. patches: SUSE-2022-1907,SUSE-SLE-Module-Basesystem-15-SP3-2022-1907,SUSE-SLE-Module-Basesystem-15-SP4-2022-1907,openSUSE-SLE-15.3-2022-1907,openSUSE-SLE-15.4-2022-1907 SKIP SUSE-RU-2022:1909-1 as openSUSE-SLE-15.4-2022-1909 is not security or has no CVEs. patches: SUSE-2022-1909,SUSE-SLE-Module-Basesystem-15-SP3-2022-1909,SUSE-SLE-Module-Basesystem-15-SP4-2022-1909,SUSE-SLE-Module-Development-Tools-15-SP3-2022-1909,SUSE-SLE-Module-Development-Tools-15-SP4-2022-1909,SUSE-SUSE-MicroOS-5.1-2022-1909,SUSE-SUSE-MicroOS-5.2-2022-1909,openSUSE-SLE-15.3-2022-1909,openSUSE-SLE-15.4-2022-1909 SKIP SUSE-RU-2022:1913-1 as openSUSE-SLE-15.4-2022-1913 is not security or has no CVEs. patches: SUSE-2022-1913,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-1913,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-1913,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1913,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-1913,openSUSE-SLE-15.3-2022-1913,openSUSE-SLE-15.4-2022-1913 SKIP SUSE-RU-2022:1914-1 as SUSE-Storage-6-2022-1914 is not security or has no CVEs. patches: SUSE-2022-1914,SUSE-Storage-6-2022-1914 SKIP SUSE-RU-2022:1915-1 as openSUSE-SLE-15.4-2022-1915 is not security or has no CVEs. patches: SUSE-2022-1915,SUSE-SLE-Module-Basesystem-15-SP4-2022-1915,openSUSE-SLE-15.4-2022-1915 SKIP SUSE-RU-2022:1924-1 as openSUSE-SLE-15.4-2022-1924 is not security or has no CVEs. patches: SUSE-2022-1924,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1924,openSUSE-SLE-15.4-2022-1924 SKIP SUSE-RU-2022:1926-1 as SUSE-SLE-SERVER-12-SP5-2022-1926 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-1926,SUSE-2022-1926,SUSE-OpenStack-Cloud-8-2022-1926,SUSE-OpenStack-Cloud-9-2022-1926,SUSE-OpenStack-Cloud-Crowbar-8-2022-1926,SUSE-OpenStack-Cloud-Crowbar-9-2022-1926,SUSE-SLE-Module-Toolchain-12-2022-1926,SUSE-SLE-SAP-12-SP3-2022-1926,SUSE-SLE-SAP-12-SP4-2022-1926,SUSE-SLE-SERVER-12-SP2-BCL-2022-1926,SUSE-SLE-SERVER-12-SP3-2022-1926,SUSE-SLE-SERVER-12-SP3-BCL-2022-1926,SUSE-SLE-SERVER-12-SP4-LTSS-2022-1926,SUSE-SLE-SERVER-12-SP5-2022-1926 SKIP SUSE-RU-2022:1935-1 as openSUSE-SLE-15.3-2022-1935 is not security or has no CVEs. patches: SUSE-2022-1935,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1935,openSUSE-SLE-15.3-2022-1935,openSUSE-SLE-15.4-2022-1935 SKIP SUSE-RU-2022:1936-1 as openSUSE-SLE-15.4-2022-1936 is not security or has no CVEs. patches: SUSE-2022-1936,SUSE-SLE-Module-Basesystem-15-SP3-2022-1936,SUSE-SLE-Module-Basesystem-15-SP4-2022-1936,SUSE-SUSE-MicroOS-5.1-2022-1936,SUSE-SUSE-MicroOS-5.2-2022-1936,openSUSE-SLE-15.3-2022-1936,openSUSE-SLE-15.4-2022-1936 SKIP SUSE-RU-2022:1998-1 as SUSE-SLE-SERVER-12-SP5-2022-1998 is not security or has no CVEs. patches: SUSE-2022-1998,SUSE-SLE-SDK-12-SP5-2022-1998,SUSE-SLE-SERVER-12-SP5-2022-1998 SKIP SUSE-RU-2022:1999-1 as SUSE-SLE-SERVER-12-SP5-2022-1999 is not security or has no CVEs. patches: SUSE-2022-1999,SUSE-SLE-SERVER-12-SP5-2022-1999 SKIP SUSE-RU-2022:2001-1 as openSUSE-SLE-15.4-2022-2001 is not security or has no CVEs. patches: SUSE-2022-2001,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2001,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2001,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2001,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2001,openSUSE-SLE-15.3-2022-2001,openSUSE-SLE-15.4-2022-2001 SKIP SUSE-RU-2022:2002-1 as SUSE-Storage-7-2022-2002 is not security or has no CVEs. patches: SUSE-2022-2002,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2002,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2002,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2002,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2002,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2002,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2002,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2002,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2002,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2002,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2002,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2002,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2002,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2002,SUSE-Storage-6-2022-2002,SUSE-Storage-7-2022-2002 SKIP SUSE-RU-2022:2013-1 as SUSE-SLE-SERVER-12-SP5-2022-2013 is not security or has no CVEs. patches: SUSE-2022-2013,SUSE-SLE-SERVER-12-SP5-2022-2013 SKIP SUSE-RU-2022:2014-1 as openSUSE-SLE-15.4-2022-2014 is not security or has no CVEs. patches: SUSE-2022-2014,SUSE-SLE-Module-Basesystem-15-SP3-2022-2014,SUSE-SLE-Module-Basesystem-15-SP4-2022-2014,SUSE-SLE-Product-HPC-15-2022-2014,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2014,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2014,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2014,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2014,SUSE-SLE-Product-SLES-15-2022-2014,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2014,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2014,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2014,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2014,SUSE-SLE-Product-SLES_SAP-15-2022-2014,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2014,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2014,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2014,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2014,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2014,SUSE-Storage-6-2022-2014,SUSE-Storage-7-2022-2014,openSUSE-SLE-15.3-2022-2014,openSUSE-SLE-15.4-2022-2014 SKIP SUSE-RU-2022:2016-1 as openSUSE-SLE-15.4-2022-2016 is not security or has no CVEs. patches: SUSE-2022-2016,SUSE-SLE-Module-Basesystem-15-SP3-2022-2016,SUSE-SLE-Module-Basesystem-15-SP4-2022-2016,openSUSE-SLE-15.3-2022-2016,openSUSE-SLE-15.4-2022-2016 SKIP SUSE-RU-2022:2017-1 as openSUSE-SLE-15.4-2022-2017 is not security or has no CVEs. patches: SUSE-2022-2017,SUSE-SLE-Module-Basesystem-15-SP3-2022-2017,SUSE-SLE-Module-Basesystem-15-SP4-2022-2017,openSUSE-SLE-15.3-2022-2017,openSUSE-SLE-15.4-2022-2017 SKIP SUSE-RU-2022:2018-1 as openSUSE-SLE-15.4-2022-2018 is not security or has no CVEs. patches: SUSE-2022-2018,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2018,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2018,openSUSE-SLE-15.3-2022-2018,openSUSE-SLE-15.4-2022-2018 SKIP SUSE-RU-2022:2019-1 as openSUSE-SLE-15.4-2022-2019 is not security or has no CVEs. patches: SUSE-2022-2019,SUSE-SLE-Module-Basesystem-15-SP3-2022-2019,SUSE-SLE-Module-Basesystem-15-SP4-2022-2019,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2019,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2019,SUSE-SUSE-MicroOS-5.1-2022-2019,SUSE-SUSE-MicroOS-5.2-2022-2019,openSUSE-SLE-15.3-2022-2019,openSUSE-SLE-15.4-2022-2019 SKIP SUSE-RU-2022:2020-1 as openSUSE-SLE-15.3-2022-2020 is not security or has no CVEs. patches: SUSE-2022-2020,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2020,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2020,openSUSE-SLE-15.3-2022-2020 SKIP SUSE-RU-2022:2021-1 as SUSE-SLE-Product-HA-15-SP1-2022-2021 is not security or has no CVEs. patches: SUSE-2022-2021,SUSE-SLE-Product-HA-15-SP1-2022-2021 SKIP SUSE-RU-2022:2022-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2022 is not security or has no CVEs. patches: SUSE-2022-2022,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2022 SKIP SUSE-RU-2022:2023-1 as SUSE-SLE-Module-Public-Cloud-12-2022-2023 is not security or has no CVEs. patches: SUSE-2022-2023,SUSE-SLE-Module-Public-Cloud-12-2022-2023 SKIP SUSE-RU-2022:2024-1 as openSUSE-SLE-15.4-2022-2024 is not security or has no CVEs. patches: SUSE-2022-2024,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2024,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2024,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2024,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2024,SUSE-SUSE-MicroOS-5.2-2022-2024,openSUSE-SLE-15.3-2022-2024,openSUSE-SLE-15.4-2022-2024 SKIP SUSE-RU-2022:2025-1 as openSUSE-SLE-15.4-2022-2025 is not security or has no CVEs. patches: SUSE-2022-2025,openSUSE-SLE-15.3-2022-2025,openSUSE-SLE-15.4-2022-2025 SKIP SUSE-RU-2022:2026-1 as openSUSE-SLE-15.4-2022-2026 is not security or has no CVEs. patches: SUSE-2022-2026,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2026,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2026,SUSE-SLE-Product-WE-15-SP3-2022-2026,openSUSE-SLE-15.3-2022-2026,openSUSE-SLE-15.4-2022-2026 SKIP SUSE-RU-2022:2027-1 as SUSE-SLE-SERVER-12-SP5-2022-2027 is not security or has no CVEs. patches: SUSE-2022-2027,SUSE-SLE-SERVER-12-SP5-2022-2027 SKIP SUSE-RU-2022:2028-1 as SUSE-SLE-SERVER-12-SP5-2022-2028 is not security or has no CVEs. patches: SUSE-2022-2028,SUSE-SLE-SERVER-12-SP5-2022-2028 SKIP SUSE-RU-2022:2032-1 as SUSE-SLE-SERVER-12-SP5-2022-2032 is not security or has no CVEs. patches: SUSE-2022-2032,SUSE-SLE-SERVER-12-SP5-2022-2032 SKIP SUSE-RU-2022:2033-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-2033 is not security or has no CVEs. patches: SUSE-2022-2033,SUSE-SLE-Module-Basesystem-15-SP3-2022-2033 SKIP SUSE-RU-2022:2034-1 as SUSE-SLE-SERVER-12-SP5-2022-2034 is not security or has no CVEs. patches: SUSE-2022-2034,SUSE-SLE-SDK-12-SP5-2022-2034,SUSE-SLE-SERVER-12-SP5-2022-2034 SKIP SUSE-RU-2022:2045-1 as SUSE-SLE-SERVER-12-SP2-BCL-2022-2045 is not security or has no CVEs. patches: SUSE-2022-2045,SUSE-SLE-SERVER-12-SP2-BCL-2022-2045 SKIP SUSE-RU-2022:2048-1 as SUSE-SLE-SERVER-12-SP5-2022-2048 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2022-2048,SUSE-2022-2048,SUSE-OpenStack-Cloud-8-2022-2048,SUSE-OpenStack-Cloud-9-2022-2048,SUSE-OpenStack-Cloud-Crowbar-8-2022-2048,SUSE-OpenStack-Cloud-Crowbar-9-2022-2048,SUSE-SLE-SAP-12-SP3-2022-2048,SUSE-SLE-SAP-12-SP4-2022-2048,SUSE-SLE-SERVER-12-SP3-2022-2048,SUSE-SLE-SERVER-12-SP3-BCL-2022-2048,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2048,SUSE-SLE-SERVER-12-SP5-2022-2048 SKIP SUSE-RU-2022:2049-1 as openSUSE-SLE-15.4-2022-2049 is not security or has no CVEs. patches: SUSE-2022-2049,SUSE-SLE-Module-Basesystem-15-SP3-2022-2049,SUSE-SLE-Module-Basesystem-15-SP4-2022-2049,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2049,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2049,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2049,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2049,openSUSE-SLE-15.3-2022-2049,openSUSE-SLE-15.4-2022-2049 SKIP SUSE-RU-2022:2060-1 as openSUSE-SLE-15.4-2022-2060 is not security or has no CVEs. patches: SUSE-2022-2060,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2060,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2060,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2060,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2060,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2060,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-2060,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2060,SUSE-SLE-Module-Web-Scripting-15-SP3-2022-2060,SUSE-SLE-Module-Web-Scripting-15-SP4-2022-2060,openSUSE-SLE-15.3-2022-2060,openSUSE-SLE-15.4-2022-2060 SKIP SUSE-RU-2022:2061-1 as openSUSE-SLE-15.3-2022-2061 is not security or has no CVEs. patches: SUSE-2022-2061,SUSE-SLE-Module-Basesystem-15-SP3-2022-2061,openSUSE-SLE-15.3-2022-2061 SKIP SUSE-RU-2022:2067-1 as SUSE-SLE-SERVER-12-SP5-2022-2067 is not security or has no CVEs. patches: SUSE-2022-2067,SUSE-SLE-SERVER-12-SP5-2022-2067 SKIP SUSE-RU-2022:2088-1 as openSUSE-SLE-15.4-2022-2088 is not security or has no CVEs. patches: SUSE-2022-2088,SUSE-SLE-Module-Basesystem-15-SP4-2022-2088,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2088,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2088,openSUSE-SLE-15.4-2022-2088 SKIP SUSE-RU-2022:2090-1 as openSUSE-SLE-15.4-2022-2090 is not security or has no CVEs. patches: SUSE-2022-2090,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2090,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2090,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2090,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2090,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2090,openSUSE-SLE-15.3-2022-2090,openSUSE-SLE-15.4-2022-2090 SKIP SUSE-RU-2022:2093-1 as openSUSE-SLE-15.4-2022-2093 is not security or has no CVEs. patches: SUSE-2022-2093,SUSE-SLE-Module-Basesystem-15-SP3-2022-2093,SUSE-SLE-Module-Basesystem-15-SP4-2022-2093,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2093,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2093,SUSE-SUSE-MicroOS-5.1-2022-2093,SUSE-SUSE-MicroOS-5.2-2022-2093,openSUSE-SLE-15.3-2022-2093,openSUSE-SLE-15.4-2022-2093 SKIP SUSE-RU-2022:2094-1 as openSUSE-SLE-15.4-2022-2094 is not security or has no CVEs. patches: SUSE-2022-2094,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-2094,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2094,SUSE-SLE-Product-HA-15-SP3-2022-2094,SUSE-SLE-Product-HA-15-SP4-2022-2094,openSUSE-SLE-15.3-2022-2094,openSUSE-SLE-15.4-2022-2094 SKIP SUSE-RU-2022:2095-1 as SUSE-SLE-Product-HA-15-SP2-2022-2095 is not security or has no CVEs. patches: SUSE-2022-2095,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2095,SUSE-SLE-Product-HA-15-SP1-2022-2095,SUSE-SLE-Product-HA-15-SP2-2022-2095 SKIP SUSE-RU-2022:2096-1 as openSUSE-SLE-15.3-2022-2096 is not security or has no CVEs. patches: SUSE-2022-2096,SUSE-SLE-Module-Basesystem-15-SP3-2022-2096,openSUSE-SLE-15.3-2022-2096 SKIP SUSE-RU-2022:2097-1 as openSUSE-SLE-15.3-2022-2097 is not security or has no CVEs. patches: SUSE-2022-2097,SUSE-SLE-INSTALLER-15-SP3-2022-2097,SUSE-SLE-Module-Basesystem-15-SP3-2022-2097,openSUSE-SLE-15.3-2022-2097 SKIP SUSE-RU-2022:2110-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2110 is not security or has no CVEs. patches: SUSE-2022-2110,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2110,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2110,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2110,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2110 SKIP SUSE-RU-2022:2112-1 as openSUSE-SLE-15.4-2022-2112 is not security or has no CVEs. patches: SUSE-2022-2112,SUSE-SLE-Module-Basesystem-15-SP4-2022-2112,openSUSE-SLE-15.4-2022-2112 SKIP SUSE-RU-2022:2118-1 as openSUSE-SLE-15.4-2022-2118 is not security or has no CVEs. patches: SUSE-2022-2118,SUSE-SLE-Manager-Tools-15-2022-2118,SUSE-SLE-Module-Basesystem-15-SP3-2022-2118,SUSE-SLE-Module-Basesystem-15-SP4-2022-2118,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-2118,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-2118,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-2118,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2118,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-2118,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2118,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2118,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2118,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2118,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2118,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2118,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2118,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2118,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2118,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2118,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2118,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2118,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2118,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2118,SUSE-Storage-6-2022-2118,SUSE-Storage-7-2022-2118,openSUSE-SLE-15.3-2022-2118,openSUSE-SLE-15.4-2022-2118 SKIP SUSE-RU-2022:2119-1 as openSUSE-SLE-15.4-2022-2119 is not security or has no CVEs. patches: SUSE-2022-2119,SUSE-SLE-Module-Basesystem-15-SP4-2022-2119,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2119,SUSE-SLE-Module-Transactional-Server-15-SP4-2022-2119,openSUSE-SLE-15.4-2022-2119 SKIP SUSE-RU-2022:2136-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-2136 is not security or has no CVEs. patches: SUSE-2022-2136,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2022-2136,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2022-2136,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-2136 ERROR: notice SUSE-RU-2022:2138-1 has no valid patches out of: SUSE-2022-2138,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-2138 ERROR: notice SUSE-RU-2022:2141-1 has no valid patches out of: SUSE-2022-2141,SUSE-Debian-9.0-CLIENT-TOOLS-x86_64-2022-2141 SKIP SUSE-RU-2022:2155-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2155 is not security or has no CVEs. patches: SUSE-2022-2155,SUSE-SLE-Module-Public-Cloud-12-2022-2155,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2155 SKIP SUSE-RU-2022:2156-1 as openSUSE-SLE-15.4-2022-2156 is not security or has no CVEs. patches: SUSE-2022-2156,SUSE-SLE-Module-Basesystem-15-SP3-2022-2156,SUSE-SLE-Module-Basesystem-15-SP4-2022-2156,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2156,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2156,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2156,SUSE-SLE-Module-Python2-15-SP3-2022-2156,SUSE-SUSE-MicroOS-5.1-2022-2156,SUSE-SUSE-MicroOS-5.2-2022-2156,openSUSE-SLE-15.3-2022-2156,openSUSE-SLE-15.4-2022-2156 SKIP SUSE-RU-2022:2157-1 as openSUSE-SLE-15.4-2022-2157 is not security or has no CVEs. patches: SUSE-2022-2157,SUSE-SLE-Module-Basesystem-15-SP3-2022-2157,SUSE-SLE-Module-Basesystem-15-SP4-2022-2157,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2157,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2157,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2157,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2157,openSUSE-SLE-15.3-2022-2157,openSUSE-SLE-15.4-2022-2157 SKIP SUSE-RU-2022:2219-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2219 is not security or has no CVEs. patches: SUSE-2022-2219,SUSE-SLE-Module-Public-Cloud-12-2022-2219,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2219 SKIP SUSE-RU-2022:2264-1 as SUSE-SLE-SERVER-12-SP5-2022-2264 is not security or has no CVEs. patches: SUSE-2022-2264,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2264,SUSE-SLE-SERVER-12-SP5-2022-2264 SKIP SUSE-RU-2022:2269-1 as openSUSE-SLE-15.3-2022-2269 is not security or has no CVEs. patches: SUSE-2022-2269,SUSE-SLE-Module-Basesystem-15-SP3-2022-2269,SUSE-SUSE-MicroOS-5.1-2022-2269,SUSE-SUSE-MicroOS-5.2-2022-2269,openSUSE-SLE-15.3-2022-2269 SKIP SUSE-RU-2022:2270-1 as openSUSE-SLE-15.4-2022-2270 is not security or has no CVEs. patches: SUSE-2022-2270,SUSE-SLE-Module-Basesystem-15-SP3-2022-2270,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2270,SUSE-SLE-Module-Python2-15-SP3-2022-2270,SUSE-SUSE-MicroOS-5.1-2022-2270,SUSE-SUSE-MicroOS-5.2-2022-2270,openSUSE-SLE-15.3-2022-2270,openSUSE-SLE-15.4-2022-2270 SKIP SUSE-RU-2022:2299-1 as openSUSE-SLE-15.4-2022-2299 is not security or has no CVEs. patches: SUSE-2022-2299,SUSE-SLE-Module-Basesystem-15-SP4-2022-2299,openSUSE-SLE-15.4-2022-2299 SKIP SUSE-RU-2022:2300-1 as openSUSE-SLE-15.4-2022-2300 is not security or has no CVEs. patches: SUSE-2022-2300,SUSE-SLE-Module-Basesystem-15-SP4-2022-2300,openSUSE-SLE-15.4-2022-2300 SKIP SUSE-RU-2022:2323-1 as openSUSE-SLE-15.4-2022-2323 is not security or has no CVEs. patches: SUSE-2022-2323,SUSE-SLE-Module-Basesystem-15-SP3-2022-2323,SUSE-SLE-Module-Basesystem-15-SP4-2022-2323,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2323,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2323,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2323,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2323,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2323,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2323,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2323,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2323,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2323,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2323,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2323,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2323,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2323,SUSE-Storage-6-2022-2323,SUSE-Storage-7-2022-2323,openSUSE-SLE-15.3-2022-2323,openSUSE-SLE-15.4-2022-2323 SKIP SUSE-RU-2022:2329-1 as SUSE-SLE-Module-Live-Patching-15-SP4-2022-2330 is not security or has no CVEs. patches: SUSE-2022-2329,SUSE-SLE-Live-Patching-12-2022-2329,SUSE-SLE-Live-Patching-12-SP3-2022-2329,SUSE-SLE-Live-Patching-12-SP4-2022-2329,SUSE-SLE-Live-Patching-12-SP5-2022-2329,SUSE-SLE-Module-Live-Patching-15-2022-2330,SUSE-SLE-Module-Live-Patching-15-SP1-2022-2330,SUSE-SLE-Module-Live-Patching-15-SP2-2022-2330,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2330,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2330 SKIP SUSE-RU-2022:2330-1 as openSUSE-SLE-15.4-2022-2330 is not security or has no CVEs. patches: SUSE-2022-2330,openSUSE-SLE-15.3-2022-2330,openSUSE-SLE-15.4-2022-2330 SKIP SUSE-RU-2022:2339-1 as openSUSE-SLE-15.3-2022-2339 is not security or has no CVEs. patches: SUSE-2022-2339,SUSE-SLE-Module-Basesystem-15-SP3-2022-2339,SUSE-SLE-Module-Server-Applications-15-SP3-2022-2339,openSUSE-SLE-15.3-2022-2339 SKIP SUSE-RU-2022:2358-1 as openSUSE-SLE-15.4-2022-2358 is not security or has no CVEs. patches: SUSE-2022-2358,SUSE-SLE-Module-Basesystem-15-SP4-2022-2358,openSUSE-SLE-15.4-2022-2358 SKIP SUSE-RU-2022:2362-1 as SUSE-SLE-Module-Public-Cloud-12-2022-2362 is not security or has no CVEs. patches: SUSE-2022-2362,SUSE-SLE-Module-Public-Cloud-12-2022-2362 SKIP SUSE-RU-2022:2363-1 as openSUSE-SLE-15.4-2022-2363 is not security or has no CVEs. patches: SUSE-2022-2363,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2363,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2363,openSUSE-SLE-15.3-2022-2363,openSUSE-SLE-15.4-2022-2363 SKIP SUSE-RU-2022:2364-1 as openSUSE-SLE-15.4-2022-2364 is not security or has no CVEs. patches: SUSE-2022-2364,SUSE-SLE-Module-Basesystem-15-SP3-2022-2364,SUSE-SLE-Module-Basesystem-15-SP4-2022-2364,SUSE-SUSE-MicroOS-5.1-2022-2364,SUSE-SUSE-MicroOS-5.2-2022-2364,openSUSE-SLE-15.3-2022-2364,openSUSE-SLE-15.4-2022-2364 SKIP SUSE-RU-2022:2365-1 as SUSE-Storage-7-2022-2365 is not security or has no CVEs. patches: SUSE-2022-2365,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2365,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2365,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2365,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2365,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2365,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2365,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2365,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2365,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2365,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2365,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2365,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2365,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2365,SUSE-Storage-6-2022-2365,SUSE-Storage-7-2022-2365 SKIP SUSE-RU-2022:2366-1 as SUSE-SLE-SERVER-12-SP5-2022-2366 is not security or has no CVEs. patches: SUSE-2022-2366,SUSE-SLE-SERVER-12-SP5-2022-2366 SKIP SUSE-RU-2022:2380-1 as SUSE-Storage-6-2022-2380 is not security or has no CVEs. patches: SUSE-2022-2380,SUSE-SLE-Product-HPC-15-2022-2380,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2380,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2380,SUSE-SLE-Product-SLES-15-2022-2380,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2380,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2380,SUSE-SLE-Product-SLES_SAP-15-2022-2380,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2380,SUSE-Storage-6-2022-2380 SKIP SUSE-RU-2022:2381-1 as SUSE-SLE-SERVER-12-SP5-2022-2381 is not security or has no CVEs. patches: SUSE-2022-2381,SUSE-SLE-SERVER-12-SP5-2022-2381 SKIP SUSE-RU-2022:2386-1 as openSUSE-SLE-15.4-2022-2386 is not security or has no CVEs. patches: SUSE-2022-2386,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2386,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2386,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2386,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2386,openSUSE-SLE-15.3-2022-2386,openSUSE-SLE-15.4-2022-2386 SKIP SUSE-RU-2022:2387-1 as openSUSE-SLE-15.4-2022-2387 is not security or has no CVEs. patches: SUSE-2022-2387,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2387,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2387,openSUSE-SLE-15.3-2022-2387,openSUSE-SLE-15.4-2022-2387 SKIP SUSE-RU-2022:2394-1 as SUSE-SLE-Module-Python2-15-SP3-2022-2394 is not security or has no CVEs. patches: SUSE-2022-2394,SUSE-SLE-Module-Python2-15-SP3-2022-2394 SKIP SUSE-RU-2022:2397-1 as SUSE-SLE-SERVER-12-SP5-2022-2397 is not security or has no CVEs. patches: SUSE-2022-2397,SUSE-SLE-SERVER-12-SP5-2022-2397 SKIP SUSE-RU-2022:2399-1 as openSUSE-SLE-15.4-2022-2399 is not security or has no CVEs. patches: SUSE-2022-2399,SUSE-SLE-Module-Basesystem-15-SP3-2022-2399,SUSE-SLE-Module-Basesystem-15-SP4-2022-2399,SUSE-SLE-Product-HPC-15-2022-2399,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2399,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2399,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2399,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2399,SUSE-SLE-Product-SLES-15-2022-2399,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2399,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2399,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2399,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2399,SUSE-SLE-Product-SLES_SAP-15-2022-2399,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2399,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2399,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2399,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2399,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2399,SUSE-Storage-6-2022-2399,SUSE-Storage-7-2022-2399,openSUSE-SLE-15.3-2022-2399,openSUSE-SLE-15.4-2022-2399 SKIP SUSE-RU-2022:2406-1 as openSUSE-SLE-15.4-2022-2406 is not security or has no CVEs. patches: SUSE-2022-2406,SUSE-SLE-Module-Basesystem-15-SP3-2022-2406,SUSE-SLE-Module-Basesystem-15-SP4-2022-2406,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2406,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2406,SUSE-SLE-Module-Legacy-15-SP3-2022-2406,SUSE-SLE-Module-Legacy-15-SP4-2022-2406,SUSE-SUSE-MicroOS-5.1-2022-2406,SUSE-SUSE-MicroOS-5.2-2022-2406,openSUSE-SLE-15.3-2022-2406,openSUSE-SLE-15.4-2022-2406 SKIP SUSE-RU-2022:2406-2 as openSUSE-Leap-Micro-5.2-2022-2406 is not security or has no CVEs. patches: SUSE-2022-2406,openSUSE-Leap-Micro-5.2-2022-2406 SKIP SUSE-RU-2022:2408-1 as openSUSE-SLE-15.4-2022-2408 is not security or has no CVEs. patches: SUSE-2022-2408,openSUSE-SLE-15.4-2022-2408 SKIP SUSE-RU-2022:2412-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2412 is not security or has no CVEs. patches: SUSE-2022-2412,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2412 SKIP SUSE-RU-2022:2413-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2413 is not security or has no CVEs. patches: SUSE-2022-2413,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2413 SKIP SUSE-RU-2022:2418-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2418 is not security or has no CVEs. patches: SUSE-2022-2418,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2418 SKIP SUSE-RU-2022:2419-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2419 is not security or has no CVEs. patches: SUSE-2022-2419,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2419 SKIP SUSE-RU-2022:2420-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2420 is not security or has no CVEs. patches: SUSE-2022-2420,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2420 SKIP SUSE-RU-2022:2421-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2421 is not security or has no CVEs. patches: SUSE-2022-2421,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2421 SKIP SUSE-RU-2022:2426-1 as openSUSE-SLE-15.4-2022-2426 is not security or has no CVEs. patches: SUSE-2022-2426,SUSE-SLE-Module-Basesystem-15-SP4-2022-2426,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2426,openSUSE-SLE-15.4-2022-2426 SKIP SUSE-RU-2022:2447-1 as openSUSE-SLE-15.4-2022-2447 is not security or has no CVEs. patches: SUSE-2022-2447,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2447,openSUSE-SLE-15.4-2022-2447 SKIP SUSE-RU-2022:2453-1 as SUSE-Storage-7.1-2022-2453 is not security or has no CVEs. patches: SUSE-2022-2453,SUSE-Storage-7.1-2022-2453 SKIP SUSE-RU-2022:2454-1 as openSUSE-SLE-15.4-2022-2454 is not security or has no CVEs. patches: SUSE-2022-2454,SUSE-SLE-Module-SAP-Applications-15-2022-2454,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2454,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2454,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2454,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2454,openSUSE-SLE-15.3-2022-2454,openSUSE-SLE-15.4-2022-2454 SKIP SUSE-RU-2022:2455-1 as openSUSE-SLE-15.3-2022-2455 is not security or has no CVEs. patches: SUSE-2022-2455,SUSE-SLE-Module-Basesystem-15-SP3-2022-2455,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2455,SUSE-SUSE-MicroOS-5.1-2022-2455,SUSE-SUSE-MicroOS-5.2-2022-2455,openSUSE-SLE-15.3-2022-2455 SKIP SUSE-RU-2022:2456-1 as openSUSE-SLE-15.4-2022-2456 is not security or has no CVEs. patches: SUSE-2022-2456,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2456,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2456,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2456,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2456,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2456,openSUSE-SLE-15.3-2022-2456,openSUSE-SLE-15.4-2022-2456 SKIP SUSE-RU-2022:2457-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2457 is not security or has no CVEs. patches: SUSE-2022-2457,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2457,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2457,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2457,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2457 SKIP SUSE-RU-2022:2458-1 as openSUSE-SLE-15.4-2022-2458 is not security or has no CVEs. patches: SUSE-2022-2458,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2458,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2458,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2458,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2458,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2458,openSUSE-SLE-15.3-2022-2458,openSUSE-SLE-15.4-2022-2458 SKIP SUSE-RU-2022:2459-1 as openSUSE-SLE-15.4-2022-2459 is not security or has no CVEs. patches: SUSE-2022-2459,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2459,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2459,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2459,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2459,openSUSE-SLE-15.3-2022-2459,openSUSE-SLE-15.4-2022-2459 SKIP SUSE-RU-2022:2469-1 as openSUSE-SLE-15.4-2022-2469 is not security or has no CVEs. patches: SUSE-2022-2469,SUSE-SLE-Module-Basesystem-15-SP4-2022-2469,openSUSE-SLE-15.4-2022-2469 SKIP SUSE-RU-2022:2470-1 as openSUSE-SLE-15.4-2022-2470 is not security or has no CVEs. patches: SUSE-2022-2470,SUSE-SLE-Module-Basesystem-15-SP3-2022-2470,SUSE-SUSE-MicroOS-5.1-2022-2470,SUSE-SUSE-MicroOS-5.2-2022-2470,openSUSE-SLE-15.3-2022-2470,openSUSE-SLE-15.4-2022-2470 SKIP SUSE-RU-2022:2470-2 as openSUSE-Leap-Micro-5.2-2022-2470 is not security or has no CVEs. patches: SUSE-2022-2470,openSUSE-Leap-Micro-5.2-2022-2470 SKIP SUSE-RU-2022:2471-1 as openSUSE-SLE-15.4-2022-2471 is not security or has no CVEs. patches: SUSE-2022-2471,SUSE-SLE-INSTALLER-15-SP1-2022-2471,SUSE-SLE-Product-HPC-15-2022-2471,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2471,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2471,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2471,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2471,SUSE-SLE-Product-SLES-15-2022-2471,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2471,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2471,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2471,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2471,SUSE-SLE-Product-SLES_SAP-15-2022-2471,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2471,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2471,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2471,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2471,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2471,SUSE-Storage-6-2022-2471,SUSE-Storage-7-2022-2471,openSUSE-SLE-15.3-2022-2471,openSUSE-SLE-15.4-2022-2471 SKIP SUSE-RU-2022:2473-1 as openSUSE-SLE-15.4-2022-2473 is not security or has no CVEs. patches: SUSE-2022-2473,SUSE-SLE-Module-Basesystem-15-SP4-2022-2473,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2473,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2473,openSUSE-SLE-15.4-2022-2473 SKIP SUSE-RU-2022:2487-1 as openSUSE-SLE-15.4-2022-2487 is not security or has no CVEs. patches: SUSE-2022-2487,SUSE-SLE-Module-Legacy-15-SP4-2022-2487,openSUSE-SLE-15.4-2022-2487 SKIP SUSE-RU-2022:2490-1 as openSUSE-SLE-15.4-2022-2490 is not security or has no CVEs. patches: SUSE-2022-2490,SUSE-SLE-INSTALLER-15-SP4-2022-2490,SUSE-SLE-Product-SLES-15-SP4-2022-2490,openSUSE-SLE-15.4-2022-2490 SKIP SUSE-RU-2022:2493-1 as openSUSE-SLE-15.4-2022-2493 is not security or has no CVEs. patches: SUSE-2022-2493,SUSE-SLE-Module-Basesystem-15-SP4-2022-2493,openSUSE-SLE-15.4-2022-2493 SKIP SUSE-RU-2022:2494-1 as openSUSE-SLE-15.4-2022-2494 is not security or has no CVEs. patches: SUSE-2022-2494,SUSE-SLE-Module-Basesystem-15-SP3-2022-2494,SUSE-SLE-Module-Basesystem-15-SP4-2022-2494,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2494,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2494,SUSE-SUSE-MicroOS-5.1-2022-2494,SUSE-SUSE-MicroOS-5.2-2022-2494,openSUSE-SLE-15.3-2022-2494,openSUSE-SLE-15.4-2022-2494 SKIP SUSE-RU-2022:2494-2 as openSUSE-Leap-Micro-5.2-2022-2494 is not security or has no CVEs. patches: SUSE-2022-2494,openSUSE-Leap-Micro-5.2-2022-2494 SKIP SUSE-RU-2022:2528-1 as openSUSE-SLE-15.3-2022-2528 is not security or has no CVEs. patches: SUSE-2022-2528,SUSE-SLE-Module-Basesystem-15-SP3-2022-2528,SUSE-SUSE-MicroOS-5.1-2022-2528,SUSE-SUSE-MicroOS-5.2-2022-2528,openSUSE-SLE-15.3-2022-2528 SKIP SUSE-RU-2022:2538-1 as SUSE-SUSE-MicroOS-5.2-2022-2538 is not security or has no CVEs. patches: SUSE-2022-2538,SUSE-SUSE-MicroOS-5.2-2022-2538 SKIP SUSE-RU-2022:2542-1 as SUSE-SLE-SERVER-12-SP5-2022-2542 is not security or has no CVEs. patches: SUSE-2022-2542,SUSE-SLE-SERVER-12-SP5-2022-2542 SKIP SUSE-RU-2022:2545-1 as openSUSE-SLE-15.4-2022-2545 is not security or has no CVEs. patches: SUSE-2022-2545,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2545,openSUSE-SLE-15.4-2022-2545 SKIP SUSE-RU-2022:2548-1 as openSUSE-SLE-15.4-2022-2548 is not security or has no CVEs. patches: SUSE-2022-2548,SUSE-SLE-Module-Basesystem-15-SP3-2022-2548,SUSE-SLE-Module-Basesystem-15-SP4-2022-2548,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2548,SUSE-SLE-Module-Python2-15-SP3-2022-2548,openSUSE-SLE-15.3-2022-2548,openSUSE-SLE-15.4-2022-2548 SKIP SUSE-RU-2022:25556-1 as openSUSE-SLE-15.4-2022-25556 is not security or has no CVEs. patches: SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-25556,openSUSE-SLE-15.3-2022-25556,openSUSE-SLE-15.4-2022-25556 SKIP SUSE-RU-2022:2556-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2556 is not security or has no CVEs. patches: SUSE-2022-2556,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2556 SKIP SUSE-RU-2022:2563-1 as openSUSE-SLE-15.4-2022-2563 is not security or has no CVEs. patches: SUSE-2022-2563,openSUSE-SLE-15.3-2022-2563,openSUSE-SLE-15.4-2022-2563 SKIP SUSE-RU-2022:2564-1 as openSUSE-SLE-15.4-2022-2564 is not security or has no CVEs. patches: SUSE-2022-2564,openSUSE-SLE-15.3-2022-2564,openSUSE-SLE-15.4-2022-2564 SKIP SUSE-RU-2022:2568-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-2568 is not security or has no CVEs. patches: SUSE-2022-2568,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-2568 SKIP SUSE-RU-2022:2570-1 as SUSE-SLE-Product-SLES_SAP-15-2022-2570 is not security or has no CVEs. patches: SUSE-2022-2570,SUSE-SLE-INSTALLER-15-2022-2570,SUSE-SLE-Product-HPC-15-2022-2570,SUSE-SLE-Product-SLES-15-2022-2570,SUSE-SLE-Product-SLES_SAP-15-2022-2570 SKIP SUSE-RU-2022:2571-1 as SUSE-Storage-6-2022-2571 is not security or has no CVEs. patches: SUSE-2022-2571,SUSE-SLE-INSTALLER-15-SP1-2022-2571,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2571,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2571,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2571,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2571,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2571,SUSE-Storage-6-2022-2571 SKIP SUSE-RU-2022:2572-1 as openSUSE-SLE-15.3-2022-2572 is not security or has no CVEs. patches: SUSE-2022-2572,SUSE-SLE-INSTALLER-15-SP2-2022-2572,SUSE-SLE-Module-Basesystem-15-SP3-2022-2572,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2572,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2572,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2572,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2572,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2572,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2572,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2572,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2572,SUSE-SUSE-MicroOS-5.1-2022-2572,SUSE-SUSE-MicroOS-5.2-2022-2572,SUSE-Storage-7-2022-2572,openSUSE-SLE-15.3-2022-2572 SKIP SUSE-RU-2022:2573-1 as openSUSE-SLE-15.4-2022-2573 is not security or has no CVEs. patches: SUSE-2022-2573,SUSE-SLE-Module-Basesystem-15-SP4-2022-2573,openSUSE-SLE-15.4-2022-2573 SKIP SUSE-RU-2022:2576-1 as SUSE-SLE-SERVER-12-SP5-2022-2576 is not security or has no CVEs. patches: SUSE-2022-2576,SUSE-SLE-SDK-12-SP5-2022-2576,SUSE-SLE-SERVER-12-SP5-2022-2576 SKIP SUSE-RU-2022:2587-1 as SUSE-SLE-Product-HA-15-SP2-2022-2587 is not security or has no CVEs. patches: SUSE-2022-2587,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-2587,SUSE-SLE-Product-HA-15-SP1-2022-2587,SUSE-SLE-Product-HA-15-SP2-2022-2587 SKIP SUSE-RU-2022:2588-1 as openSUSE-SLE-15.4-2022-2588 is not security or has no CVEs. patches: SUSE-2022-2588,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-2588,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2588,SUSE-SLE-Product-HA-15-SP3-2022-2588,SUSE-SLE-Product-HA-15-SP4-2022-2588,openSUSE-SLE-15.3-2022-2588,openSUSE-SLE-15.4-2022-2588 SKIP SUSE-RU-2022:2589-1 as SUSE-SLE-HA-12-SP5-2022-2589 is not security or has no CVEs. patches: SUSE-2022-2589,SUSE-SLE-HA-12-SP4-2022-2589,SUSE-SLE-HA-12-SP5-2022-2589 SKIP SUSE-RU-2022:2590-1 as openSUSE-SLE-15.4-2022-2590 is not security or has no CVEs. patches: SUSE-2022-2590,openSUSE-SLE-15.3-2022-2590,openSUSE-SLE-15.4-2022-2590 SKIP SUSE-RU-2022:2593-1 as openSUSE-SLE-15.4-2022-2593 is not security or has no CVEs. patches: SUSE-2022-2593,SUSE-SLE-Module-Basesystem-15-SP4-2022-2593,openSUSE-SLE-15.4-2022-2593 SKIP SUSE-RU-2022:2612-1 as openSUSE-SLE-15.4-2022-2612 is not security or has no CVEs. patches: SUSE-2022-2612,openSUSE-SLE-15.3-2022-2612,openSUSE-SLE-15.4-2022-2612 SKIP SUSE-RU-2022:2613-1 as openSUSE-SLE-15.4-2022-2613 is not security or has no CVEs. patches: SUSE-2022-2613,SUSE-SLE-Product-HA-15-SP2-2022-2613,SUSE-SLE-Product-HA-15-SP3-2022-2613,SUSE-SLE-Product-HA-15-SP4-2022-2613,openSUSE-SLE-15.3-2022-2613,openSUSE-SLE-15.4-2022-2613 SKIP SUSE-RU-2022:2616-1 as openSUSE-SLE-15.4-2022-2616 is not security or has no CVEs. patches: SUSE-2022-2616,SUSE-SLE-Module-Basesystem-15-SP3-2022-2616,SUSE-SLE-Module-Basesystem-15-SP4-2022-2616,openSUSE-SLE-15.3-2022-2616,openSUSE-SLE-15.4-2022-2616 SKIP SUSE-RU-2022:2625-1 as openSUSE-SLE-15.4-2022-2625 is not security or has no CVEs. patches: SUSE-2022-2625,SUSE-SLE-Module-Basesystem-15-SP4-2022-2625,openSUSE-SLE-15.4-2022-2625 SKIP SUSE-RU-2022:2626-1 as openSUSE-SLE-15.4-2022-2626 is not security or has no CVEs. patches: SUSE-2022-2626,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2626,openSUSE-SLE-15.4-2022-2626 SKIP SUSE-RU-2022:2627-1 as SUSE-SLE-SERVER-12-SP5-2022-2627 is not security or has no CVEs. patches: SUSE-2022-2627,SUSE-SLE-SDK-12-SP5-2022-2627,SUSE-SLE-SERVER-12-SP5-2022-2627 SKIP SUSE-RU-2022:2628-1 as openSUSE-SLE-15.3-2022-2628 is not security or has no CVEs. patches: SUSE-2022-2628,SUSE-SLE-Module-Basesystem-15-SP3-2022-2628,SUSE-SLE-Module-Server-Applications-15-SP3-2022-2628,SUSE-SUSE-MicroOS-5.1-2022-2628,SUSE-SUSE-MicroOS-5.2-2022-2628,openSUSE-SLE-15.3-2022-2628 SKIP SUSE-RU-2022:2628-2 as openSUSE-Leap-Micro-5.2-2022-2628 is not security or has no CVEs. patches: SUSE-2022-2628,openSUSE-Leap-Micro-5.2-2022-2628 SKIP SUSE-RU-2022:2630-1 as openSUSE-SLE-15.4-2022-2630 is not security or has no CVEs. patches: SUSE-2022-2630,SUSE-SLE-Product-HA-15-SP4-2022-2630,openSUSE-SLE-15.4-2022-2630 SKIP SUSE-RU-2022:2640-1 as openSUSE-SLE-15.4-2022-2640 is not security or has no CVEs. patches: SUSE-2022-2640,SUSE-SLE-Module-Basesystem-15-SP4-2022-2640,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2640,openSUSE-SLE-15.4-2022-2640 SKIP SUSE-RU-2022:2644-1 as openSUSE-SLE-15.3-2022-2644 is not security or has no CVEs. patches: SUSE-2022-2644,SUSE-SLE-Module-Basesystem-15-SP3-2022-2644,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2644,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2644,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2644,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2644,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2644,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2644,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2644,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2644,SUSE-SUSE-MicroOS-5.1-2022-2644,SUSE-SUSE-MicroOS-5.2-2022-2644,SUSE-Storage-7-2022-2644,openSUSE-SLE-15.3-2022-2644 SKIP SUSE-RU-2022:2668-1 as openSUSE-SLE-15.4-2022-2668 is not security or has no CVEs. patches: SUSE-2022-2668,SUSE-SLE-Module-Basesystem-15-SP3-2022-2668,SUSE-SLE-Module-Basesystem-15-SP4-2022-2668,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2668,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2668,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2668,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2668,openSUSE-SLE-15.3-2022-2668,openSUSE-SLE-15.4-2022-2668 SKIP SUSE-RU-2022:2676-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2676 is not security or has no CVEs. patches: SUSE-2022-2676,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-2676,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-2676 SKIP SUSE-RU-2022:2677-1 as openSUSE-SLE-15.4-2022-2677 is not security or has no CVEs. patches: SUSE-2022-2677,SUSE-SLE-Module-Basesystem-15-SP4-2022-2677,openSUSE-SLE-15.4-2022-2677 SKIP SUSE-RU-2022:2678-1 as openSUSE-SLE-15.3-2022-2678 is not security or has no CVEs. patches: SUSE-2022-2678,SUSE-SLE-Module-Basesystem-15-SP3-2022-2678,SUSE-SUSE-MicroOS-5.1-2022-2678,SUSE-SUSE-MicroOS-5.2-2022-2678,openSUSE-SLE-15.3-2022-2678 SKIP SUSE-RU-2022:2678-2 as openSUSE-Leap-Micro-5.2-2022-2678 is not security or has no CVEs. patches: SUSE-2022-2678,openSUSE-Leap-Micro-5.2-2022-2678 SKIP SUSE-RU-2022:2679-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2022-2679 is not security or has no CVEs. patches: SUSE-2022-2679,SUSE-SLE-SERVER-12-SP5-2022-2679,SUSE-SLE-SERVER-INSTALLER-12-SP5-2022-2679 SKIP SUSE-RU-2022:2683-1 as SUSE-SLE-Product-SLES_SAP-15-2022-2683 is not security or has no CVEs. patches: SUSE-2022-2683,SUSE-SLE-Product-HPC-15-2022-2683,SUSE-SLE-Product-SLES-15-2022-2683,SUSE-SLE-Product-SLES_SAP-15-2022-2683 SKIP SUSE-RU-2022:2684-1 as SUSE-Storage-6-2022-2684 is not security or has no CVEs. patches: SUSE-2022-2684,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2684,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2684,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2684,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2684,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2684,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2684,SUSE-Storage-6-2022-2684 SKIP SUSE-RU-2022:2685-1 as SUSE-Storage-7-2022-2685 is not security or has no CVEs. patches: SUSE-2022-2685,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2685,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2685,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2685,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2685,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2685,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2685,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2685,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2685,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2685,SUSE-Storage-7-2022-2685 SKIP SUSE-RU-2022:2688-1 as openSUSE-SLE-15.4-2022-2688 is not security or has no CVEs. patches: SUSE-2022-2688,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2688,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2688,openSUSE-SLE-15.4-2022-2688 SKIP SUSE-RU-2022:2690-1 as openSUSE-SLE-15.4-2022-2690 is not security or has no CVEs. patches: SUSE-2022-2690,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2690,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2690,openSUSE-SLE-15.3-2022-2690,openSUSE-SLE-15.4-2022-2690 SKIP SUSE-RU-2022:2693-1 as SUSE-SLE-SERVER-12-SP5-2022-2693 is not security or has no CVEs. patches: SUSE-2022-2693,SUSE-SLE-SERVER-12-SP5-2022-2693 SKIP SUSE-RU-2022:2701-1 as SUSE-SLE-Module-Public-Cloud-12-2022-2701 is not security or has no CVEs. patches: SUSE-2022-2701,SUSE-SLE-Module-Public-Cloud-12-2022-2701 SKIP SUSE-RU-2022:2702-1 as SUSE-SLE-Module-Public-Cloud-12-2022-2702 is not security or has no CVEs. patches: SUSE-2022-2702,SUSE-SLE-Module-Public-Cloud-12-2022-2702 SKIP SUSE-RU-2022:2703-1 as openSUSE-SLE-15.4-2022-2703 is not security or has no CVEs. patches: SUSE-2022-2703,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2703,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2703,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2703,openSUSE-SLE-15.3-2022-2703,openSUSE-SLE-15.4-2022-2703 SKIP SUSE-RU-2022:2704-1 as SUSE-SLE-SERVER-12-SP5-2022-2704 is not security or has no CVEs. patches: SUSE-2022-2704,SUSE-SLE-SERVER-12-SP5-2022-2704 SKIP SUSE-RU-2022:2705-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2705 is not security or has no CVEs. patches: SUSE-2022-2705,SUSE-SLE-Module-SAP-Applications-15-2022-2705,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2705,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2705 SKIP SUSE-RU-2022:2706-1 as openSUSE-SLE-15.4-2022-2706 is not security or has no CVEs. patches: SUSE-2022-2706,SUSE-SLE-Module-Basesystem-15-SP4-2022-2706,SUSE-SLE-Module-Legacy-15-SP4-2022-2706,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2706,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2706,openSUSE-SLE-15.4-2022-2706 SKIP SUSE-RU-2022:2711-1 as openSUSE-SLE-15.4-2022-2711 is not security or has no CVEs. patches: SUSE-2022-2711,SUSE-SLE-Module-Basesystem-15-SP4-2022-2711,openSUSE-SLE-15.4-2022-2711 SKIP SUSE-RU-2022:2734-1 as SUSE-SLE-SAP-12-SP5-2022-2734 is not security or has no CVEs. patches: SUSE-2022-2734,SUSE-SLE-SAP-12-SP4-2022-2734,SUSE-SLE-SAP-12-SP5-2022-2734 SKIP SUSE-RU-2022:2735-1 as openSUSE-SLE-15.4-2022-2735 is not security or has no CVEs. patches: SUSE-2022-2735,SUSE-SLE-Module-Basesystem-15-SP3-2022-2735,SUSE-SLE-Module-Basesystem-15-SP4-2022-2735,SUSE-SUSE-MicroOS-5.1-2022-2735,SUSE-SUSE-MicroOS-5.2-2022-2735,openSUSE-SLE-15.3-2022-2735,openSUSE-SLE-15.4-2022-2735 SKIP SUSE-RU-2022:2735-2 as openSUSE-Leap-Micro-5.2-2022-2735 is not security or has no CVEs. patches: SUSE-2022-2735,openSUSE-Leap-Micro-5.2-2022-2735 SKIP SUSE-RU-2022:2736-1 as openSUSE-SLE-15.4-2022-2736 is not security or has no CVEs. patches: SUSE-2022-2736,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2736,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2736,openSUSE-SLE-15.4-2022-2736 SKIP SUSE-RU-2022:2737-1 as openSUSE-SLE-15.4-2022-2737 is not security or has no CVEs. patches: SUSE-2022-2737,SUSE-SLE-Module-Basesystem-15-SP4-2022-2737,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2737,openSUSE-SLE-15.4-2022-2737 SKIP SUSE-RU-2022:2749-1 as openSUSE-SLE-15.4-2022-2749 is not security or has no CVEs. patches: SUSE-2022-2749,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2749,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2749,openSUSE-SLE-15.3-2022-2749,openSUSE-SLE-15.4-2022-2749 SKIP SUSE-RU-2022:2753-1 as openSUSE-SLE-15.4-2022-2753 is not security or has no CVEs. patches: SUSE-2022-2753,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2753,openSUSE-SLE-15.4-2022-2753 SKIP SUSE-RU-2022:2755-1 as openSUSE-SLE-15.4-2022-2755 is not security or has no CVEs. patches: SUSE-2022-2755,openSUSE-SLE-15.3-2022-2755,openSUSE-SLE-15.4-2022-2755 SKIP SUSE-RU-2022:2756-1 as openSUSE-SLE-15.4-2022-2756 is not security or has no CVEs. patches: SUSE-2022-2756,openSUSE-SLE-15.3-2022-2756,openSUSE-SLE-15.4-2022-2756 SKIP SUSE-RU-2022:2757-1 as openSUSE-SLE-15.4-2022-2757 is not security or has no CVEs. patches: SUSE-2022-2757,openSUSE-SLE-15.3-2022-2757,openSUSE-SLE-15.4-2022-2757 SKIP SUSE-RU-2022:2758-1 as openSUSE-SLE-15.4-2022-2758 is not security or has no CVEs. patches: SUSE-2022-2758,SUSE-SLE-Module-SAP-Applications-15-2022-2758,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2758,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2758,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2758,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2758,openSUSE-SLE-15.3-2022-2758,openSUSE-SLE-15.4-2022-2758 SKIP SUSE-RU-2022:2760-1 as SUSE-SLE-SAP-12-SP5-2022-2760 is not security or has no CVEs. patches: SUSE-2022-2760,SUSE-SLE-SAP-12-SP4-2022-2760,SUSE-SLE-SAP-12-SP5-2022-2760 SKIP SUSE-RU-2022:2790-1 as openSUSE-SLE-15.4-2022-2790 is not security or has no CVEs. patches: SUSE-2022-2790,SUSE-SLE-Module-SAP-Applications-15-2022-2790,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-2790,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-2790,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-2790,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-2790,openSUSE-SLE-15.3-2022-2790,openSUSE-SLE-15.4-2022-2790 SKIP SUSE-RU-2022:2791-1 as SUSE-SLE-SAP-12-SP5-2022-2791 is not security or has no CVEs. patches: SUSE-2022-2791,SUSE-SLE-SAP-12-SP4-2022-2791,SUSE-SLE-SAP-12-SP5-2022-2791 SKIP SUSE-RU-2022:2792-1 as SUSE-SLE-HA-12-SP5-2022-2792 is not security or has no CVEs. patches: SUSE-2022-2792,SUSE-SLE-HA-12-SP5-2022-2792 SKIP SUSE-RU-2022:2796-1 as openSUSE-SLE-15.4-2022-2796 is not security or has no CVEs. patches: SUSE-2022-2796,SUSE-SLE-Module-Basesystem-15-SP4-2022-2796,openSUSE-SLE-15.4-2022-2796 SKIP SUSE-RU-2022:2804-1 as openSUSE-SLE-15.4-2022-2804 is not security or has no CVEs. patches: SUSE-2022-2804,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2804,openSUSE-SLE-15.4-2022-2804 SKIP SUSE-RU-2022:2805-1 as openSUSE-SLE-15.3-2022-2805 is not security or has no CVEs. patches: SUSE-2022-2805,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2805,openSUSE-SLE-15.3-2022-2805 SKIP SUSE-RU-2022:2810-1 as openSUSE-SLE-15.4-2022-2810 is not security or has no CVEs. patches: SUSE-2022-2810,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2810,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2810,SUSE-SUSE-MicroOS-5.1-2022-2810,SUSE-SUSE-MicroOS-5.2-2022-2810,openSUSE-SLE-15.3-2022-2810,openSUSE-SLE-15.4-2022-2810 SKIP SUSE-RU-2022:2812-1 as SUSE-SLE-HA-12-SP5-2022-2812 is not security or has no CVEs. patches: SUSE-2022-2812,SUSE-SLE-HA-12-SP4-2022-2812,SUSE-SLE-HA-12-SP5-2022-2812 SKIP SUSE-RU-2022:2814-1 as openSUSE-SLE-15.3-2022-2814 is not security or has no CVEs. patches: SUSE-2022-2814,SUSE-SLE-Module-Basesystem-15-SP3-2022-2814,SUSE-SUSE-MicroOS-5.1-2022-2814,SUSE-SUSE-MicroOS-5.2-2022-2814,openSUSE-SLE-15.3-2022-2814 SKIP SUSE-RU-2022:2815-1 as SUSE-SLE-SERVER-12-SP5-2022-2815 is not security or has no CVEs. patches: SUSE-2022-2815,SUSE-SLE-SERVER-12-SP5-2022-2815 SKIP SUSE-RU-2022:2816-1 as openSUSE-SLE-15.4-2022-2816 is not security or has no CVEs. patches: SUSE-2022-2816,SUSE-SLE-Module-Basesystem-15-SP4-2022-2816,openSUSE-SLE-15.4-2022-2816 SKIP SUSE-RU-2022:2844-1 as openSUSE-SLE-15.4-2022-2844 is not security or has no CVEs. patches: SUSE-2022-2844,SUSE-SLE-Module-Basesystem-15-SP3-2022-2844,SUSE-SLE-Module-Basesystem-15-SP4-2022-2844,SUSE-SUSE-MicroOS-5.1-2022-2844,SUSE-SUSE-MicroOS-5.2-2022-2844,openSUSE-SLE-15.3-2022-2844,openSUSE-SLE-15.4-2022-2844 SKIP SUSE-RU-2022:2844-2 as openSUSE-Leap-Micro-5.2-2022-2844 is not security or has no CVEs. patches: SUSE-2022-2844,openSUSE-Leap-Micro-5.2-2022-2844 SKIP SUSE-RU-2022:2848-1 as openSUSE-SLE-15.4-2022-2848 is not security or has no CVEs. patches: SUSE-2022-2848,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2848,openSUSE-SLE-15.4-2022-2848 SKIP SUSE-RU-2022:2849-1 as openSUSE-SLE-15.4-2022-2849 is not security or has no CVEs. patches: SUSE-2022-2849,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2849,openSUSE-SLE-15.4-2022-2849 SKIP SUSE-RU-2022:2850-1 as openSUSE-SLE-15.3-2022-2850 is not security or has no CVEs. patches: SUSE-2022-2850,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2850,openSUSE-SLE-15.3-2022-2850 SKIP SUSE-RU-2022:2851-1 as openSUSE-SLE-15.4-2022-2851 is not security or has no CVEs. patches: SUSE-2022-2851,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2851,openSUSE-SLE-15.4-2022-2851 SKIP SUSE-RU-2022:2852-1 as SUSE-SLE-Module-Public-Cloud-12-2022-2852 is not security or has no CVEs. patches: SUSE-2022-2852,SUSE-SLE-Module-Public-Cloud-12-2022-2852 SKIP SUSE-RU-2022:2853-1 as openSUSE-SLE-15.4-2022-2853 is not security or has no CVEs. patches: SUSE-2022-2853,SUSE-SLE-Module-Basesystem-15-SP3-2022-2853,SUSE-SLE-Module-Basesystem-15-SP4-2022-2853,SUSE-SLE-Module-Python2-15-SP3-2022-2853,openSUSE-SLE-15.3-2022-2853,openSUSE-SLE-15.4-2022-2853 SKIP SUSE-RU-2022:2860-1 as openSUSE-SLE-15.3-2022-2860 is not security or has no CVEs. patches: SUSE-2022-2860,SUSE-SLE-Product-HA-15-SP2-2022-2860,SUSE-SLE-Product-HA-15-SP3-2022-2860,openSUSE-SLE-15.3-2022-2860 SKIP SUSE-RU-2022:2879-1 as openSUSE-SLE-15.4-2022-2879 is not security or has no CVEs. patches: SUSE-2022-2879,SUSE-SLE-Module-Basesystem-15-SP3-2022-2879,SUSE-SLE-Module-Basesystem-15-SP4-2022-2879,SUSE-SLE-Product-HPC-15-2022-2879,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2879,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2879,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2879,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2879,SUSE-SLE-Product-SLES-15-2022-2879,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2879,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2879,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2879,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2879,SUSE-SLE-Product-SLES_SAP-15-2022-2879,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2879,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2879,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2879,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2879,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2879,SUSE-Storage-6-2022-2879,SUSE-Storage-7-2022-2879,openSUSE-SLE-15.3-2022-2879,openSUSE-SLE-15.4-2022-2879 SKIP SUSE-RU-2022:2888-1 as SUSE-SLE-SERVER-12-SP5-2022-2888 is not security or has no CVEs. patches: SUSE-2022-2888,SUSE-SLE-SDK-12-SP5-2022-2888,SUSE-SLE-SERVER-12-SP5-2022-2888 SKIP SUSE-RU-2022:2889-1 as openSUSE-SLE-15.4-2022-2889 is not security or has no CVEs. patches: SUSE-2022-2889,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2889,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2889,openSUSE-SLE-15.3-2022-2889,openSUSE-SLE-15.4-2022-2889 SKIP SUSE-RU-2022:2897-1 as SUSE-SLE-SERVER-12-SP5-2022-2897 is not security or has no CVEs. patches: SUSE-2022-2897,SUSE-OpenStack-Cloud-9-2022-2897,SUSE-OpenStack-Cloud-Crowbar-9-2022-2897,SUSE-SLE-SAP-12-SP4-2022-2897,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2897,SUSE-SLE-SERVER-12-SP5-2022-2897 SKIP SUSE-RU-2022:2901-1 as openSUSE-SLE-15.4-2022-2901 is not security or has no CVEs. patches: SUSE-2022-2901,SUSE-SLE-Module-Basesystem-15-SP4-2022-2901,openSUSE-SLE-15.4-2022-2901 SKIP SUSE-RU-2022:2902-1 as openSUSE-SLE-15.3-2022-2902 is not security or has no CVEs. patches: SUSE-2022-2902,SUSE-SLE-Module-Basesystem-15-SP3-2022-2902,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2902,SUSE-SLE-Product-WE-15-SP3-2022-2902,SUSE-SUSE-MicroOS-5.2-2022-2902,openSUSE-SLE-15.3-2022-2902 SKIP SUSE-RU-2022:2903-1 as openSUSE-SLE-15.4-2022-2903 is not security or has no CVEs. patches: SUSE-2022-2903,SUSE-SLE-Module-Basesystem-15-SP4-2022-2903,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2903,SUSE-SLE-Product-WE-15-SP4-2022-2903,openSUSE-SLE-15.4-2022-2903 SKIP SUSE-RU-2022:2904-1 as openSUSE-SLE-15.4-2022-2904 is not security or has no CVEs. patches: SUSE-2022-2904,SUSE-SLE-Module-Basesystem-15-SP3-2022-2904,SUSE-SLE-Module-Basesystem-15-SP4-2022-2904,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2904,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2904,SUSE-SLE-Module-Legacy-15-SP3-2022-2904,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2904,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2904,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2904,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2904,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2904,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2904,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2904,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2904,SUSE-SUSE-MicroOS-5.1-2022-2904,SUSE-SUSE-MicroOS-5.2-2022-2904,SUSE-Storage-7-2022-2904,openSUSE-SLE-15.3-2022-2904,openSUSE-SLE-15.4-2022-2904 SKIP SUSE-RU-2022:2905-1 as SUSE-Storage-6-2022-2905 is not security or has no CVEs. patches: SUSE-2022-2905,SUSE-SLE-Product-HPC-15-2022-2905,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2905,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2905,SUSE-SLE-Product-SLES-15-2022-2905,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2905,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2905,SUSE-SLE-Product-SLES_SAP-15-2022-2905,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2905,SUSE-Storage-6-2022-2905 SKIP SUSE-RU-2022:2906-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-2906 is not security or has no CVEs. patches: SUSE-2022-2906,SUSE-SLE-SERVER-12-SP2-BCL-2022-2906,SUSE-SLE-SERVER-12-SP3-BCL-2022-2906 SKIP SUSE-RU-2022:2907-1 as SUSE-SLE-SERVER-12-SP5-2022-2907 is not security or has no CVEs. patches: SUSE-2022-2907,SUSE-OpenStack-Cloud-9-2022-2907,SUSE-OpenStack-Cloud-Crowbar-9-2022-2907,SUSE-SLE-SAP-12-SP4-2022-2907,SUSE-SLE-SDK-12-SP5-2022-2907,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2907,SUSE-SLE-SERVER-12-SP5-2022-2907 SKIP SUSE-RU-2022:2916-1 as openSUSE-SLE-15.4-2022-2916 is not security or has no CVEs. patches: SUSE-2022-2916,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2916,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2916,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2916,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2916,openSUSE-SLE-15.3-2022-2916,openSUSE-SLE-15.4-2022-2916 ERROR: notice SUSE-RU-2022:2917-1 has no valid patches out of: SUSE-2022-2917,SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2022-2917 SKIP SUSE-RU-2022:2920-1 as openSUSE-SLE-15.4-2022-2920 is not security or has no CVEs. patches: SUSE-2022-2920,SUSE-SLE-Module-Basesystem-15-SP4-2022-2920,openSUSE-SLE-15.4-2022-2920 SKIP SUSE-RU-2022:2921-1 as openSUSE-SLE-15.4-2022-2921 is not security or has no CVEs. patches: SUSE-2022-2921,SUSE-SLE-Module-Basesystem-15-SP3-2022-2921,SUSE-SUSE-MicroOS-5.1-2022-2921,SUSE-SUSE-MicroOS-5.2-2022-2921,openSUSE-SLE-15.3-2022-2921,openSUSE-SLE-15.4-2022-2921 SKIP SUSE-RU-2022:2924-1 as openSUSE-SLE-15.4-2022-2924 is not security or has no CVEs. patches: SUSE-2022-2924,SUSE-SLE-Module-Basesystem-15-SP3-2022-2924,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2924,SUSE-SUSE-MicroOS-5.1-2022-2924,openSUSE-SLE-15.3-2022-2924,openSUSE-SLE-15.4-2022-2924 SKIP SUSE-RU-2022:2925-1 as openSUSE-SLE-15.4-2022-2925 is not security or has no CVEs. patches: SUSE-2022-2925,SUSE-SLE-Module-Basesystem-15-SP4-2022-2925,openSUSE-SLE-15.4-2022-2925 SKIP SUSE-RU-2022:2928-1 as openSUSE-SLE-15.4-2022-2928 is not security or has no CVEs. patches: SUSE-2022-2928,SUSE-SLE-Module-Basesystem-15-SP4-2022-2928,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2928,SUSE-SLE-Product-WE-15-SP4-2022-2928,openSUSE-SLE-15.4-2022-2928 SKIP SUSE-RU-2022:2929-1 as openSUSE-SLE-15.4-2022-2929 is not security or has no CVEs. patches: SUSE-2022-2929,SUSE-SLE-Module-Basesystem-15-SP3-2022-2929,SUSE-SLE-Module-Basesystem-15-SP4-2022-2929,SUSE-SLE-Product-HPC-15-2022-2929,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2929,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2929,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2929,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2929,SUSE-SLE-Product-SLES-15-2022-2929,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2929,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2929,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2929,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2929,SUSE-SLE-Product-SLES_SAP-15-2022-2929,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2929,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2929,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2929,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2929,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2929,SUSE-SUSE-MicroOS-5.1-2022-2929,SUSE-SUSE-MicroOS-5.2-2022-2929,SUSE-Storage-6-2022-2929,SUSE-Storage-7-2022-2929,openSUSE-SLE-15.3-2022-2929,openSUSE-SLE-15.4-2022-2929 SKIP SUSE-RU-2022:2929-2 as openSUSE-Leap-Micro-5.2-2022-2929 is not security or has no CVEs. patches: SUSE-2022-2929,openSUSE-Leap-Micro-5.2-2022-2929 SKIP SUSE-RU-2022:2930-1 as SUSE-SLE-SERVER-12-SP5-2022-2930 is not security or has no CVEs. patches: SUSE-2022-2930,SUSE-OpenStack-Cloud-9-2022-2930,SUSE-OpenStack-Cloud-Crowbar-9-2022-2930,SUSE-SLE-SAP-12-SP4-2022-2930,SUSE-SLE-SERVER-12-SP2-BCL-2022-2930,SUSE-SLE-SERVER-12-SP3-BCL-2022-2930,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2930,SUSE-SLE-SERVER-12-SP5-2022-2930 SKIP SUSE-RU-2022:2934-1 as SUSE-SLE-Module-Live-Patching-15-SP4-2022-2932 is not security or has no CVEs. patches: SUSE-2022-2934,SUSE-SLE-Module-Live-Patching-15-SP2-2022-2934,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2934,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2932 SKIP SUSE-RU-2022:2939-1 as openSUSE-SLE-15.4-2022-2939 is not security or has no CVEs. patches: SUSE-2022-2939,SUSE-SLE-Module-Basesystem-15-SP4-2022-2939,openSUSE-SLE-15.4-2022-2939 SKIP SUSE-RU-2022:2943-1 as openSUSE-SLE-15.4-2022-2943 is not security or has no CVEs. patches: SUSE-2022-2943,SUSE-SLE-Module-Basesystem-15-SP3-2022-2943,SUSE-SLE-Module-Basesystem-15-SP4-2022-2943,SUSE-SLE-Module-Python2-15-SP3-2022-2943,openSUSE-SLE-15.3-2022-2943,openSUSE-SLE-15.4-2022-2943 SKIP SUSE-RU-2022:2944-1 as openSUSE-SLE-15.4-2022-2944 is not security or has no CVEs. patches: SUSE-2022-2944,SUSE-SLE-Module-Basesystem-15-SP3-2022-2944,SUSE-SLE-Module-Basesystem-15-SP4-2022-2944,SUSE-SLE-Product-HPC-15-2022-2944,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2944,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2944,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2944,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2944,SUSE-SLE-Product-SLES-15-2022-2944,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2944,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2944,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2944,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2944,SUSE-SLE-Product-SLES_SAP-15-2022-2944,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2944,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2944,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2944,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2944,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2944,SUSE-SUSE-MicroOS-5.1-2022-2944,SUSE-SUSE-MicroOS-5.2-2022-2944,SUSE-Storage-6-2022-2944,SUSE-Storage-7-2022-2944,openSUSE-SLE-15.3-2022-2944,openSUSE-SLE-15.4-2022-2944 SKIP SUSE-RU-2022:2945-1 as openSUSE-SLE-15.4-2022-2945 is not security or has no CVEs. patches: SUSE-2022-2945,SUSE-SLE-Module-Basesystem-15-SP4-2022-2945,openSUSE-SLE-15.4-2022-2945 SKIP SUSE-RU-2022:2950-1 as SUSE-SLE-Module-Public-Cloud-12-2022-2950 is not security or has no CVEs. patches: SUSE-2022-2950,SUSE-SLE-Module-Public-Cloud-12-2022-2950 SKIP SUSE-RU-2022:2951-1 as openSUSE-SLE-15.4-2022-2951 is not security or has no CVEs. patches: SUSE-2022-2951,openSUSE-SLE-15.3-2022-2951,openSUSE-SLE-15.4-2022-2951 SKIP SUSE-RU-2022:2952-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2952 is not security or has no CVEs. patches: SUSE-2022-2952,SUSE-SLE-Module-Public-Cloud-12-2022-2952,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-2952 SKIP SUSE-RU-2022:2953-1 as openSUSE-SLE-15.4-2022-2953 is not security or has no CVEs. patches: SUSE-2022-2953,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2953,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2953,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2953,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2953,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-2953,openSUSE-SLE-15.3-2022-2953,openSUSE-SLE-15.4-2022-2953 SKIP SUSE-RU-2022:2954-1 as openSUSE-SLE-15.4-2022-2954 is not security or has no CVEs. patches: SUSE-2022-2954,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2954,openSUSE-SLE-15.4-2022-2954 SKIP SUSE-RU-2022:2955-1 as openSUSE-SLE-15.3-2022-2955 is not security or has no CVEs. patches: SUSE-2022-2955,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2955,openSUSE-SLE-15.3-2022-2955 SKIP SUSE-RU-2022:2956-1 as openSUSE-SLE-15.5-2022-2956 is not security or has no CVEs. patches: SUSE-2022-2956,openSUSE-SLE-15.5-2022-2956 SKIP SUSE-RU-2022:2967-1 as openSUSE-SLE-15.4-2022-2967 is not security or has no CVEs. patches: SUSE-2022-2967,SUSE-SLE-Module-Basesystem-15-SP4-2022-2967,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2967,SUSE-SLE-Product-WE-15-SP4-2022-2967,openSUSE-SLE-15.4-2022-2967 SKIP SUSE-RU-2022:2973-1 as openSUSE-SLE-15.4-2022-2973 is not security or has no CVEs. patches: SUSE-2022-2973,SUSE-SLE-Module-Basesystem-15-SP4-2022-2973,openSUSE-SLE-15.4-2022-2973 SKIP SUSE-RU-2022:2974-1 as openSUSE-SLE-15.3-2022-2974 is not security or has no CVEs. patches: SUSE-2022-2974,SUSE-SLE-Module-Basesystem-15-SP3-2022-2974,SUSE-SUSE-MicroOS-5.1-2022-2974,SUSE-SUSE-MicroOS-5.2-2022-2974,openSUSE-Leap-Micro-5.2-2022-2974,openSUSE-SLE-15.3-2022-2974 SKIP SUSE-RU-2022:2975-1 as openSUSE-SLE-15.4-2022-2975 is not security or has no CVEs. patches: SUSE-2022-2975,SUSE-SLE-Module-Basesystem-15-SP4-2022-2975,openSUSE-SLE-15.4-2022-2975 SKIP SUSE-RU-2022:2976-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-2976 is not security or has no CVEs. patches: SUSE-2022-2976,SUSE-SLE-SERVER-12-SP3-BCL-2022-2976 SKIP SUSE-RU-2022:2977-1 as openSUSE-SLE-15.4-2022-2977 is not security or has no CVEs. patches: SUSE-2022-2977,SUSE-SLE-Module-Basesystem-15-SP4-2022-2977,SUSE-SLE-Module-Server-Applications-15-SP4-2022-2977,openSUSE-SLE-15.4-2022-2977 SKIP SUSE-RU-2022:2978-1 as openSUSE-SLE-15.4-2022-2978 is not security or has no CVEs. patches: SUSE-2022-2978,SUSE-SLE-Product-HPC-15-2022-2978,SUSE-SLE-Product-SLES-15-2022-2978,SUSE-SLE-Product-SLES_SAP-15-2022-2978,openSUSE-SLE-15.4-2022-2978 SKIP SUSE-RU-2022:2979-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-2979 is not security or has no CVEs. patches: SUSE-2022-2979,SUSE-OpenStack-Cloud-9-2022-2979,SUSE-OpenStack-Cloud-Crowbar-9-2022-2979,SUSE-SLE-SAP-12-SP4-2022-2979,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2979 SKIP SUSE-RU-2022:2981-1 as SUSE-SLE-WE-12-SP5-2022-2981 is not security or has no CVEs. patches: SUSE-2022-2981,SUSE-SLE-SDK-12-SP5-2022-2981,SUSE-SLE-SERVER-12-SP5-2022-2981,SUSE-SLE-WE-12-SP5-2022-2981 SKIP SUSE-RU-2022:2982-1 as openSUSE-SLE-15.3-2022-2982 is not security or has no CVEs. patches: SUSE-2022-2982,SUSE-SLE-Module-Basesystem-15-SP3-2022-2982,SUSE-SLE-Module-Server-Applications-15-SP3-2022-2982,SUSE-SUSE-MicroOS-5.1-2022-2982,SUSE-SUSE-MicroOS-5.2-2022-2982,openSUSE-SLE-15.3-2022-2982 SKIP SUSE-RU-2022:2983-1 as SUSE-SLE-SERVER-12-SP2-BCL-2022-2983 is not security or has no CVEs. patches: SUSE-2022-2983,SUSE-SLE-SERVER-12-SP2-BCL-2022-2983 SKIP SUSE-RU-2022:2992-1 as openSUSE-SLE-15.4-2022-2992 is not security or has no CVEs. patches: SUSE-2022-2992,SUSE-SLE-Module-Basesystem-15-SP4-2022-2992,openSUSE-SLE-15.4-2022-2992 SKIP SUSE-RU-2022:2994-1 as openSUSE-SLE-15.4-2022-2994 is not security or has no CVEs. patches: SUSE-2022-2994,SUSE-SLE-Module-Basesystem-15-SP3-2022-2994,SUSE-SLE-Module-Basesystem-15-SP4-2022-2994,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2994,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2994,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2994,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2994,SUSE-SLE-Product-HPC-15-2022-2994,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2994,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2994,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2994,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2994,SUSE-SLE-Product-SLES-15-2022-2994,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2994,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2994,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2994,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2994,SUSE-SLE-Product-SLES_SAP-15-2022-2994,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2994,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2994,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2994,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2994,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2994,SUSE-SLE-Product-WE-15-SP3-2022-2994,SUSE-SLE-Product-WE-15-SP4-2022-2994,SUSE-SUSE-MicroOS-5.1-2022-2994,SUSE-SUSE-MicroOS-5.2-2022-2994,SUSE-Storage-6-2022-2994,SUSE-Storage-7-2022-2994,openSUSE-SLE-15.3-2022-2994,openSUSE-SLE-15.4-2022-2994 SKIP SUSE-RU-2022:2999-1 as openSUSE-SLE-15.4-2022-2999 is not security or has no CVEs. patches: SUSE-2022-2999,SUSE-SLE-Module-HPC-15-SP3-2022-2999,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2999,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-2999,openSUSE-SLE-15.3-2022-2999,openSUSE-SLE-15.4-2022-2999 SKIP SUSE-RU-2022:3000-1 as SUSE-SLE-SERVER-12-SP5-2022-3000 is not security or has no CVEs. patches: SUSE-2022-3000,SUSE-OpenStack-Cloud-9-2022-3000,SUSE-OpenStack-Cloud-Crowbar-9-2022-3000,SUSE-SLE-SAP-12-SP4-2022-3000,SUSE-SLE-SDK-12-SP5-2022-3000,SUSE-SLE-SERVER-12-SP2-BCL-2022-3000,SUSE-SLE-SERVER-12-SP3-BCL-2022-3000,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3000,SUSE-SLE-SERVER-12-SP5-2022-3000 SKIP SUSE-RU-2022:3002-1 as SUSE-SLE-Product-HA-15-SP1-2022-3002 is not security or has no CVEs. patches: SUSE-2022-3002,SUSE-SLE-Product-HA-15-SP1-2022-3002 SKIP SUSE-RU-2022:3008-1 as openSUSE-SLE-15.3-2022-3008 is not security or has no CVEs. patches: SUSE-2022-3008,SUSE-SLE-Module-Basesystem-15-SP3-2022-3008,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3008,openSUSE-SLE-15.3-2022-3008 SKIP SUSE-RU-2022:3009-1 as openSUSE-SLE-15.4-2022-3009 is not security or has no CVEs. patches: SUSE-2022-3009,SUSE-SLE-Module-Basesystem-15-SP4-2022-3009,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3009,openSUSE-SLE-15.4-2022-3009 SKIP SUSE-RU-2022:3010-1 as SUSE-SLE-SERVER-12-SP5-2022-3010 is not security or has no CVEs. patches: SUSE-2022-3010,SUSE-SLE-SERVER-12-SP5-2022-3010 SKIP SUSE-RU-2022:3011-1 as openSUSE-SLE-15.4-2022-3011 is not security or has no CVEs. patches: SUSE-2022-3011,SUSE-SLE-Module-Basesystem-15-SP4-2022-3011,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3011,openSUSE-SLE-15.4-2022-3011 SKIP SUSE-RU-2022:3012-1 as openSUSE-SLE-15.3-2022-3012 is not security or has no CVEs. patches: SUSE-2022-3012,SUSE-SLE-Module-Basesystem-15-SP3-2022-3012,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3012,openSUSE-SLE-15.3-2022-3012 SKIP SUSE-RU-2022:3015-1 as openSUSE-SLE-15.4-2022-3015 is not security or has no CVEs. patches: SUSE-2022-3015,SUSE-SLE-Module-Basesystem-15-SP4-2022-3015,openSUSE-SLE-15.4-2022-3015 SKIP SUSE-RU-2022:3018-1 as SUSE-Storage-7-2022-3018 is not security or has no CVEs. patches: SUSE-2022-3018,SUSE-SLE-INSTALLER-15-SP2-2022-3018,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3018,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3018,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3018,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3018,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3018,SUSE-Storage-7-2022-3018 SKIP SUSE-RU-2022:3019-1 as openSUSE-SLE-15.4-2022-3019 is not security or has no CVEs. patches: SUSE-2022-3019,SUSE-SLE-Module-Basesystem-15-SP3-2022-3019,SUSE-SLE-Module-Basesystem-15-SP4-2022-3019,SUSE-SUSE-MicroOS-5.2-2022-3019,openSUSE-Leap-Micro-5.2-2022-3019,openSUSE-SLE-15.3-2022-3019,openSUSE-SLE-15.4-2022-3019 SKIP SUSE-RU-2022:3021-1 as openSUSE-SLE-15.4-2022-3021 is not security or has no CVEs. patches: SUSE-2022-3021,SUSE-SLE-Module-Basesystem-15-SP4-2022-3021,openSUSE-SLE-15.4-2022-3021 SKIP SUSE-RU-2022:3022-1 as openSUSE-SLE-15.4-2022-3022 is not security or has no CVEs. patches: SUSE-2022-3022,SUSE-SLE-Module-Basesystem-15-SP4-2022-3022,openSUSE-SLE-15.4-2022-3022 SKIP SUSE-RU-2022:3023-1 as SUSE-SLE-Live-Patching-12-SP5-2022-3023 is not security or has no CVEs. patches: SUSE-2022-3023,SUSE-SLE-Live-Patching-12-2022-3023,SUSE-SLE-Live-Patching-12-SP4-2022-3023,SUSE-SLE-Live-Patching-12-SP5-2022-3023 SKIP SUSE-RU-2022:3024-1 as openSUSE-SLE-15.4-2022-3024 is not security or has no CVEs. patches: SUSE-2022-3024,SUSE-SLE-Module-Basesystem-15-SP3-2022-3024,openSUSE-SLE-15.3-2022-3024,openSUSE-SLE-15.4-2022-3024 SKIP SUSE-RU-2022:3025-1 as openSUSE-SLE-15.4-2022-3025 is not security or has no CVEs. patches: SUSE-2022-3025,SUSE-SLE-Module-Basesystem-15-SP4-2022-3025,openSUSE-SLE-15.4-2022-3025 SKIP SUSE-RU-2022:3026-1 as openSUSE-SLE-15.4-2022-3026 is not security or has no CVEs. patches: SUSE-2022-3026,SUSE-SLE-Module-Basesystem-15-SP4-2022-3026,openSUSE-SLE-15.4-2022-3026 SKIP SUSE-RU-2022:3027-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-3027 is not security or has no CVEs. patches: SUSE-2022-3027,SUSE-SLE-SERVER-12-SP3-BCL-2022-3027 SKIP SUSE-RU-2022:3028-1 as openSUSE-SLE-15.4-2022-3028 is not security or has no CVEs. patches: SUSE-2022-3028,SUSE-SLE-Module-Basesystem-15-SP3-2022-3028,SUSE-SLE-Module-Basesystem-15-SP4-2022-3028,SUSE-SLE-Module-Python2-15-SP3-2022-3028,SUSE-SUSE-MicroOS-5.1-2022-3028,SUSE-SUSE-MicroOS-5.2-2022-3028,openSUSE-SLE-15.3-2022-3028,openSUSE-SLE-15.4-2022-3028 SKIP SUSE-RU-2022:3031-1 as SUSE-SLE-SERVER-12-SP5-2022-3031 is not security or has no CVEs. patches: SUSE-2022-3031,SUSE-SLE-SDK-12-SP5-2022-3031,SUSE-SLE-SERVER-12-SP5-2022-3031 SKIP SUSE-RU-2022:3032-1 as openSUSE-SLE-15.4-2022-3032 is not security or has no CVEs. patches: SUSE-2022-3032,SUSE-SLE-Module-Basesystem-15-SP3-2022-3032,SUSE-SLE-Module-Basesystem-15-SP4-2022-3032,SUSE-SLE-Module-Web-Scripting-15-SP3-2022-3032,SUSE-SLE-Module-Web-Scripting-15-SP4-2022-3032,openSUSE-SLE-15.3-2022-3032,openSUSE-SLE-15.4-2022-3032 SKIP SUSE-RU-2022:3075-1 as SUSE-SLE-SDK-12-SP5-2022-3075 is not security or has no CVEs. patches: SUSE-2022-3075,SUSE-SLE-SDK-12-SP5-2022-3075 SKIP SUSE-RU-2022:3089-1 as openSUSE-SLE-15.4-2022-3089 is not security or has no CVEs. patches: SUSE-2022-3089,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3089,openSUSE-SLE-15.4-2022-3089 SKIP SUSE-RU-2022:3091-1 as openSUSE-SLE-15.3-2022-3091 is not security or has no CVEs. patches: SUSE-2022-3091,SUSE-SLE-Module-Basesystem-15-SP3-2022-3091,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3091,SUSE-SLE-Product-HPC-15-2022-3091,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3091,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3091,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3091,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3091,SUSE-SLE-Product-SLES-15-2022-3091,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3091,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3091,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3091,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3091,SUSE-SLE-Product-SLES_SAP-15-2022-3091,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3091,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3091,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3091,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3091,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3091,SUSE-SUSE-MicroOS-5.1-2022-3091,SUSE-SUSE-MicroOS-5.2-2022-3091,SUSE-Storage-6-2022-3091,SUSE-Storage-7-2022-3091,openSUSE-Leap-Micro-5.2-2022-3091,openSUSE-SLE-15.3-2022-3091 SKIP SUSE-RU-2022:3095-1 as openSUSE-SLE-15.4-2022-3095 is not security or has no CVEs. patches: SUSE-2022-3095,SUSE-SLE-Module-Live-Patching-15-2022-3095,SUSE-SLE-Module-Live-Patching-15-SP1-2022-3095,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3095,SUSE-SLE-Module-Live-Patching-15-SP3-2022-3095,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3095,openSUSE-SLE-15.3-2022-3095,openSUSE-SLE-15.4-2022-3095 SKIP SUSE-RU-2022:3097-1 as openSUSE-SLE-15.3-2022-3097 is not security or has no CVEs. patches: SUSE-2022-3097,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3097,SUSE-SLE-Product-WE-15-SP3-2022-3097,openSUSE-SLE-15.3-2022-3097 SKIP SUSE-RU-2022:3102-1 as openSUSE-SLE-15.4-2022-3102 is not security or has no CVEs. patches: SUSE-2022-3102,SUSE-SLE-Module-Basesystem-15-SP4-2022-3102,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3102,openSUSE-SLE-15.4-2022-3102 SKIP SUSE-RU-2022:3105-1 as SUSE-SLE-SERVER-12-SP5-2022-3105 is not security or has no CVEs. patches: SUSE-2022-3105,SUSE-OpenStack-Cloud-9-2022-3105,SUSE-OpenStack-Cloud-Crowbar-9-2022-3105,SUSE-SLE-SAP-12-SP4-2022-3105,SUSE-SLE-SDK-12-SP5-2022-3105,SUSE-SLE-SERVER-12-SP2-BCL-2022-3105,SUSE-SLE-SERVER-12-SP3-BCL-2022-3105,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3105,SUSE-SLE-SERVER-12-SP5-2022-3105 SKIP SUSE-RU-2022:3112-1 as SUSE-SLE-SERVER-12-SP5-2022-3112 is not security or has no CVEs. patches: SUSE-2022-3112,SUSE-OpenStack-Cloud-9-2022-3112,SUSE-OpenStack-Cloud-Crowbar-9-2022-3112,SUSE-SLE-SAP-12-SP4-2022-3112,SUSE-SLE-SERVER-12-SP2-BCL-2022-3112,SUSE-SLE-SERVER-12-SP3-BCL-2022-3112,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3112,SUSE-SLE-SERVER-12-SP5-2022-3112 SKIP SUSE-RU-2022:3113-1 as openSUSE-SLE-15.4-2022-3113 is not security or has no CVEs. patches: SUSE-2022-3113,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3113,SUSE-SLE-Product-WE-15-SP4-2022-3113,openSUSE-SLE-15.4-2022-3113 SKIP SUSE-RU-2022:3114-1 as openSUSE-SLE-15.3-2022-3114 is not security or has no CVEs. patches: SUSE-2022-3114,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3114,SUSE-SLE-Product-WE-15-SP3-2022-3114,openSUSE-SLE-15.3-2022-3114 SKIP SUSE-RU-2022:3118-1 as openSUSE-SLE-15.4-2022-3118 is not security or has no CVEs. patches: SUSE-2022-3118,SUSE-SLE-Module-Basesystem-15-SP4-2022-3118,SUSE-SLE-Product-HA-15-SP4-2022-3118,openSUSE-SLE-15.4-2022-3118 SKIP SUSE-RU-2022:3122-1 as openSUSE-SLE-15.4-2022-3122 is not security or has no CVEs. patches: SUSE-2022-3122,SUSE-SLE-Module-Basesystem-15-SP4-2022-3122,openSUSE-SLE-15.4-2022-3122 SKIP SUSE-RU-2022:3127-1 as openSUSE-SLE-15.4-2022-3127 is not security or has no CVEs. patches: SUSE-2022-3127,SUSE-SLE-Module-Basesystem-15-SP3-2022-3127,SUSE-SLE-Module-Basesystem-15-SP4-2022-3127,SUSE-SUSE-MicroOS-5.1-2022-3127,SUSE-SUSE-MicroOS-5.2-2022-3127,openSUSE-Leap-Micro-5.2-2022-3127,openSUSE-SLE-15.3-2022-3127,openSUSE-SLE-15.4-2022-3127 SKIP SUSE-RU-2022:3128-1 as openSUSE-SLE-15.4-2022-3128 is not security or has no CVEs. patches: SUSE-2022-3128,SUSE-SLE-Module-Basesystem-15-SP4-2022-3128,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3128,openSUSE-SLE-15.4-2022-3128 SKIP SUSE-RU-2022:3129-1 as SUSE-Storage-7-2022-3129 is not security or has no CVEs. patches: SUSE-2022-3129,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3129,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3129,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3129,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3129,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3129,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3129,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3129,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3129,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3129,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3129,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3129,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3129,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3129,SUSE-Storage-6-2022-3129,SUSE-Storage-7-2022-3129 SKIP SUSE-RU-2022:3130-1 as openSUSE-SLE-15.4-2022-3130 is not security or has no CVEs. patches: SUSE-2022-3130,SUSE-SLE-Module-Basesystem-15-SP4-2022-3130,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3130,openSUSE-SLE-15.4-2022-3130 SKIP SUSE-RU-2022:3131-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3131 is not security or has no CVEs. patches: SUSE-2022-3131,SUSE-SLE-Product-HPC-15-2022-3131,SUSE-SLE-Product-SLES-15-2022-3131,SUSE-SLE-Product-SLES_SAP-15-2022-3131 SKIP SUSE-RU-2022:3132-1 as openSUSE-SLE-15.3-2022-3132 is not security or has no CVEs. patches: SUSE-2022-3132,SUSE-SLE-Module-Basesystem-15-SP3-2022-3132,SUSE-SUSE-MicroOS-5.1-2022-3132,SUSE-SUSE-MicroOS-5.2-2022-3132,openSUSE-Leap-Micro-5.2-2022-3132,openSUSE-SLE-15.3-2022-3132 SKIP SUSE-RU-2022:3133-1 as openSUSE-SLE-15.4-2022-3133 is not security or has no CVEs. patches: SUSE-2022-3133,SUSE-SLE-Module-Basesystem-15-SP4-2022-3133,openSUSE-SLE-15.4-2022-3133 SKIP SUSE-RU-2022:3134-1 as openSUSE-SLE-15.4-2022-3134 is not security or has no CVEs. patches: SUSE-2022-3134,SUSE-SLE-Module-Containers-15-SP4-2022-3134,openSUSE-SLE-15.4-2022-3134 SKIP SUSE-RU-2022:3135-1 as openSUSE-SLE-15.4-2022-3135 is not security or has no CVEs. patches: SUSE-2022-3135,SUSE-SLE-Manager-Tools-15-2022-3135,SUSE-SLE-Module-Basesystem-15-SP3-2022-3135,SUSE-SLE-Module-Basesystem-15-SP4-2022-3135,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-3135,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-3135,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3135,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3135,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3135,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3135,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3135,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3135,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3135,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3135,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3135,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3135,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3135,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3135,SUSE-SUSE-MicroOS-5.2-2022-3135,SUSE-Storage-7-2022-3135,openSUSE-Leap-Micro-5.2-2022-3135,openSUSE-SLE-15.3-2022-3135,openSUSE-SLE-15.4-2022-3135 SKIP SUSE-RU-2022:3143-1 as openSUSE-SLE-15.3-2022-3143 is not security or has no CVEs. patches: SUSE-2022-3143,SUSE-SLE-Module-Basesystem-15-SP3-2022-3143,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3143,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3143,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3143,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3143,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3143,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3143,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3143,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3143,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3143,SUSE-Storage-7-2022-3143,openSUSE-SLE-15.3-2022-3143 SKIP SUSE-RU-2022:3145-1 as openSUSE-SLE-15.4-2022-3145 is not security or has no CVEs. patches: SUSE-2022-3145,SUSE-SLE-Module-Basesystem-15-SP3-2022-3145,SUSE-SLE-Module-Basesystem-15-SP4-2022-3145,openSUSE-SLE-15.3-2022-3145,openSUSE-SLE-15.4-2022-3145 SKIP SUSE-RU-2022:3146-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-3146 is not security or has no CVEs. patches: SUSE-2022-3146,SUSE-OpenStack-Cloud-9-2022-3146,SUSE-OpenStack-Cloud-Crowbar-9-2022-3146,SUSE-SLE-SAP-12-SP4-2022-3146,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3146 SKIP SUSE-RU-2022:3147-1 as openSUSE-SLE-15.3-2022-3147 is not security or has no CVEs. patches: SUSE-2022-3147,SUSE-SLE-Module-Basesystem-15-SP3-2022-3147,openSUSE-SLE-15.3-2022-3147 SKIP SUSE-RU-2022:3148-1 as SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3148 is not security or has no CVEs. patches: SUSE-2022-3148,SUSE-SLE-Module-Basesystem-15-SP4-2022-3148,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3148 SKIP SUSE-RU-2022:3149-1 as openSUSE-SLE-15.4-2022-3149 is not security or has no CVEs. patches: SUSE-2022-3149,SUSE-SLE-Module-Basesystem-15-SP4-2022-3149,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3149,openSUSE-SLE-15.4-2022-3149 SKIP SUSE-RU-2022:3150-1 as openSUSE-SLE-15.3-2022-3150 is not security or has no CVEs. patches: SUSE-2022-3150,SUSE-SLE-Module-Basesystem-15-SP3-2022-3150,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3150,openSUSE-SLE-15.3-2022-3150 SKIP SUSE-RU-2022:3151-1 as openSUSE-SLE-15.3-2022-3151 is not security or has no CVEs. patches: SUSE-2022-3151,SUSE-SLE-Module-Basesystem-15-SP3-2022-3151,SUSE-SUSE-MicroOS-5.1-2022-3151,SUSE-SUSE-MicroOS-5.2-2022-3151,openSUSE-Leap-Micro-5.2-2022-3151,openSUSE-SLE-15.3-2022-3151 SKIP SUSE-RU-2022:3155-1 as openSUSE-SLE-15.4-2022-3155 is not security or has no CVEs. patches: SUSE-2022-3155,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3155,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3155,openSUSE-SLE-15.3-2022-3155,openSUSE-SLE-15.4-2022-3155 SKIP SUSE-RU-2022:3156-1 as openSUSE-SLE-15.4-2022-3156 is not security or has no CVEs. patches: SUSE-2022-3156,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3156,openSUSE-SLE-15.3-2022-3156,openSUSE-SLE-15.4-2022-3156 SKIP SUSE-RU-2022:3157-1 as openSUSE-SLE-15.4-2022-3157 is not security or has no CVEs. patches: SUSE-2022-3157,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3157,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3157,openSUSE-SLE-15.3-2022-3157,openSUSE-SLE-15.4-2022-3157 SKIP SUSE-RU-2022:3158-1 as openSUSE-SLE-15.4-2022-3158 is not security or has no CVEs. patches: SUSE-2022-3158,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3158,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3158,openSUSE-SLE-15.3-2022-3158,openSUSE-SLE-15.4-2022-3158 SKIP SUSE-RU-2022:3161-1 as openSUSE-SLE-15.4-2022-3161 is not security or has no CVEs. patches: SUSE-2022-3161,SUSE-SLE-Module-Basesystem-15-SP4-2022-3161,openSUSE-SLE-15.4-2022-3161 SKIP SUSE-RU-2022:3163-1 as SUSE-SLE-Module-Development-Tools-15-SP3-2022-3163 is not security or has no CVEs. patches: SUSE-2022-3163,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3163 SKIP SUSE-RU-2022:3164-1 as openSUSE-SLE-15.3-2022-3164 is not security or has no CVEs. patches: SUSE-2022-3164,SUSE-SLE-Module-Basesystem-15-SP3-2022-3164,openSUSE-SLE-15.3-2022-3164 SKIP SUSE-RU-2022:3166-1 as openSUSE-SLE-15.4-2022-3166 is not security or has no CVEs. patches: SUSE-2022-3166,SUSE-SLE-Manager-Tools-15-2022-3166,SUSE-SLE-Module-Basesystem-15-SP3-2022-3166,SUSE-SLE-Module-Basesystem-15-SP4-2022-3166,SUSE-SLE-Product-HPC-15-2022-3166,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3166,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3166,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3166,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3166,SUSE-SLE-Product-SLES-15-2022-3166,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3166,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3166,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3166,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3166,SUSE-SLE-Product-SLES_SAP-15-2022-3166,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3166,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3166,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3166,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3166,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3166,SUSE-Storage-6-2022-3166,SUSE-Storage-7-2022-3166,openSUSE-SLE-15.3-2022-3166,openSUSE-SLE-15.4-2022-3166 ERROR: notice SUSE-RU-2022:3168-1 has no valid patches out of: SUSE-2022-3168,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-3168 SKIP SUSE-RU-2022:3169-1 as SUSE-Storage-6-2022-3169 is not security or has no CVEs. patches: SUSE-2022-3169,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3169,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3169,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3169,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3169,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3169,SUSE-Storage-6-2022-3169 SKIP SUSE-RU-2022:3173-1 as SUSE-Storage-7-2022-3173 is not security or has no CVEs. patches: SUSE-2022-3173,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3173,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3173,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3173,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3173,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3173,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3173,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3173,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3173,SUSE-Storage-7-2022-3173 SKIP SUSE-RU-2022:3174-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2022-3174 is not security or has no CVEs. patches: SUSE-2022-3174,SUSE-SLE-Manager-Tools-12-2022-3174,SUSE-SLE-Module-Adv-Systems-Management-12-2022-3174 SKIP SUSE-RU-2022:3179-1 as openSUSE-SLE-15.4-2022-3179 is not security or has no CVEs. patches: SUSE-2022-3179,SUSE-SLE-Module-Basesystem-15-SP3-2022-3179,SUSE-SLE-Module-Basesystem-15-SP4-2022-3179,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3179,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3179,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3179,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3179,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3179,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3179,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3179,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3179,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3179,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3179,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3179,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3179,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3179,SUSE-Storage-6-2022-3179,SUSE-Storage-7-2022-3179,openSUSE-SLE-15.3-2022-3179,openSUSE-SLE-15.4-2022-3179 SKIP SUSE-RU-2022:3182-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-3182 is not security or has no CVEs. patches: SUSE-2022-3182,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2022-3182,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2022-3182,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-3182 SKIP SUSE-RU-2022:3183-1 as openSUSE-SLE-15.3-2022-3183 is not security or has no CVEs. patches: SUSE-2022-3183,SUSE-SLE-Module-Basesystem-15-SP3-2022-3183,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3183,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-3183,SUSE-SUSE-MicroOS-5.1-2022-3183,SUSE-SUSE-MicroOS-5.2-2022-3183,openSUSE-Leap-Micro-5.2-2022-3183,openSUSE-SLE-15.3-2022-3183 SKIP SUSE-RU-2022:3185-1 as openSUSE-SLE-15.4-2022-3185 is not security or has no CVEs. patches: SUSE-2022-3185,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3185,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3185,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3185,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3185,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3185,openSUSE-SLE-15.3-2022-3185,openSUSE-SLE-15.4-2022-3185 SKIP SUSE-RU-2022:3188-1 as openSUSE-SLE-15.4-2022-3188 is not security or has no CVEs. patches: SUSE-2022-3188,SUSE-SLE-Module-Basesystem-15-SP4-2022-3188,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3188,SUSE-SLE-Module-Transactional-Server-15-SP4-2022-3188,openSUSE-SLE-15.4-2022-3188 SKIP SUSE-RU-2022:3189-1 as SUSE-SLE-SERVER-12-SP5-2022-3189 is not security or has no CVEs. patches: SUSE-2022-3189,SUSE-OpenStack-Cloud-9-2022-3189,SUSE-OpenStack-Cloud-Crowbar-9-2022-3189,SUSE-SLE-Manager-Tools-12-2022-3189,SUSE-SLE-SAP-12-SP4-2022-3189,SUSE-SLE-SERVER-12-SP3-BCL-2022-3189,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3189,SUSE-SLE-SERVER-12-SP5-2022-3189 SKIP SUSE-RU-2022:3192-1 as openSUSE-SLE-15.4-2022-3192 is not security or has no CVEs. patches: SUSE-2022-3192,SUSE-SLE-Module-Basesystem-15-SP4-2022-3192,openSUSE-SLE-15.4-2022-3192 SKIP SUSE-RU-2022:3194-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3194 is not security or has no CVEs. patches: SUSE-2022-3194,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3194 SKIP SUSE-RU-2022:3195-1 as openSUSE-SLE-15.4-2022-3195 is not security or has no CVEs. patches: SUSE-2022-3195,SUSE-SLE-INSTALLER-15-SP2-2022-3195,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3195,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3195,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3195,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3195,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3195,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3195,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3195,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3195,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3195,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3195,SUSE-Storage-7-2022-3195,openSUSE-SLE-15.3-2022-3195,openSUSE-SLE-15.4-2022-3195 SKIP SUSE-RU-2022:3200-1 as openSUSE-SLE-15.4-2022-3200 is not security or has no CVEs. patches: SUSE-2022-3200,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3200,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3200,openSUSE-SLE-15.3-2022-3200,openSUSE-SLE-15.4-2022-3200 SKIP SUSE-RU-2022:3201-1 as SUSE-SLE-SERVER-12-SP5-2022-3201 is not security or has no CVEs. patches: SUSE-2022-3201,SUSE-SLE-SDK-12-SP5-2022-3201,SUSE-SLE-SERVER-12-SP5-2022-3201 SKIP SUSE-RU-2022:3202-1 as openSUSE-SLE-15.3-2022-3202 is not security or has no CVEs. patches: SUSE-2022-3202,SUSE-SLE-Module-Basesystem-15-SP3-2022-3202,SUSE-SUSE-MicroOS-5.1-2022-3202,SUSE-SUSE-MicroOS-5.2-2022-3202,openSUSE-Leap-Micro-5.2-2022-3202,openSUSE-SLE-15.3-2022-3202 SKIP SUSE-RU-2022:3203-1 as SUSE-Storage-7-2022-3203 is not security or has no CVEs. patches: SUSE-2022-3203,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3203,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3203,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3203,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3203,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3203,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3203,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3203,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3203,SUSE-Storage-7-2022-3203 SKIP SUSE-RU-2022:3204-1 as openSUSE-SLE-15.4-2022-3204 is not security or has no CVEs. patches: SUSE-2022-3204,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3204,openSUSE-SLE-15.4-2022-3204 SKIP SUSE-RU-2022:3205-1 as openSUSE-SLE-15.4-2022-3205 is not security or has no CVEs. patches: SUSE-2022-3205,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3205,openSUSE-SLE-15.4-2022-3205 SKIP SUSE-RU-2022:3206-1 as openSUSE-SLE-15.4-2022-3206 is not security or has no CVEs. patches: SUSE-2022-3206,SUSE-SLE-Module-Basesystem-15-SP3-2022-3206,SUSE-SLE-Module-Basesystem-15-SP4-2022-3206,SUSE-SUSE-MicroOS-5.2-2022-3206,openSUSE-Leap-Micro-5.2-2022-3206,openSUSE-SLE-15.3-2022-3206,openSUSE-SLE-15.4-2022-3206 SKIP SUSE-RU-2022:3209-1 as openSUSE-SLE-15.4-2022-3209 is not security or has no CVEs. patches: SUSE-2022-3209,SUSE-SLE-Module-Basesystem-15-SP4-2022-3209,openSUSE-SLE-15.4-2022-3209 SKIP SUSE-RU-2022:3213-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3213 is not security or has no CVEs. patches: SUSE-2022-3213,SUSE-SLE-Product-HPC-15-2022-3213,SUSE-SLE-Product-SLES-15-2022-3213,SUSE-SLE-Product-SLES_SAP-15-2022-3213 SKIP SUSE-RU-2022:3214-1 as openSUSE-SLE-15.4-2022-3214 is not security or has no CVEs. patches: SUSE-2022-3214,SUSE-SLE-Module-Basesystem-15-SP3-2022-3214,SUSE-SLE-Module-Basesystem-15-SP4-2022-3214,SUSE-SUSE-MicroOS-5.1-2022-3214,SUSE-SUSE-MicroOS-5.2-2022-3214,openSUSE-SLE-15.3-2022-3214,openSUSE-SLE-15.4-2022-3214 SKIP SUSE-RU-2022:3215-1 as openSUSE-SLE-15.4-2022-3215 is not security or has no CVEs. patches: SUSE-2022-3215,SUSE-SLE-Module-Basesystem-15-SP3-2022-3215,SUSE-SLE-Module-Basesystem-15-SP4-2022-3215,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3215,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3215,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3215,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3215,SUSE-SLE-Module-Python2-15-SP3-2022-3215,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-3215,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3215,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3215,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3215,SUSE-SUSE-MicroOS-5.1-2022-3215,SUSE-SUSE-MicroOS-5.2-2022-3215,openSUSE-Leap-Micro-5.2-2022-3215,openSUSE-SLE-15.3-2022-3215,openSUSE-SLE-15.4-2022-3215 SKIP SUSE-RU-2022:3217-1 as openSUSE-SLE-15.4-2022-3217 is not security or has no CVEs. patches: SUSE-2022-3217,openSUSE-SLE-15.4-2022-3217 SKIP SUSE-RU-2022:3218-1 as openSUSE-SLE-15.3-2022-3218 is not security or has no CVEs. patches: SUSE-2022-3218,openSUSE-SLE-15.3-2022-3218 SKIP SUSE-RU-2022:3219-1 as openSUSE-SLE-15.4-2022-3219 is not security or has no CVEs. patches: SUSE-2022-3219,SUSE-SLE-Module-Basesystem-15-SP3-2022-3219,SUSE-SLE-Module-Basesystem-15-SP4-2022-3219,SUSE-SUSE-MicroOS-5.1-2022-3219,SUSE-SUSE-MicroOS-5.2-2022-3219,openSUSE-Leap-Micro-5.2-2022-3219,openSUSE-SLE-15.3-2022-3219,openSUSE-SLE-15.4-2022-3219 SKIP SUSE-RU-2022:3220-1 as openSUSE-SLE-15.4-2022-3220 is not security or has no CVEs. patches: SUSE-2022-3220,SUSE-SLE-Module-Basesystem-15-SP4-2022-3220,openSUSE-SLE-15.4-2022-3220 SKIP SUSE-RU-2022:3221-1 as SUSE-Storage-6-2022-3221 is not security or has no CVEs. patches: SUSE-2022-3221,SUSE-SLE-INSTALLER-15-SP1-2022-3221,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3221,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3221,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3221,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3221,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3221,SUSE-Storage-6-2022-3221 SKIP SUSE-RU-2022:3222-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3222 is not security or has no CVEs. patches: SUSE-2022-3222,SUSE-SLE-INSTALLER-15-2022-3222,SUSE-SLE-Product-HPC-15-2022-3222,SUSE-SLE-Product-SLES-15-2022-3222,SUSE-SLE-Product-SLES_SAP-15-2022-3222 SKIP SUSE-RU-2022:3223-1 as openSUSE-SLE-15.3-2022-3223 is not security or has no CVEs. patches: SUSE-2022-3223,SUSE-SLE-INSTALLER-15-SP2-2022-3223,SUSE-SLE-Module-Basesystem-15-SP3-2022-3223,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3223,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3223,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3223,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3223,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3223,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3223,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3223,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3223,SUSE-SUSE-MicroOS-5.1-2022-3223,SUSE-SUSE-MicroOS-5.2-2022-3223,SUSE-Storage-7-2022-3223,openSUSE-Leap-Micro-5.2-2022-3223,openSUSE-SLE-15.3-2022-3223 SKIP SUSE-RU-2022:3224-1 as openSUSE-SLE-15.4-2022-3224 is not security or has no CVEs. patches: SUSE-2022-3224,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3224,openSUSE-SLE-15.4-2022-3224 SKIP SUSE-RU-2022:3227-1 as SUSE-SLE-Module-Public-Cloud-12-2022-3227 is not security or has no CVEs. patches: SUSE-2022-3227,SUSE-SLE-Module-Public-Cloud-12-2022-3227 SKIP SUSE-RU-2022:3228-1 as openSUSE-SLE-15.4-2022-3228 is not security or has no CVEs. patches: SUSE-2022-3228,SUSE-SLE-Module-Public-Cloud-15-2022-3228,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-3228,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3228,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3228,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3228,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-3228,openSUSE-SLE-15.3-2022-3228,openSUSE-SLE-15.4-2022-3228 SKIP SUSE-RU-2022:3238-1 as openSUSE-SLE-15.4-2022-3238 is not security or has no CVEs. patches: SUSE-2022-3238,SUSE-SLE-Product-HA-15-SP4-2022-3238,openSUSE-SLE-15.4-2022-3238 SKIP SUSE-RU-2022:3239-1 as openSUSE-SLE-15.4-2022-3239 is not security or has no CVEs. patches: SUSE-2022-3239,SUSE-SLE-Module-Basesystem-15-SP3-2022-3239,openSUSE-SLE-15.3-2022-3239,openSUSE-SLE-15.4-2022-3239 SKIP SUSE-RU-2022:3240-1 as SUSE-SLE-SERVER-12-SP5-2022-3240 is not security or has no CVEs. patches: SUSE-2022-3240,SUSE-SLE-SERVER-12-SP5-2022-3240 SKIP SUSE-RU-2022:3241-1 as openSUSE-SLE-15.4-2022-3241 is not security or has no CVEs. patches: SUSE-2022-3241,SUSE-SLE-Module-Basesystem-15-SP3-2022-3241,SUSE-SLE-Module-Basesystem-15-SP4-2022-3241,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3241,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3241,SUSE-SUSE-MicroOS-5.2-2022-3241,openSUSE-Leap-Micro-5.2-2022-3241,openSUSE-SLE-15.3-2022-3241,openSUSE-SLE-15.4-2022-3241 SKIP SUSE-RU-2022:3242-1 as SUSE-SLE-SERVER-12-SP5-2022-3242 is not security or has no CVEs. patches: SUSE-2022-3242,SUSE-SLE-SERVER-12-SP5-2022-3242 SKIP SUSE-RU-2022:3243-1 as SUSE-SLE-Product-HPC-15-SP3-2022-3243 is not security or has no CVEs. patches: SUSE-2022-3243,SUSE-SLE-Module-HPC-15-SP3-2022-3243,SUSE-SLE-Product-HPC-15-SP3-2022-3243 SKIP SUSE-RU-2022:3253-1 as SUSE-Storage-6-2022-3253 is not security or has no CVEs. patches: SUSE-2022-3253,SUSE-SLE-Product-HPC-15-2022-3253,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3253,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3253,SUSE-SLE-Product-SLES-15-2022-3253,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3253,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3253,SUSE-SLE-Product-SLES_SAP-15-2022-3253,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3253,SUSE-Storage-6-2022-3253 SKIP SUSE-RU-2022:3254-1 as openSUSE-SLE-15.4-2022-3254 is not security or has no CVEs. patches: SUSE-2022-3254,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3254,SUSE-SLE-Product-WE-15-SP4-2022-3254,openSUSE-SLE-15.4-2022-3254 SKIP SUSE-RU-2022:3255-1 as openSUSE-SLE-15.3-2022-3255 is not security or has no CVEs. patches: SUSE-2022-3255,SUSE-SLE-Module-Basesystem-15-SP3-2022-3255,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3255,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3255,SUSE-SLE-Product-WE-15-SP3-2022-3255,openSUSE-SLE-15.3-2022-3255,openSUSE-SLE-15.4-2022-3255 SKIP SUSE-RU-2022:3256-1 as SUSE-SLE-Module-Basesystem-15-SP4-2022-3256 is not security or has no CVEs. patches: SUSE-2022-3256,SUSE-SLE-Module-Basesystem-15-SP4-2022-3256 SKIP SUSE-RU-2022:3258-1 as openSUSE-SLE-15.4-2022-3258 is not security or has no CVEs. patches: SUSE-2022-3258,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3258,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3258,openSUSE-SLE-15.3-2022-3258,openSUSE-SLE-15.4-2022-3258 SKIP SUSE-RU-2022:3260-1 as openSUSE-SLE-15.3-2022-3260 is not security or has no CVEs. patches: SUSE-2022-3260,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3260,openSUSE-SLE-15.3-2022-3260 SKIP SUSE-RU-2022:3261-1 as openSUSE-SLE-15.4-2022-3261 is not security or has no CVEs. patches: SUSE-2022-3261,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3261,openSUSE-SLE-15.4-2022-3261 SKIP SUSE-RU-2022:3262-1 as openSUSE-SLE-15.4-2022-3262 is not security or has no CVEs. patches: SUSE-2022-3262,SUSE-SLE-Module-Basesystem-15-SP3-2022-3262,SUSE-SLE-Module-Basesystem-15-SP4-2022-3262,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3262,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3262,SUSE-SLE-Module-Legacy-15-SP3-2022-3262,SUSE-SLE-Module-Legacy-15-SP4-2022-3262,SUSE-SUSE-MicroOS-5.1-2022-3262,SUSE-SUSE-MicroOS-5.2-2022-3262,openSUSE-Leap-Micro-5.2-2022-3262,openSUSE-SLE-15.3-2022-3262,openSUSE-SLE-15.4-2022-3262 SKIP SUSE-RU-2022:3276-1 as openSUSE-SLE-15.3-2022-3276 is not security or has no CVEs. patches: SUSE-2022-3276,SUSE-SLE-Module-Basesystem-15-SP3-2022-3276,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-3276,SUSE-SUSE-MicroOS-5.1-2022-3276,SUSE-SUSE-MicroOS-5.2-2022-3276,openSUSE-Leap-Micro-5.2-2022-3276,openSUSE-SLE-15.3-2022-3276 SKIP SUSE-RU-2022:3279-1 as openSUSE-SLE-15.4-2022-3279 is not security or has no CVEs. patches: SUSE-2022-3279,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3279,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3279,openSUSE-SLE-15.3-2022-3279,openSUSE-SLE-15.4-2022-3279 SKIP SUSE-RU-2022:3280-1 as openSUSE-SLE-15.4-2022-3280 is not security or has no CVEs. patches: SUSE-2022-3280,SUSE-SLE-Module-Basesystem-15-SP4-2022-3280,openSUSE-SLE-15.4-2022-3280 SKIP SUSE-RU-2022:3295-1 as openSUSE-SLE-15.4-2022-3295 is not security or has no CVEs. patches: SUSE-2022-3295,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3295,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3295,openSUSE-SLE-15.3-2022-3295,openSUSE-SLE-15.4-2022-3295 SKIP SUSE-RU-2022:3296-1 as openSUSE-SLE-15.4-2022-3296 is not security or has no CVEs. patches: SUSE-2022-3296,SUSE-SLE-Module-Basesystem-15-SP4-2022-3296,openSUSE-SLE-15.4-2022-3296 SKIP SUSE-RU-2022:3297-1 as SUSE-Storage-7-2022-3297 is not security or has no CVEs. patches: SUSE-2022-3297,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3297,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3297,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3297,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3297,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3297,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3297,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3297,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3297,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3297,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3297,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3297,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3297,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3297,SUSE-Storage-6-2022-3297,SUSE-Storage-7-2022-3297 SKIP SUSE-RU-2022:3298-1 as openSUSE-SLE-15.4-2022-3298 is not security or has no CVEs. patches: SUSE-2022-3298,SUSE-SLE-Module-Basesystem-15-SP3-2022-3298,SUSE-SLE-Module-Basesystem-15-SP4-2022-3298,SUSE-SLE-Module-Python2-15-SP3-2022-3298,SUSE-SUSE-MicroOS-5.1-2022-3298,SUSE-SUSE-MicroOS-5.2-2022-3298,openSUSE-Leap-Micro-5.2-2022-3298,openSUSE-SLE-15.3-2022-3298,openSUSE-SLE-15.4-2022-3298 SKIP SUSE-RU-2022:3299-1 as openSUSE-SLE-15.4-2022-3299 is not security or has no CVEs. patches: SUSE-2022-3299,SUSE-SLE-INSTALLER-15-SP4-2022-3299,SUSE-SLE-Module-Basesystem-15-SP4-2022-3299,openSUSE-SLE-15.4-2022-3299 SKIP SUSE-RU-2022:3300-1 as openSUSE-SLE-15.4-2022-3300 is not security or has no CVEs. patches: SUSE-2022-3300,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3300,openSUSE-SLE-15.4-2022-3300 SKIP SUSE-RU-2022:3301-1 as openSUSE-SLE-15.4-2022-3301 is not security or has no CVEs. patches: SUSE-2022-3301,SUSE-SLE-Module-Basesystem-15-SP4-2022-3301,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3301,SUSE-SLE-Product-WE-15-SP4-2022-3301,openSUSE-SLE-15.4-2022-3301 SKIP SUSE-RU-2022:3304-1 as openSUSE-SLE-15.4-2022-3304 is not security or has no CVEs. patches: SUSE-2022-3304,SUSE-SLE-Module-Basesystem-15-SP3-2022-3304,SUSE-SLE-Module-Basesystem-15-SP4-2022-3304,SUSE-SUSE-MicroOS-5.1-2022-3304,SUSE-SUSE-MicroOS-5.2-2022-3304,openSUSE-Leap-Micro-5.2-2022-3304,openSUSE-SLE-15.3-2022-3304,openSUSE-SLE-15.4-2022-3304 SKIP SUSE-RU-2022:3308-1 as openSUSE-SLE-15.4-2022-3308 is not security or has no CVEs. patches: SUSE-2022-3308,SUSE-SLE-Module-Basesystem-15-SP3-2022-3308,SUSE-SLE-Module-Basesystem-15-SP4-2022-3308,SUSE-SUSE-MicroOS-5.1-2022-3308,SUSE-SUSE-MicroOS-5.2-2022-3308,openSUSE-Leap-Micro-5.2-2022-3308,openSUSE-SLE-15.3-2022-3308,openSUSE-SLE-15.4-2022-3308 SKIP SUSE-RU-2022:3316-1 as openSUSE-SLE-15.4-2022-3316 is not security or has no CVEs. patches: SUSE-2022-3316,SUSE-SLE-Module-Basesystem-15-SP4-2022-3316,openSUSE-SLE-15.4-2022-3316 SKIP SUSE-RU-2022:3317-1 as openSUSE-SLE-15.4-2022-3317 is not security or has no CVEs. patches: SUSE-2022-3317,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3317,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3317,openSUSE-SLE-15.3-2022-3317,openSUSE-SLE-15.4-2022-3317 SKIP SUSE-RU-2022:3319-1 as openSUSE-SLE-15.4-2022-3319 is not security or has no CVEs. patches: SUSE-2022-3319,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3319,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3319,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3319,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-3319,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3319,openSUSE-SLE-15.3-2022-3319,openSUSE-SLE-15.4-2022-3319 SKIP SUSE-RU-2022:3324-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-3324 is not security or has no CVEs. patches: SUSE-2022-3324,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2022-3324,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2022-3324,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-3324 SKIP SUSE-RU-2022:3328-1 as openSUSE-SLE-15.4-2022-3328 is not security or has no CVEs. patches: SUSE-2022-3328,SUSE-SLE-Module-Basesystem-15-SP4-2022-3328,openSUSE-SLE-15.4-2022-3328 SKIP SUSE-RU-2022:3329-1 as SUSE-SLE-Module-Basesystem-15-SP3-2022-3329 is not security or has no CVEs. patches: SUSE-2022-3329,SUSE-SLE-Module-Basesystem-15-SP3-2022-3329 SKIP SUSE-RU-2022:3332-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-3332 is not security or has no CVEs. patches: SUSE-2022-3332,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2022-3332,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2022-3332,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2022-3332 SKIP SUSE-RU-2022:3336-1 as openSUSE-SLE-15.4-2022-3336 is not security or has no CVEs. patches: SUSE-2022-3336,SUSE-SLE-Module-Containers-15-SP4-2022-3336,openSUSE-SLE-15.4-2022-3336 SKIP SUSE-RU-2022:3340-1 as SUSE-SLE-Module-Public-Cloud-12-2022-3340 is not security or has no CVEs. patches: SUSE-2022-3340,SUSE-SLE-Module-Public-Cloud-12-2022-3340 SKIP SUSE-RU-2022:3388-1 as openSUSE-SLE-15.4-2022-3388 is not security or has no CVEs. patches: SUSE-2022-3388,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-3388,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3388,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3388,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3388,openSUSE-SLE-15.3-2022-3388,openSUSE-SLE-15.4-2022-3388 SKIP SUSE-RU-2022:3389-1 as SUSE-SLE-SERVER-12-SP5-2022-3389 is not security or has no CVEs. patches: SUSE-2022-3389,SUSE-SLE-SDK-12-SP5-2022-3389,SUSE-SLE-SERVER-12-SP5-2022-3389 SKIP SUSE-RU-2022:3389-2 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-3389 is not security or has no CVEs. patches: SUSE-2022-3389,SUSE-OpenStack-Cloud-9-2022-3389,SUSE-OpenStack-Cloud-Crowbar-9-2022-3389,SUSE-SLE-SAP-12-SP4-2022-3389,SUSE-SLE-SERVER-12-SP2-BCL-2022-3389,SUSE-SLE-SERVER-12-SP3-BCL-2022-3389,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3389 SKIP SUSE-RU-2022:3395-1 as openSUSE-SLE-15.4-2022-3395 is not security or has no CVEs. patches: SUSE-2022-3395,SUSE-SLE-Module-Basesystem-15-SP3-2022-3395,SUSE-SLE-Module-Basesystem-15-SP4-2022-3395,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3395,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3395,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3395,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3395,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3395,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3395,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3395,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3395,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3395,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3395,SUSE-SUSE-MicroOS-5.1-2022-3395,SUSE-SUSE-MicroOS-5.2-2022-3395,SUSE-Storage-7-2022-3395,openSUSE-Leap-Micro-5.2-2022-3395,openSUSE-SLE-15.3-2022-3395,openSUSE-SLE-15.4-2022-3395 SKIP SUSE-RU-2022:3398-1 as openSUSE-SLE-15.4-2022-3398 is not security or has no CVEs. patches: SUSE-2022-3398,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3398,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3398,openSUSE-SLE-15.3-2022-3398,openSUSE-SLE-15.4-2022-3398 SKIP SUSE-RU-2022:3426-1 as openSUSE-SLE-15.3-2022-3426 is not security or has no CVEs. patches: SUSE-2022-3426,SUSE-SLE-Module-Basesystem-15-SP3-2022-3426,SUSE-SUSE-MicroOS-5.2-2022-3426,openSUSE-Leap-Micro-5.2-2022-3426,openSUSE-SLE-15.3-2022-3426 SKIP SUSE-RU-2022:3427-1 as openSUSE-SLE-15.4-2022-3427 is not security or has no CVEs. patches: SUSE-2022-3427,SUSE-SLE-Module-Basesystem-15-SP4-2022-3427,openSUSE-SLE-15.4-2022-3427 SKIP SUSE-RU-2022:3435-1 as openSUSE-SLE-15.4-2022-3435 is not security or has no CVEs. patches: SUSE-2022-3435,SUSE-SLE-Module-Containers-15-SP3-2022-3435,SUSE-SLE-Module-Containers-15-SP4-2022-3435,SUSE-SUSE-MicroOS-5.1-2022-3435,SUSE-SUSE-MicroOS-5.2-2022-3435,SUSE-Storage-7-2022-3435,SUSE-Storage-7.1-2022-3435,openSUSE-Leap-Micro-5.2-2022-3435,openSUSE-SLE-15.3-2022-3435,openSUSE-SLE-15.4-2022-3435 SKIP SUSE-RU-2022:3436-1 as SUSE-SLE-SERVER-12-SP5-2022-3436 is not security or has no CVEs. patches: SUSE-2022-3436,SUSE-SLE-SERVER-12-SP5-2022-3436 SKIP SUSE-RU-2022:3437-1 as openSUSE-SLE-15.4-2022-3437 is not security or has no CVEs. patches: SUSE-2022-3437,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3437,openSUSE-SLE-15.4-2022-3437 SKIP SUSE-RU-2022:3438-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3438 is not security or has no CVEs. patches: SUSE-2022-3438,SUSE-SLE-Product-HPC-15-2022-3438,SUSE-SLE-Product-SLES-15-2022-3438,SUSE-SLE-Product-SLES_SAP-15-2022-3438 SKIP SUSE-RU-2022:3446-1 as SUSE-SLE-SERVER-12-SP5-2022-3446 is not security or has no CVEs. patches: SUSE-2022-3446,SUSE-SLE-SDK-12-SP5-2022-3446,SUSE-SLE-SERVER-12-SP5-2022-3446 SKIP SUSE-RU-2022:3447-1 as openSUSE-SLE-15.4-2022-3447 is not security or has no CVEs. patches: SUSE-2022-3447,SUSE-SLE-Module-Basesystem-15-SP3-2022-3447,SUSE-SLE-Module-Basesystem-15-SP4-2022-3447,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3447,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3447,SUSE-SLE-Product-WE-15-SP3-2022-3447,SUSE-SLE-Product-WE-15-SP4-2022-3447,openSUSE-SLE-15.3-2022-3447,openSUSE-SLE-15.4-2022-3447 SKIP SUSE-RU-2022:3448-1 as openSUSE-SLE-15.3-2022-3448 is not security or has no CVEs. patches: SUSE-2022-3448,SUSE-SLE-Module-Basesystem-15-SP3-2022-3448,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3448,SUSE-SLE-Product-WE-15-SP3-2022-3448,SUSE-SUSE-MicroOS-5.2-2022-3448,openSUSE-Leap-Micro-5.2-2022-3448,openSUSE-SLE-15.3-2022-3448 SKIP SUSE-RU-2022:3449-1 as openSUSE-SLE-15.4-2022-3449 is not security or has no CVEs. patches: SUSE-2022-3449,SUSE-SLE-Module-Basesystem-15-SP4-2022-3449,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3449,openSUSE-SLE-15.4-2022-3449 SKIP SUSE-RU-2022:3452-1 as openSUSE-SLE-15.4-2022-3452 is not security or has no CVEs. patches: SUSE-2022-3452,SUSE-SLE-Module-Basesystem-15-SP3-2022-3452,SUSE-SLE-Module-Basesystem-15-SP4-2022-3452,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3452,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3452,SUSE-SUSE-MicroOS-5.1-2022-3452,SUSE-SUSE-MicroOS-5.2-2022-3452,openSUSE-Leap-Micro-5.2-2022-3452,openSUSE-SLE-15.3-2022-3452,openSUSE-SLE-15.4-2022-3452 SKIP SUSE-RU-2022:3481-1 as openSUSE-SLE-15.4-2022-3481 is not security or has no CVEs. patches: SUSE-2022-3481,SUSE-SLE-Module-Basesystem-15-SP3-2022-3481,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3481,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3481,SUSE-SUSE-MicroOS-5.1-2022-3481,SUSE-SUSE-MicroOS-5.2-2022-3481,openSUSE-Leap-Micro-5.2-2022-3481,openSUSE-SLE-15.3-2022-3481,openSUSE-SLE-15.4-2022-3481 SKIP SUSE-RU-2022:3504-1 as SUSE-SLE-HA-12-SP4-2022-3504 is not security or has no CVEs. patches: SUSE-2022-3504,SUSE-SLE-HA-12-SP4-2022-3504 SKIP SUSE-RU-2022:3505-1 as openSUSE-SLE-15.3-2022-3505 is not security or has no CVEs. patches: SUSE-2022-3505,SUSE-SLE-Product-HA-15-SP3-2022-3505,openSUSE-SLE-15.3-2022-3505 SKIP SUSE-RU-2022:3506-1 as SUSE-SLE-Product-HA-15-SP2-2022-3506 is not security or has no CVEs. patches: SUSE-2022-3506,SUSE-SLE-Product-HA-15-SP2-2022-3506 SKIP SUSE-RU-2022:3507-1 as openSUSE-SLE-15.4-2022-3507 is not security or has no CVEs. patches: SUSE-2022-3507,SUSE-SLE-Product-HA-15-SP4-2022-3507,openSUSE-SLE-15.4-2022-3507 SKIP SUSE-RU-2022:3508-1 as SUSE-SLE-SAP-12-SP5-2022-3508 is not security or has no CVEs. patches: SUSE-2022-3508,SUSE-SLE-SAP-12-SP4-2022-3508,SUSE-SLE-SAP-12-SP5-2022-3508 SKIP SUSE-RU-2022:3509-1 as openSUSE-SLE-15.4-2022-3509 is not security or has no CVEs. patches: SUSE-2022-3509,SUSE-SLE-Product-HA-15-2022-3509,openSUSE-SLE-15.3-2022-3509,openSUSE-SLE-15.4-2022-3509 SKIP SUSE-RU-2022:3510-1 as SUSE-SLE-SDK-12-SP5-2022-3510 is not security or has no CVEs. patches: SUSE-2022-3510,SUSE-SLE-HA-12-SP5-2022-3510,SUSE-SLE-SDK-12-SP5-2022-3510 SKIP SUSE-RU-2022:3517-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-3517 is not security or has no CVEs. patches: SUSE-2022-3517,SUSE-OpenStack-Cloud-9-2022-3517,SUSE-OpenStack-Cloud-Crowbar-9-2022-3517,SUSE-SLE-SAP-12-SP4-2022-3517,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3517 SKIP SUSE-RU-2022:3518-1 as openSUSE-SLE-15.4-2022-3518 is not security or has no CVEs. patches: SUSE-2022-3518,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3518,openSUSE-SLE-15.4-2022-3518 SKIP SUSE-RU-2022:3519-1 as SUSE-Storage-7-2022-3519 is not security or has no CVEs. patches: SUSE-2022-3519,SUSE-SLE-Product-HPC-15-2022-3519,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3519,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3519,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3519,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3519,SUSE-SLE-Product-SLES-15-2022-3519,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3519,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3519,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3519,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3519,SUSE-SLE-Product-SLES_SAP-15-2022-3519,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3519,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3519,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3519,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3519,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3519,SUSE-Storage-6-2022-3519,SUSE-Storage-7-2022-3519 SKIP SUSE-RU-2022:3521-1 as openSUSE-SLE-15.4-2022-3521 is not security or has no CVEs. patches: SUSE-2022-3521,SUSE-SLE-Module-Basesystem-15-SP4-2022-3521,SUSE-SLE-Product-HA-15-SP4-2022-3521,openSUSE-SLE-15.4-2022-3521 SKIP SUSE-RU-2022:3526-1 as SUSE-SLE-SERVER-12-SP5-2022-3526 is not security or has no CVEs. patches: SUSE-2022-3526,SUSE-SLE-SDK-12-SP5-2022-3526,SUSE-SLE-SERVER-12-SP5-2022-3526 SKIP SUSE-RU-2022:3546-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2022-3546 is not security or has no CVEs. patches: SUSE-2022-3546,SUSE-SLE-Module-SAP-Applications-15-2022-3546,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-3546 SKIP SUSE-RU-2022:3548-1 as openSUSE-SLE-15.4-2022-3548 is not security or has no CVEs. patches: SUSE-2022-3548,openSUSE-SLE-15.3-2022-3548,openSUSE-SLE-15.4-2022-3548 SKIP SUSE-RU-2022:3551-1 as openSUSE-SLE-15.4-2022-3551 is not security or has no CVEs. patches: SUSE-2022-3551,SUSE-SLE-Module-Basesystem-15-SP4-2022-3551,openSUSE-SLE-15.4-2022-3551 SKIP SUSE-RU-2022:3555-1 as openSUSE-SLE-15.4-2022-3555 is not security or has no CVEs. patches: SUSE-2022-3555,SUSE-SLE-Micro-5.3-2022-3555,SUSE-SLE-Module-Basesystem-15-SP3-2022-3555,SUSE-SLE-Module-Basesystem-15-SP4-2022-3555,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3555,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3555,SUSE-SUSE-MicroOS-5.1-2022-3555,SUSE-SUSE-MicroOS-5.2-2022-3555,openSUSE-SLE-15.3-2022-3555,openSUSE-SLE-15.4-2022-3555 SKIP SUSE-RU-2022:3555-2 as openSUSE-Leap-Micro-5.3-2022-3555 is not security or has no CVEs. patches: SUSE-2022-3555,openSUSE-Leap-Micro-5.3-2022-3555 SKIP SUSE-RU-2022:3557-1 as openSUSE-SLE-15.4-2022-3557 is not security or has no CVEs. patches: SUSE-2022-3557,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-3557,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3557,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3557,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3557,openSUSE-SLE-15.3-2022-3557,openSUSE-SLE-15.4-2022-3557 SKIP SUSE-RU-2022:3558-1 as openSUSE-SLE-15.3-2022-3558 is not security or has no CVEs. patches: SUSE-2022-3558,SUSE-SLE-Product-SLED-15-SP3-2022-3558,openSUSE-SLE-15.3-2022-3558 SKIP SUSE-RU-2022:3559-1 as SUSE-SLE-Module-Public-Cloud-12-2022-3559 is not security or has no CVEs. patches: SUSE-2022-3559,SUSE-SLE-Module-Public-Cloud-12-2022-3559 SKIP SUSE-RU-2022:3564-1 as openSUSE-SLE-15.4-2022-3564 is not security or has no CVEs. patches: SUSE-2022-3564,SUSE-SLE-Micro-5.3-2022-3564,SUSE-SLE-Module-Basesystem-15-SP4-2022-3564,openSUSE-SLE-15.4-2022-3564 SKIP SUSE-RU-2022:3565-1 as openSUSE-SLE-15.3-2022-3565 is not security or has no CVEs. patches: SUSE-2022-3565,SUSE-SLE-INSTALLER-15-SP2-2022-3565,SUSE-SLE-Module-Basesystem-15-SP3-2022-3565,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3565,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3565,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3565,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3565,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3565,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3565,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3565,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3565,SUSE-SUSE-MicroOS-5.1-2022-3565,SUSE-SUSE-MicroOS-5.2-2022-3565,SUSE-Storage-7-2022-3565,openSUSE-Leap-Micro-5.2-2022-3565,openSUSE-SLE-15.3-2022-3565 SKIP SUSE-RU-2022:3566-1 as SUSE-Storage-6-2022-3566 is not security or has no CVEs. patches: SUSE-2022-3566,SUSE-SLE-INSTALLER-15-SP1-2022-3566,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3566,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3566,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3566,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3566,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3566,SUSE-Storage-6-2022-3566 SKIP SUSE-RU-2022:3567-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3567 is not security or has no CVEs. patches: SUSE-2022-3567,SUSE-SLE-INSTALLER-15-2022-3567,SUSE-SLE-Product-HPC-15-2022-3567,SUSE-SLE-Product-SLES-15-2022-3567,SUSE-SLE-Product-SLES_SAP-15-2022-3567 SKIP SUSE-RU-2022:3568-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3568 is not security or has no CVEs. patches: SUSE-2022-3568,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-3568 SKIP SUSE-RU-2022:3569-1 as openSUSE-SLE-15.4-2022-3569 is not security or has no CVEs. patches: SUSE-2022-3569,SUSE-SLE-Module-SAP-Applications-15-2022-3569,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-3569,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-3569,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-3569,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-3569,openSUSE-SLE-15.3-2022-3569,openSUSE-SLE-15.4-2022-3569 SKIP SUSE-RU-2022:3570-1 as openSUSE-SLE-15.4-2022-3570 is not security or has no CVEs. patches: SUSE-2022-3570,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-3570,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-3570,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-3570,openSUSE-SLE-15.3-2022-3570,openSUSE-SLE-15.4-2022-3570 SKIP SUSE-RU-2022:3572-1 as SUSE-Storage-6-2022-3572 is not security or has no CVEs. patches: SUSE-2022-3572,SUSE-Storage-6-2022-3572 SKIP SUSE-RU-2022:3573-1 as SUSE-SLE-Product-HA-15-SP1-2022-3573 is not security or has no CVEs. patches: SUSE-2022-3573,SUSE-SLE-Product-HA-15-SP1-2022-3573 SKIP SUSE-RU-2022:3574-1 as openSUSE-SLE-15.4-2022-3574 is not security or has no CVEs. patches: SUSE-2022-3574,SUSE-SLE-Module-SAP-Applications-15-2022-3574,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-3574,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-3574,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-3574,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-3574,openSUSE-SLE-15.3-2022-3574,openSUSE-SLE-15.4-2022-3574 SKIP SUSE-RU-2022:3577-1 as SUSE-SLE-SAP-12-SP5-2022-3577 is not security or has no CVEs. patches: SUSE-2022-3577,SUSE-SLE-SAP-12-SP4-2022-3577,SUSE-SLE-SAP-12-SP5-2022-3577 SKIP SUSE-RU-2022:3579-1 as openSUSE-SLE-15.3-2022-3579 is not security or has no CVEs. patches: SUSE-2022-3579,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3579,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3579,openSUSE-SLE-15.3-2022-3579 SKIP SUSE-RU-2022:3580-1 as SUSE-Storage-7-2022-3580 is not security or has no CVEs. patches: SUSE-2022-3580,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3580,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3580,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3580,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3580,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3580,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3580,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3580,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3580,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3580,SUSE-Storage-7-2022-3580 SKIP SUSE-RU-2022:3581-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3581 is not security or has no CVEs. patches: SUSE-2022-3581,SUSE-SLE-Product-HPC-15-2022-3581,SUSE-SLE-Product-SLES-15-2022-3581,SUSE-SLE-Product-SLES_SAP-15-2022-3581 SKIP SUSE-RU-2022:3582-1 as SUSE-Storage-6-2022-3582 is not security or has no CVEs. patches: SUSE-2022-3582,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-3582,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3582,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3582,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3582,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3582,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3582,SUSE-Storage-6-2022-3582 SKIP SUSE-RU-2022:3588-1 as openSUSE-SLE-15.4-2022-3588 is not security or has no CVEs. patches: SUSE-2022-3588,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3588,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3588,openSUSE-SLE-15.4-2022-3588 SKIP SUSE-RU-2022:3589-1 as SUSE-Storage-6-2022-3589 is not security or has no CVEs. patches: SUSE-2022-3589,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3589,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3589,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3589,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3589,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3589,SUSE-Storage-6-2022-3589 SKIP SUSE-RU-2022:3591-1 as openSUSE-SLE-15.3-2022-3591 is not security or has no CVEs. patches: SUSE-2022-3591,SUSE-SLE-Module-Basesystem-15-SP3-2022-3591,SUSE-SUSE-MicroOS-5.1-2022-3591,SUSE-SUSE-MicroOS-5.2-2022-3591,openSUSE-Leap-Micro-5.2-2022-3591,openSUSE-SLE-15.3-2022-3591 SKIP SUSE-RU-2022:3592-1 as SUSE-SLE-SAP-12-SP5-2022-3592 is not security or has no CVEs. patches: SUSE-2022-3592,SUSE-SLE-SAP-12-SP4-2022-3592,SUSE-SLE-SAP-12-SP5-2022-3592 SKIP SUSE-RU-2022:3595-1 as openSUSE-SLE-15.4-2022-3595 is not security or has no CVEs. patches: SUSE-2022-3595,SUSE-SLE-Module-Basesystem-15-SP4-2022-3595,openSUSE-SLE-15.4-2022-3595 SKIP SUSE-RU-2022:3600-1 as openSUSE-SLE-15.4-2022-3600 is not security or has no CVEs. patches: SUSE-2022-3600,SUSE-SLE-Module-Legacy-15-SP4-2022-3600,openSUSE-SLE-15.4-2022-3600 SKIP SUSE-RU-2022:3603-1 as SUSE-SLE-Product-HPC-15-SP4-2022-3603 is not security or has no CVEs. patches: SUSE-2022-3603,SUSE-SLE-Module-HPC-15-SP4-2022-3603,SUSE-SLE-Product-HPC-15-SP4-2022-3603 SKIP SUSE-RU-2022:3608-1 as SUSE-SLE-Live-Patching-12-SP5-2022-3608 is not security or has no CVEs. patches: SUSE-2022-3608,SUSE-SLE-Live-Patching-12-2022-3608,SUSE-SLE-Live-Patching-12-SP4-2022-3608,SUSE-SLE-Live-Patching-12-SP5-2022-3608 SKIP SUSE-RU-2022:3610-1 as openSUSE-SLE-15.4-2022-3610 is not security or has no CVEs. patches: SUSE-2022-3610,SUSE-SLE-Product-HA-15-SP4-2022-3610,openSUSE-SLE-15.4-2022-3610 SKIP SUSE-RU-2022:3611-1 as openSUSE-SLE-15.3-2022-3611 is not security or has no CVEs. patches: SUSE-2022-3611,SUSE-SLE-Product-HA-15-SP3-2022-3611,openSUSE-SLE-15.3-2022-3611 SKIP SUSE-RU-2022:3612-1 as openSUSE-SLE-15.3-2022-3612 is not security or has no CVEs. patches: SUSE-2022-3612,SUSE-SLE-Module-Basesystem-15-SP3-2022-3612,openSUSE-SLE-15.3-2022-3612 SKIP SUSE-RU-2022:3629-1 as SUSE-SLE-Product-HA-15-SP1-2022-3629 is not security or has no CVEs. patches: SUSE-2022-3629,SUSE-SLE-Product-HA-15-SP1-2022-3629 SKIP SUSE-RU-2022:3630-1 as SUSE-SLE-Product-HA-15-SP2-2022-3630 is not security or has no CVEs. patches: SUSE-2022-3630,SUSE-SLE-Product-HA-15-SP2-2022-3630 SKIP SUSE-RU-2022:3633-1 as openSUSE-SLE-15.4-2022-3633 is not security or has no CVEs. patches: SUSE-2022-3633,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3633,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3633,openSUSE-SLE-15.3-2022-3633,openSUSE-SLE-15.4-2022-3633 SKIP SUSE-RU-2022:3658-1 as SUSE-SLE-Product-HA-15-2022-3658 is not security or has no CVEs. patches: SUSE-2022-3658,SUSE-SLE-Product-HA-15-2022-3658 SKIP SUSE-RU-2022:3659-1 as SUSE-SLE-HA-12-SP5-2022-3659 is not security or has no CVEs. patches: SUSE-2022-3659,SUSE-SLE-HA-12-SP4-2022-3659,SUSE-SLE-HA-12-SP5-2022-3659 SKIP SUSE-RU-2022:3663-1 as openSUSE-SLE-15.4-2022-3663 is not security or has no CVEs. patches: SUSE-2022-3663,SUSE-SLE-Micro-5.3-2022-3663,SUSE-SLE-Module-Basesystem-15-SP4-2022-3663,openSUSE-SLE-15.4-2022-3663 SKIP SUSE-RU-2022:3664-1 as openSUSE-SLE-15.4-2022-3664 is not security or has no CVEs. patches: SUSE-2022-3664,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3664,openSUSE-SLE-15.4-2022-3664 SKIP SUSE-RU-2022:3670-1 as openSUSE-SLE-15.4-2022-3670 is not security or has no CVEs. patches: SUSE-2022-3670,SUSE-SLE-Micro-5.3-2022-3670,SUSE-SLE-Module-Basesystem-15-SP4-2022-3670,openSUSE-SLE-15.4-2022-3670 SKIP SUSE-RU-2022:3677-1 as openSUSE-SLE-15.4-2022-3677 is not security or has no CVEs. patches: SUSE-2022-3677,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3677,openSUSE-SLE-15.4-2022-3677 SKIP SUSE-RU-2022:3678-1 as openSUSE-SLE-15.4-2022-3678 is not security or has no CVEs. patches: SUSE-2022-3678,SUSE-SLE-Micro-5.3-2022-3678,SUSE-SLE-Module-Basesystem-15-SP4-2022-3678,openSUSE-SLE-15.4-2022-3678 SKIP SUSE-RU-2022:3684-1 as openSUSE-SLE-15.4-2022-3684 is not security or has no CVEs. patches: SUSE-2022-3684,SUSE-SLE-Micro-5.3-2022-3684,SUSE-SLE-Module-Basesystem-15-SP3-2022-3684,SUSE-SLE-Module-Basesystem-15-SP4-2022-3684,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3684,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3684,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3684,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3684,SUSE-SLE-Product-HPC-15-2022-3684,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3684,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3684,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3684,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3684,SUSE-SLE-Product-SLES-15-2022-3684,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3684,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3684,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3684,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3684,SUSE-SLE-Product-SLES_SAP-15-2022-3684,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3684,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3684,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3684,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3684,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3684,SUSE-SUSE-MicroOS-5.2-2022-3684,SUSE-Storage-6-2022-3684,SUSE-Storage-7-2022-3684,openSUSE-Leap-Micro-5.2-2022-3684,openSUSE-SLE-15.3-2022-3684,openSUSE-SLE-15.4-2022-3684 SKIP SUSE-RU-2022:3694-1 as openSUSE-SLE-15.4-2022-3694 is not security or has no CVEs. patches: SUSE-2022-3694,SUSE-SLE-Module-Live-Patching-15-2022-3694,SUSE-SLE-Module-Live-Patching-15-SP1-2022-3694,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3694,SUSE-SLE-Module-Live-Patching-15-SP3-2022-3694,SUSE-SLE-Module-Live-Patching-15-SP4-2022-3694,openSUSE-SLE-15.3-2022-3694,openSUSE-SLE-15.4-2022-3694 SKIP SUSE-RU-2022:3695-1 as SUSE-SLE-Product-HA-15-2022-3695 is not security or has no CVEs. patches: SUSE-2022-3695,SUSE-SLE-Product-HA-15-2022-3695 SKIP SUSE-RU-2022:3696-1 as openSUSE-SLE-15.4-2022-3696 is not security or has no CVEs. patches: SUSE-2022-3696,SUSE-SLE-Micro-5.3-2022-3696,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3696,SUSE-SLE-Product-HA-15-SP4-2022-3696,openSUSE-SLE-15.4-2022-3696 SKIP SUSE-RU-2022:3720-1 as SUSE-Storage-7.1-2022-3720 is not security or has no CVEs. patches: SUSE-2022-3720,SUSE-Storage-7.1-2022-3720 SKIP SUSE-RU-2022:3721-1 as SUSE-Storage-6-2022-3721 is not security or has no CVEs. patches: SUSE-2022-3721,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3721,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3721,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3721,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3721,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3721,SUSE-Storage-6-2022-3721 SKIP SUSE-RU-2022:3722-1 as SUSE-Storage-7-2022-3722 is not security or has no CVEs. patches: SUSE-2022-3722,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3722,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3722,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3722,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3722,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3722,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3722,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3722,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3722,SUSE-Storage-7-2022-3722 SKIP SUSE-RU-2022:3723-1 as SUSE-SLE-SERVER-12-SP5-2022-3723 is not security or has no CVEs. patches: SUSE-2022-3723,SUSE-SLE-SERVER-12-SP5-2022-3723 SKIP SUSE-RU-2022:3733-1 as openSUSE-SLE-15.4-2022-3733 is not security or has no CVEs. patches: SUSE-2022-3733,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3733,openSUSE-SLE-15.4-2022-3733 SKIP SUSE-RU-2022:3736-1 as SUSE-Storage-6-2022-3736 is not security or has no CVEs. patches: SUSE-2022-3736,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3736,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3736,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3736,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3736,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3736,SUSE-Storage-6-2022-3736 SKIP SUSE-RU-2022:3737-1 as openSUSE-SLE-15.3-2022-3737 is not security or has no CVEs. patches: SUSE-2022-3737,SUSE-SLE-Module-Basesystem-15-SP3-2022-3737,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3737,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-3737,SUSE-SUSE-MicroOS-5.1-2022-3737,SUSE-SUSE-MicroOS-5.2-2022-3737,openSUSE-Leap-Micro-5.2-2022-3737,openSUSE-SLE-15.3-2022-3737 SKIP SUSE-RU-2022:3738-1 as SUSE-Storage-7-2022-3738 is not security or has no CVEs. patches: SUSE-2022-3738,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3738,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3738,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3738,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3738,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3738,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3738,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3738,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3738,SUSE-Storage-7-2022-3738 SKIP SUSE-RU-2022:3743-1 as openSUSE-SLE-15.4-2022-3743 is not security or has no CVEs. patches: SUSE-2022-3743,SUSE-SLE-Manager-Tools-15-2022-3743,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-3743,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-3743,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3743,SUSE-Storage-6-2022-3743,openSUSE-SLE-15.3-2022-3743,openSUSE-SLE-15.4-2022-3743 ERROR: notice SUSE-RU-2022:3744-1 has no valid patches out of: SUSE-2022-3744,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-3744 SKIP SUSE-RU-2022:3748-1 as openSUSE-SLE-15.4-2022-3748 is not security or has no CVEs. patches: SUSE-2022-3748,SUSE-SLE-Micro-5.3-2022-3748,SUSE-SLE-Module-Basesystem-15-SP4-2022-3748,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3748,SUSE-SLE-Module-Transactional-Server-15-SP4-2022-3748,openSUSE-SLE-15.4-2022-3748 SKIP SUSE-RU-2022:3749-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2022-3749 is not security or has no CVEs. patches: SUSE-2022-3749,SUSE-SLE-Manager-Tools-12-2022-3749,SUSE-SLE-Module-Adv-Systems-Management-12-2022-3749 SKIP SUSE-RU-2022:3750-1 as openSUSE-SLE-15.4-2022-3750 is not security or has no CVEs. patches: SUSE-2022-3750,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3750,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3750,SUSE-SLE-Module-Python2-15-SP3-2022-3750,openSUSE-SLE-15.3-2022-3750,openSUSE-SLE-15.4-2022-3750 SKIP SUSE-RU-2022:3752-1 as SUSE-SLE-Product-SLES_SAP-15-2022-3752 is not security or has no CVEs. patches: SUSE-2022-3752,SUSE-SLE-Product-HPC-15-2022-3752,SUSE-SLE-Product-SLES-15-2022-3752,SUSE-SLE-Product-SLES_SAP-15-2022-3752 SKIP SUSE-RU-2022:3754-1 as SUSE-SLE-Manager-Tools-12-2022-3754 is not security or has no CVEs. patches: SUSE-2022-3754,SUSE-SLE-Manager-Tools-12-2022-3754 SKIP SUSE-RU-2022:3755-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3755 is not security or has no CVEs. patches: SUSE-2022-3755,SUSE-SLE-Manager-Tools-15-2022-3755,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-3755,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3755 ERROR: notice SUSE-RU-2022:3758-1 has no valid patches out of: SUSE-2022-3758,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-3758 ERROR: notice SUSE-RU-2022:3762-1 has no valid patches out of: SUSE-2022-3762,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-3762 ERROR: notice SUSE-RU-2022:3764-1 has no valid patches out of: SUSE-2022-3764,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-3764 SKIP SUSE-RU-2022:3776-1 as openSUSE-SLE-15.3-2022-3776 is not security or has no CVEs. patches: SUSE-2022-3776,SUSE-SLE-Module-Basesystem-15-SP3-2022-3776,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3776,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3776,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3776,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3776,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3776,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3776,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3776,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3776,SUSE-SUSE-MicroOS-5.1-2022-3776,SUSE-SUSE-MicroOS-5.2-2022-3776,SUSE-Storage-7-2022-3776,openSUSE-Leap-Micro-5.2-2022-3776,openSUSE-SLE-15.3-2022-3776 SKIP SUSE-RU-2022:3786-1 as openSUSE-SLE-15.4-2022-3786 is not security or has no CVEs. patches: SUSE-2022-3786,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3786,openSUSE-SLE-15.4-2022-3786 SKIP SUSE-RU-2022:3787-1 as openSUSE-SLE-15.4-2022-3787 is not security or has no CVEs. patches: SUSE-2022-3787,SUSE-SLE-Micro-5.3-2022-3787,SUSE-SLE-Module-Basesystem-15-SP4-2022-3787,openSUSE-SLE-15.4-2022-3787 SKIP SUSE-RU-2022:3788-1 as SUSE-SLE-SERVER-12-SP3-BCL-2022-3788 is not security or has no CVEs. patches: SUSE-2022-3788,SUSE-SLE-SERVER-12-SP2-BCL-2022-3788,SUSE-SLE-SERVER-12-SP3-BCL-2022-3788 SKIP SUSE-RU-2022:3789-1 as SUSE-SLE-SERVER-12-SP5-2022-3789 is not security or has no CVEs. patches: SUSE-2022-3789,SUSE-SLE-SERVER-12-SP5-2022-3789 SKIP SUSE-RU-2022:3792-1 as openSUSE-SLE-15.4-2022-3792 is not security or has no CVEs. patches: SUSE-2022-3792,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3792,openSUSE-SLE-15.3-2022-3792,openSUSE-SLE-15.4-2022-3792 SKIP SUSE-RU-2022:3798-1 as openSUSE-SLE-15.4-2022-3798 is not security or has no CVEs. patches: SUSE-2022-3798,SUSE-SLE-Product-HPC-15-2022-3798,SUSE-SLE-Product-SLES-15-2022-3798,SUSE-SLE-Product-SLES_SAP-15-2022-3798,openSUSE-SLE-15.4-2022-3798 SKIP SUSE-RU-2022:3799-1 as openSUSE-SLE-15.4-2022-3799 is not security or has no CVEs. patches: SUSE-2022-3799,SUSE-SLE-Module-Basesystem-15-SP4-2022-3799,openSUSE-SLE-15.4-2022-3799 SKIP SUSE-RU-2022:3811-1 as openSUSE-SLE-15.4-2022-3811 is not security or has no CVEs. patches: SUSE-2022-3811,SUSE-SLE-Micro-5.3-2022-3811,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3811,openSUSE-SLE-15.4-2022-3811 SKIP SUSE-RU-2022:3812-1 as openSUSE-SLE-15.4-2022-3812 is not security or has no CVEs. patches: SUSE-2022-3812,SUSE-SLE-Micro-5.3-2022-3812,SUSE-SLE-Module-Basesystem-15-SP4-2022-3812,openSUSE-SLE-15.4-2022-3812 SKIP SUSE-RU-2022:3813-1 as SUSE-SLE-SAP-12-SP5-2022-3813 is not security or has no CVEs. patches: SUSE-2022-3813,SUSE-SLE-SAP-12-SP4-2022-3813,SUSE-SLE-SAP-12-SP5-2022-3813 SKIP SUSE-RU-2022:3814-1 as openSUSE-SLE-15.4-2022-3814 is not security or has no CVEs. patches: SUSE-2022-3814,SUSE-SLE-Module-SAP-Applications-15-2022-3814,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-3814,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-3814,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-3814,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-3814,openSUSE-SLE-15.3-2022-3814,openSUSE-SLE-15.4-2022-3814 SKIP SUSE-RU-2022:3815-1 as SUSE-SLE-SERVER-12-SP5-2022-3815 is not security or has no CVEs. patches: SUSE-2022-3815,SUSE-SLE-SDK-12-SP5-2022-3815,SUSE-SLE-SERVER-12-SP5-2022-3815 SKIP SUSE-RU-2022:3816-1 as SUSE-Storage-7-2022-3816 is not security or has no CVEs. patches: SUSE-2022-3816,SUSE-SLE-Product-HPC-15-2022-3816,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3816,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3816,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3816,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3816,SUSE-SLE-Product-SLES-15-2022-3816,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3816,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3816,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3816,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3816,SUSE-SLE-Product-SLES_SAP-15-2022-3816,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3816,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3816,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3816,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3816,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3816,SUSE-Storage-6-2022-3816,SUSE-Storage-7-2022-3816 SKIP SUSE-RU-2022:3818-1 as openSUSE-SLE-15.4-2022-3818 is not security or has no CVEs. patches: SUSE-2022-3818,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3818,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3818,openSUSE-SLE-15.3-2022-3818,openSUSE-SLE-15.4-2022-3818 SKIP SUSE-RU-2022:3821-1 as openSUSE-SLE-15.3-2022-3821 is not security or has no CVEs. patches: SUSE-2022-3821,SUSE-SLE-Module-Basesystem-15-SP3-2022-3821,openSUSE-SLE-15.3-2022-3821 SKIP SUSE-RU-2022:3822-1 as openSUSE-SLE-15.4-2022-3822 is not security or has no CVEs. patches: SUSE-2022-3822,SUSE-SLE-Module-Basesystem-15-SP4-2022-3822,openSUSE-SLE-15.4-2022-3822 SKIP SUSE-RU-2022:3832-1 as SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3832 is not security or has no CVEs. patches: SUSE-2022-3832,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3832,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3832 SKIP SUSE-RU-2022:3838-1 as SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3838 is not security or has no CVEs. patches: SUSE-2022-3838,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3838,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3838 SKIP SUSE-RU-2022:3846-1 as SUSE-SLE-SERVER-12-SP5-2022-3846 is not security or has no CVEs. patches: SUSE-2022-3846,SUSE-SLE-SERVER-12-SP5-2022-3846 SKIP SUSE-RU-2022:3848-1 as openSUSE-SLE-15.4-2022-3848 is not security or has no CVEs. patches: SUSE-2022-3848,SUSE-SLE-Module-Basesystem-15-SP4-2022-3848,openSUSE-SLE-15.4-2022-3848 SKIP SUSE-RU-2022:3849-1 as SUSE-SLE-SERVER-12-SP5-2022-3849 is not security or has no CVEs. patches: SUSE-2022-3849,SUSE-SLE-SERVER-12-SP5-2022-3849 SKIP SUSE-RU-2022:3851-1 as openSUSE-SLE-15.4-2022-3851 is not security or has no CVEs. patches: SUSE-2022-3851,SUSE-SLE-Micro-5.3-2022-3851,SUSE-SLE-Module-Basesystem-15-SP4-2022-3851,openSUSE-SLE-15.4-2022-3851 SKIP SUSE-RU-2022:3852-1 as openSUSE-SLE-15.3-2022-3852 is not security or has no CVEs. patches: SUSE-2022-3852,SUSE-SLE-Module-Basesystem-15-SP3-2022-3852,SUSE-SUSE-MicroOS-5.1-2022-3852,SUSE-SUSE-MicroOS-5.2-2022-3852,openSUSE-Leap-Micro-5.2-2022-3852,openSUSE-SLE-15.3-2022-3852 SKIP SUSE-RU-2022:3853-1 as SUSE-SLE-SERVER-12-SP5-2022-3853 is not security or has no CVEs. patches: SUSE-2022-3853,SUSE-SLE-SERVER-12-SP5-2022-3853 SKIP SUSE-RU-2022:3869-1 as openSUSE-SLE-15.4-2022-3869 is not security or has no CVEs. patches: SUSE-2022-3869,SUSE-SLE-Module-Legacy-15-SP3-2022-3869,SUSE-SLE-Module-Legacy-15-SP4-2022-3869,SUSE-SLE-Product-SLES-15-2022-3869,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3869,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3869,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3869,SUSE-SLE-Product-SLES_SAP-15-2022-3869,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3869,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3869,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3869,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3869,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3869,SUSE-Storage-6-2022-3869,SUSE-Storage-7-2022-3869,openSUSE-SLE-15.3-2022-3869,openSUSE-SLE-15.4-2022-3869 SKIP SUSE-RU-2022:3870-1 as openSUSE-SLE-15.4-2022-3870 is not security or has no CVEs. patches: SUSE-2022-3870,SUSE-SLE-Micro-5.3-2022-3870,SUSE-SLE-Module-Basesystem-15-SP4-2022-3870,openSUSE-SLE-15.4-2022-3870 SKIP SUSE-RU-2022:3872-1 as openSUSE-SLE-15.4-2022-3872 is not security or has no CVEs. patches: SUSE-2022-3872,SUSE-SLE-Module-Basesystem-15-SP4-2022-3872,openSUSE-SLE-15.4-2022-3872 SKIP SUSE-RU-2022:3873-1 as openSUSE-SLE-15.4-2022-3873 is not security or has no CVEs. patches: SUSE-2022-3873,SUSE-SLE-Micro-5.3-2022-3873,SUSE-SLE-Module-Basesystem-15-SP3-2022-3873,SUSE-SLE-Module-Basesystem-15-SP4-2022-3873,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3873,SUSE-SLE-Product-HPC-15-2022-3873,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3873,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3873,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3873,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3873,SUSE-SLE-Product-SLES-15-2022-3873,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3873,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3873,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3873,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3873,SUSE-SLE-Product-SLES_SAP-15-2022-3873,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3873,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3873,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3873,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3873,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3873,SUSE-SUSE-MicroOS-5.1-2022-3873,SUSE-SUSE-MicroOS-5.2-2022-3873,SUSE-Storage-6-2022-3873,SUSE-Storage-7-2022-3873,openSUSE-Leap-Micro-5.2-2022-3873,openSUSE-SLE-15.3-2022-3873,openSUSE-SLE-15.4-2022-3873 SKIP SUSE-RU-2022:3877-1 as SUSE-SLE-SERVER-12-SP5-2022-3877 is not security or has no CVEs. patches: SUSE-2022-3877,SUSE-SLE-SERVER-12-SP5-2022-3877 SKIP SUSE-RU-2022:3878-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-3878 is not security or has no CVEs. patches: SUSE-2022-3878,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-3878 SKIP SUSE-RU-2022:3881-1 as openSUSE-SLE-15.4-2022-3881 is not security or has no CVEs. patches: SUSE-2022-3881,SUSE-SLE-Module-Basesystem-15-SP3-2022-3881,SUSE-SLE-Module-Basesystem-15-SP4-2022-3881,openSUSE-SLE-15.3-2022-3881,openSUSE-SLE-15.4-2022-3881 SKIP SUSE-RU-2022:3882-1 as SUSE-Storage-6-2022-3882 is not security or has no CVEs. patches: SUSE-2022-3882,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3882,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3882,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3882,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3882,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3882,SUSE-Storage-6-2022-3882 SKIP SUSE-RU-2022:3885-1 as openSUSE-SLE-15.4-2022-3885 is not security or has no CVEs. patches: SUSE-2022-3885,SUSE-SLE-Module-Basesystem-15-SP4-2022-3885,openSUSE-SLE-15.4-2022-3885 SKIP SUSE-RU-2022:3893-1 as SUSE-SLE-HA-12-SP5-2022-3893 is not security or has no CVEs. patches: SUSE-2022-3893,SUSE-SLE-HA-12-SP4-2022-3893,SUSE-SLE-HA-12-SP5-2022-3893 SKIP SUSE-RU-2022:3894-1 as SUSE-SLE-Product-HA-15-SP2-2022-3894 is not security or has no CVEs. patches: SUSE-2022-3894,SUSE-SLE-Product-HA-15-SP2-2022-3894 SKIP SUSE-RU-2022:3900-1 as openSUSE-SLE-15.4-2022-3900 is not security or has no CVEs. patches: SUSE-2022-3900,SUSE-SLE-Micro-5.3-2022-3900,SUSE-SLE-Module-Containers-15-SP3-2022-3900,SUSE-SLE-Module-Containers-15-SP4-2022-3900,SUSE-SLE-Product-HPC-15-2022-3900,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3900,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3900,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3900,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3900,SUSE-SLE-Product-SLES-15-2022-3900,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3900,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3900,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3900,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3900,SUSE-SLE-Product-SLES_SAP-15-2022-3900,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3900,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3900,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3900,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3900,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3900,SUSE-SUSE-MicroOS-5.1-2022-3900,SUSE-SUSE-MicroOS-5.2-2022-3900,SUSE-Storage-6-2022-3900,SUSE-Storage-7-2022-3900,openSUSE-Leap-Micro-5.2-2022-3900,openSUSE-SLE-15.3-2022-3900,openSUSE-SLE-15.4-2022-3900 SKIP SUSE-RU-2022:3901-1 as openSUSE-SLE-15.3-2022-3901 is not security or has no CVEs. patches: SUSE-2022-3901,SUSE-SLE-Module-Basesystem-15-SP3-2022-3901,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3901,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3901,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3901,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3901,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3901,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3901,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3901,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3901,SUSE-SUSE-MicroOS-5.1-2022-3901,SUSE-SUSE-MicroOS-5.2-2022-3901,SUSE-Storage-7-2022-3901,openSUSE-Leap-Micro-5.2-2022-3901,openSUSE-SLE-15.3-2022-3901 SKIP SUSE-RU-2022:3902-1 as SUSE-SLE-SERVER-12-SP5-2022-3902 is not security or has no CVEs. patches: SUSE-2022-3902,SUSE-SLE-SDK-12-SP5-2022-3902,SUSE-SLE-SERVER-12-SP5-2022-3902 SKIP SUSE-RU-2022:3903-1 as SUSE-SLE-SERVER-12-SP5-2022-3903 is not security or has no CVEs. patches: SUSE-2022-3903,SUSE-SLE-SDK-12-SP5-2022-3903,SUSE-SLE-SERVER-12-SP5-2022-3903 SKIP SUSE-RU-2022:3904-1 as openSUSE-SLE-15.4-2022-3904 is not security or has no CVEs. patches: SUSE-2022-3904,SUSE-SLE-Micro-5.3-2022-3904,SUSE-SLE-Module-Basesystem-15-SP3-2022-3904,SUSE-SLE-Module-Basesystem-15-SP4-2022-3904,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3904,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3904,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3904,SUSE-SUSE-MicroOS-5.1-2022-3904,SUSE-SUSE-MicroOS-5.2-2022-3904,openSUSE-Leap-Micro-5.2-2022-3904,openSUSE-SLE-15.3-2022-3904,openSUSE-SLE-15.4-2022-3904 SKIP SUSE-RU-2022:3905-1 as openSUSE-SLE-15.3-2022-3905 is not security or has no CVEs. patches: SUSE-2022-3905,SUSE-SLE-Module-Basesystem-15-SP3-2022-3905,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3905,SUSE-SLE-Product-HPC-15-2022-3905,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3905,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3905,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3905,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3905,SUSE-SLE-Product-SLES-15-2022-3905,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3905,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3905,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3905,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3905,SUSE-SLE-Product-SLES_SAP-15-2022-3905,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3905,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3905,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3905,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3905,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3905,SUSE-SUSE-MicroOS-5.1-2022-3905,SUSE-SUSE-MicroOS-5.2-2022-3905,SUSE-Storage-6-2022-3905,SUSE-Storage-7-2022-3905,openSUSE-Leap-Micro-5.2-2022-3905,openSUSE-SLE-15.3-2022-3905 SKIP SUSE-RU-2022:3909-1 as openSUSE-SLE-15.4-2022-3909 is not security or has no CVEs. patches: SUSE-2022-3909,SUSE-SLE-Product-HA-15-SP4-2022-3909,openSUSE-SLE-15.4-2022-3909 SKIP SUSE-RU-2022:3910-1 as openSUSE-SLE-15.4-2022-3910 is not security or has no CVEs. patches: SUSE-2022-3910,SUSE-SLE-Micro-5.3-2022-3910,SUSE-SLE-Module-Basesystem-15-SP3-2022-3910,SUSE-SLE-Module-Basesystem-15-SP4-2022-3910,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3910,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3910,SUSE-SLE-Product-HPC-15-2022-3910,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3910,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3910,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3910,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3910,SUSE-SLE-Product-SLES-15-2022-3910,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3910,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3910,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3910,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3910,SUSE-SLE-Product-SLES_SAP-15-2022-3910,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3910,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3910,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3910,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3910,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3910,SUSE-SUSE-MicroOS-5.1-2022-3910,SUSE-SUSE-MicroOS-5.2-2022-3910,SUSE-Storage-6-2022-3910,SUSE-Storage-7-2022-3910,openSUSE-Leap-Micro-5.2-2022-3910,openSUSE-SLE-15.3-2022-3910,openSUSE-SLE-15.4-2022-3910 SKIP SUSE-RU-2022:3917-1 as openSUSE-SLE-15.4-2022-3917 is not security or has no CVEs. patches: SUSE-2022-3917,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-3917,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-3917,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3917,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-3917,SUSE-SUSE-MicroOS-5.2-2022-3917,openSUSE-Leap-Micro-5.2-2022-3917,openSUSE-SLE-15.3-2022-3917,openSUSE-SLE-15.4-2022-3917 SKIP SUSE-RU-2022:3918-1 as SUSE-SLE-Module-Public-Cloud-12-2022-3918 is not security or has no CVEs. patches: SUSE-2022-3918,SUSE-SLE-Module-Public-Cloud-12-2022-3918 ERROR: notice SUSE-RU-2022:3921-1 has no valid patches out of: SUSE-2022-3921,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3921 SKIP SUSE-RU-2022:3923-1 as SUSE-SLE-SERVER-12-SP5-2022-3923 is not security or has no CVEs. patches: SUSE-2022-3923,SUSE-OpenStack-Cloud-9-2022-3923,SUSE-OpenStack-Cloud-Crowbar-9-2022-3923,SUSE-SLE-SAP-12-SP4-2022-3923,SUSE-SLE-SDK-12-SP5-2022-3923,SUSE-SLE-SERVER-12-SP4-LTSS-2022-3923,SUSE-SLE-SERVER-12-SP5-2022-3923 SKIP SUSE-RU-2022:3926-1 as SUSE-SLE-Module-Containers-12-2022-3926 is not security or has no CVEs. patches: SUSE-2022-3926,SUSE-SLE-Module-Containers-12-2022-3926 SKIP SUSE-RU-2022:3927-1 as openSUSE-SLE-15.4-2022-3927 is not security or has no CVEs. patches: SUSE-2022-3927,SUSE-SLE-Micro-5.3-2022-3927,SUSE-SLE-Module-Containers-15-SP3-2022-3927,SUSE-SLE-Module-Containers-15-SP4-2022-3927,SUSE-SLE-Product-HPC-15-2022-3927,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3927,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3927,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3927,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3927,SUSE-SLE-Product-SLES-15-2022-3927,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3927,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3927,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3927,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3927,SUSE-SLE-Product-SLES_SAP-15-2022-3927,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3927,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3927,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3927,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3927,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3927,SUSE-SUSE-MicroOS-5.1-2022-3927,SUSE-SUSE-MicroOS-5.2-2022-3927,SUSE-Storage-6-2022-3927,SUSE-Storage-7-2022-3927,SUSE-Storage-7.1-2022-3927,openSUSE-Leap-Micro-5.2-2022-3927,openSUSE-SLE-15.3-2022-3927,openSUSE-SLE-15.4-2022-3927 SKIP SUSE-RU-2022:3943-1 as openSUSE-SLE-15.4-2022-3943 is not security or has no CVEs. patches: SUSE-2022-3943,SUSE-SLE-Product-HA-15-SP4-2022-3943,openSUSE-SLE-15.4-2022-3943 SKIP SUSE-RU-2022:3944-1 as SUSE-SLE-Module-Containers-12-2022-3944 is not security or has no CVEs. patches: SUSE-2022-3944,SUSE-SLE-Module-Containers-12-2022-3944 SKIP SUSE-RU-2022:3945-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3945 is not security or has no CVEs. patches: SUSE-2022-3945,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3945 SKIP SUSE-RU-2022:3946-1 as openSUSE-SLE-15.4-2022-3946 is not security or has no CVEs. patches: SUSE-2022-3946,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3946,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3946,openSUSE-SLE-15.4-2022-3946 SKIP SUSE-RU-2022:3950-1 as SUSE-SLE-SERVER-12-SP5-2022-3950 is not security or has no CVEs. patches: SUSE-2022-3950,SUSE-SLE-SERVER-12-SP5-2022-3950 SKIP SUSE-RU-2022:3958-1 as openSUSE-SLE-15.4-2022-3958 is not security or has no CVEs. patches: SUSE-2022-3958,SUSE-SLE-Micro-5.3-2022-3958,SUSE-SLE-Module-Basesystem-15-SP4-2022-3958,openSUSE-SLE-15.4-2022-3958 SKIP SUSE-RU-2022:3961-1 as openSUSE-SLE-15.4-2022-3961 is not security or has no CVEs. patches: SUSE-2022-3961,SUSE-SLE-Micro-5.3-2022-3961,SUSE-SLE-Module-Basesystem-15-SP3-2022-3961,SUSE-SLE-Module-Basesystem-15-SP4-2022-3961,SUSE-SLE-Module-Development-Tools-15-SP3-2022-3961,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3961,SUSE-SUSE-MicroOS-5.1-2022-3961,SUSE-SUSE-MicroOS-5.2-2022-3961,openSUSE-Leap-Micro-5.2-2022-3961,openSUSE-SLE-15.3-2022-3961,openSUSE-SLE-15.4-2022-3961 SKIP SUSE-RU-2022:3962-1 as SUSE-SLE-SERVER-12-SP5-2022-3962 is not security or has no CVEs. patches: SUSE-2022-3962,SUSE-SLE-SDK-12-SP5-2022-3962,SUSE-SLE-SERVER-12-SP5-2022-3962 SKIP SUSE-RU-2022:3963-1 as openSUSE-SLE-15.4-2022-3963 is not security or has no CVEs. patches: SUSE-2022-3963,SUSE-SLE-Micro-5.3-2022-3963,SUSE-SLE-Module-Basesystem-15-SP4-2022-3963,openSUSE-SLE-15.4-2022-3963 SKIP SUSE-RU-2022:3964-1 as SUSE-SLE-SERVER-12-SP5-2022-3964 is not security or has no CVEs. patches: SUSE-2022-3964,SUSE-SLE-SDK-12-SP5-2022-3964,SUSE-SLE-SERVER-12-SP5-2022-3964 SKIP SUSE-RU-2022:3972-1 as openSUSE-SLE-15.4-2022-3972 is not security or has no CVEs. patches: SUSE-2022-3972,SUSE-SLE-Module-Basesystem-15-SP3-2022-3972,SUSE-SLE-Module-Basesystem-15-SP4-2022-3972,openSUSE-SLE-15.3-2022-3972,openSUSE-SLE-15.4-2022-3972 SKIP SUSE-RU-2022:3973-1 as openSUSE-SLE-15.3-2022-3973 is not security or has no CVEs. patches: SUSE-2022-3973,SUSE-SLE-Module-Basesystem-15-SP3-2022-3973,SUSE-SLE-Module-Server-Applications-15-SP3-2022-3973,SUSE-SUSE-MicroOS-5.1-2022-3973,SUSE-SUSE-MicroOS-5.2-2022-3973,openSUSE-Leap-Micro-5.2-2022-3973,openSUSE-SLE-15.3-2022-3973 SKIP SUSE-RU-2022:3974-1 as openSUSE-SLE-15.4-2022-3974 is not security or has no CVEs. patches: SUSE-2022-3974,SUSE-SLE-Micro-5.3-2022-3974,SUSE-SLE-Module-Basesystem-15-SP4-2022-3974,SUSE-SLE-Module-Server-Applications-15-SP4-2022-3974,openSUSE-SLE-15.4-2022-3974 SKIP SUSE-RU-2022:3975-1 as SUSE-Storage-7-2022-3975 is not security or has no CVEs. patches: SUSE-2022-3975,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3975,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3975,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3975,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3975,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3975,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3975,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3975,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3975,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3975,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3975,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3975,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3975,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3975,SUSE-Storage-6-2022-3975,SUSE-Storage-7-2022-3975 SKIP SUSE-RU-2022:3978-1 as openSUSE-SLE-15.4-2022-3978 is not security or has no CVEs. patches: SUSE-2022-3978,SUSE-SLE-Module-Development-Tools-15-SP4-2022-3978,openSUSE-SLE-15.4-2022-3978 SKIP SUSE-RU-2022:3980-1 as SUSE-SLE-WE-12-SP5-2022-3980 is not security or has no CVEs. patches: SUSE-2022-3980,SUSE-SLE-SDK-12-SP5-2022-3980,SUSE-SLE-SERVER-12-SP5-2022-3980,SUSE-SLE-WE-12-SP5-2022-3980 SKIP SUSE-RU-2022:3985-1 as openSUSE-SLE-15.4-2022-3985 is not security or has no CVEs. patches: SUSE-2022-3985,SUSE-SLE-Micro-5.3-2022-3985,SUSE-SLE-Module-Basesystem-15-SP3-2022-3985,SUSE-SLE-Module-Basesystem-15-SP4-2022-3985,SUSE-SLE-Module-Python2-15-SP3-2022-3985,openSUSE-SLE-15.3-2022-3985,openSUSE-SLE-15.4-2022-3985 SKIP SUSE-RU-2022:3994-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3994 is not security or has no CVEs. patches: SUSE-2022-3994,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-3994 SKIP SUSE-RU-2022:4002-1 as openSUSE-SLE-15.4-2022-4002 is not security or has no CVEs. patches: SUSE-2022-4002,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4002,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4002,SUSE-SLE-Product-WE-15-SP4-2022-4002,openSUSE-SLE-15.4-2022-4002 SKIP SUSE-RU-2022:4006-1 as openSUSE-SLE-15.4-2022-4006 is not security or has no CVEs. patches: SUSE-2022-4006,SUSE-SLE-Micro-5.3-2022-4006,SUSE-SLE-Module-Basesystem-15-SP4-2022-4006,openSUSE-SLE-15.4-2022-4006 SKIP SUSE-RU-2022:4008-1 as openSUSE-SLE-15.4-2022-4008 is not security or has no CVEs. patches: SUSE-2022-4008,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4008,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4008,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4008,openSUSE-SLE-15.3-2022-4008,openSUSE-SLE-15.4-2022-4008 SKIP SUSE-RU-2022:4018-1 as openSUSE-SLE-15.4-2022-4018 is not security or has no CVEs. patches: SUSE-2022-4018,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4018,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4018,openSUSE-SLE-15.3-2022-4018,openSUSE-SLE-15.4-2022-4018 SKIP SUSE-RU-2022:4019-1 as openSUSE-SLE-15.4-2022-4019 is not security or has no CVEs. patches: SUSE-2022-4019,SUSE-SLE-Micro-5.3-2022-4019,SUSE-SLE-Module-Basesystem-15-SP4-2022-4019,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4019,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4019,openSUSE-SLE-15.4-2022-4019 SKIP SUSE-RU-2022:4020-1 as openSUSE-SLE-15.4-2022-4020 is not security or has no CVEs. patches: SUSE-2022-4020,SUSE-SLE-Micro-5.3-2022-4020,SUSE-SLE-Module-Basesystem-15-SP3-2022-4020,SUSE-SLE-Module-Basesystem-15-SP4-2022-4020,SUSE-SUSE-MicroOS-5.1-2022-4020,SUSE-SUSE-MicroOS-5.2-2022-4020,openSUSE-Leap-Micro-5.2-2022-4020,openSUSE-SLE-15.3-2022-4020,openSUSE-SLE-15.4-2022-4020 SKIP SUSE-RU-2022:4021-1 as openSUSE-SLE-15.4-2022-4021 is not security or has no CVEs. patches: SUSE-2022-4021,SUSE-SLE-Micro-5.3-2022-4021,SUSE-SLE-Module-Basesystem-15-SP3-2022-4021,SUSE-SLE-Module-Basesystem-15-SP4-2022-4021,SUSE-SUSE-MicroOS-5.1-2022-4021,SUSE-SUSE-MicroOS-5.2-2022-4021,openSUSE-Leap-Micro-5.2-2022-4021,openSUSE-SLE-15.3-2022-4021,openSUSE-SLE-15.4-2022-4021 SKIP SUSE-RU-2022:4040-1 as openSUSE-SLE-15.4-2022-4040 is not security or has no CVEs. patches: SUSE-2022-4040,SUSE-SLE-Micro-5.3-2022-4040,SUSE-SLE-Module-Basesystem-15-SP4-2022-4040,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4040,openSUSE-SLE-15.4-2022-4040 SKIP SUSE-RU-2022:4041-1 as openSUSE-SLE-15.4-2022-4041 is not security or has no CVEs. patches: SUSE-2022-4041,SUSE-SLE-Module-Basesystem-15-SP4-2022-4041,openSUSE-SLE-15.4-2022-4041 SKIP SUSE-RU-2022:4042-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2022-4042 is not security or has no CVEs. patches: SUSE-2022-4042,SUSE-SLE-Module-SAP-Applications-15-SP1-2022-4042,SUSE-SLE-Module-SAP-Applications-15-SP2-2022-4042,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-4042,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-4042 SKIP SUSE-RU-2022:4043-1 as openSUSE-SLE-15.4-2022-4043 is not security or has no CVEs. patches: SUSE-2022-4043,SUSE-SLE-Micro-5.3-2022-4043,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-4043,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4043,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4043,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4043,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-4043,openSUSE-SLE-15.3-2022-4043,openSUSE-SLE-15.4-2022-4043 SKIP SUSE-RU-2022:4045-1 as openSUSE-SLE-15.4-2022-4045 is not security or has no CVEs. patches: SUSE-2022-4045,SUSE-SLE-Product-HA-15-SP4-2022-4045,openSUSE-SLE-15.4-2022-4045 SKIP SUSE-RU-2022:4046-1 as SUSE-SLE-SERVER-12-SP5-2022-4046 is not security or has no CVEs. patches: SUSE-2022-4046,SUSE-SLE-SERVER-12-SP5-2022-4046 SKIP SUSE-RU-2022:4047-1 as openSUSE-SLE-15.4-2022-4047 is not security or has no CVEs. patches: SUSE-2022-4047,SUSE-SLE-Micro-5.3-2022-4047,SUSE-SLE-Module-Basesystem-15-SP4-2022-4047,openSUSE-SLE-15.4-2022-4047 SKIP SUSE-RU-2022:4048-1 as openSUSE-SLE-15.3-2022-4048 is not security or has no CVEs. patches: SUSE-2022-4048,SUSE-SLE-Module-Basesystem-15-SP3-2022-4048,SUSE-SUSE-MicroOS-5.1-2022-4048,SUSE-SUSE-MicroOS-5.2-2022-4048,openSUSE-Leap-Micro-5.2-2022-4048,openSUSE-SLE-15.3-2022-4048 SKIP SUSE-RU-2022:4049-1 as openSUSE-SLE-15.4-2022-4049 is not security or has no CVEs. patches: SUSE-2022-4049,SUSE-SLE-Micro-5.3-2022-4049,SUSE-SLE-Module-Basesystem-15-SP4-2022-4049,openSUSE-SLE-15.4-2022-4049 SKIP SUSE-RU-2022:4060-1 as SUSE-SLE-SERVER-12-SP5-2022-4060 is not security or has no CVEs. patches: SUSE-2022-4060,SUSE-OpenStack-Cloud-9-2022-4060,SUSE-OpenStack-Cloud-Crowbar-9-2022-4060,SUSE-SLE-SAP-12-SP4-2022-4060,SUSE-SLE-SERVER-12-SP3-BCL-2022-4060,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4060,SUSE-SLE-SERVER-12-SP5-2022-4060 SKIP SUSE-RU-2022:4061-1 as openSUSE-SLE-15.4-2022-4061 is not security or has no CVEs. patches: SUSE-2022-4061,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4061,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4061,SUSE-SLE-Product-HPC-15-2022-4061,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4061,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4061,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4061,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4061,SUSE-SLE-Product-SLES-15-2022-4061,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4061,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4061,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4061,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4061,SUSE-SLE-Product-SLES_SAP-15-2022-4061,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4061,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4061,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4061,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4061,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4061,SUSE-Storage-6-2022-4061,SUSE-Storage-7-2022-4061,openSUSE-SLE-15.3-2022-4061,openSUSE-SLE-15.4-2022-4061 SKIP SUSE-RU-2022:4062-1 as openSUSE-SLE-15.4-2022-4062 is not security or has no CVEs. patches: SUSE-2022-4062,SUSE-SLE-Micro-5.3-2022-4062,SUSE-SLE-Module-Basesystem-15-SP4-2022-4062,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4062,openSUSE-SLE-15.4-2022-4062 SKIP SUSE-RU-2022:4063-1 as openSUSE-SLE-15.4-2022-4063 is not security or has no CVEs. patches: SUSE-2022-4063,SUSE-SLE-Manager-Tools-15-2022-4063,SUSE-SLE-Micro-5.3-2022-4063,SUSE-SLE-Module-Basesystem-15-SP3-2022-4063,SUSE-SLE-Module-Basesystem-15-SP4-2022-4063,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-4063,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-4063,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-4063,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-4063,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-4063,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4063,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4063,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4063,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4063,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4063,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4063,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4063,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4063,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4063,SUSE-SUSE-MicroOS-5.2-2022-4063,SUSE-Storage-7-2022-4063,openSUSE-Leap-Micro-5.2-2022-4063,openSUSE-SLE-15.3-2022-4063,openSUSE-SLE-15.4-2022-4063 SKIP SUSE-RU-2022:4065-1 as SUSE-SLE-SERVER-12-SP5-2022-4065 is not security or has no CVEs. patches: SUSE-2022-4065,SUSE-OpenStack-Cloud-9-2022-4065,SUSE-OpenStack-Cloud-Crowbar-9-2022-4065,SUSE-SLE-SAP-12-SP4-2022-4065,SUSE-SLE-SERVER-12-SP2-BCL-2022-4065,SUSE-SLE-SERVER-12-SP3-BCL-2022-4065,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4065,SUSE-SLE-SERVER-12-SP5-2022-4065 SKIP SUSE-RU-2022:4066-1 as openSUSE-SLE-15.4-2022-4066 is not security or has no CVEs. patches: SUSE-2022-4066,SUSE-SLE-Micro-5.3-2022-4066,SUSE-SLE-Module-Basesystem-15-SP3-2022-4066,SUSE-SLE-Module-Basesystem-15-SP4-2022-4066,SUSE-SLE-Product-HPC-15-2022-4066,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4066,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4066,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4066,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4066,SUSE-SLE-Product-SLES-15-2022-4066,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4066,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4066,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4066,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4066,SUSE-SLE-Product-SLES_SAP-15-2022-4066,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4066,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4066,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4066,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4066,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4066,SUSE-SUSE-MicroOS-5.1-2022-4066,SUSE-SUSE-MicroOS-5.2-2022-4066,SUSE-Storage-6-2022-4066,SUSE-Storage-7-2022-4066,openSUSE-Leap-Micro-5.2-2022-4066,openSUSE-SLE-15.3-2022-4066,openSUSE-SLE-15.4-2022-4066 SKIP SUSE-RU-2022:4076-1 as openSUSE-SLE-15.4-2022-4076 is not security or has no CVEs. patches: SUSE-2022-4076,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4076,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4076,openSUSE-SLE-15.3-2022-4076,openSUSE-SLE-15.4-2022-4076 SKIP SUSE-RU-2022:4131-1 as openSUSE-SLE-15.4-2022-4131 is not security or has no CVEs. patches: SUSE-2022-4131,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4131,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4131,openSUSE-SLE-15.3-2022-4131,openSUSE-SLE-15.4-2022-4131 SKIP SUSE-RU-2022:4133-1 as openSUSE-SLE-15.4-2022-4133 is not security or has no CVEs. patches: SUSE-2022-4133,SUSE-SLE-Module-Basesystem-15-SP3-2022-4133,SUSE-SLE-Module-Basesystem-15-SP4-2022-4133,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4133,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4133,openSUSE-SLE-15.3-2022-4133,openSUSE-SLE-15.4-2022-4133 SKIP SUSE-RU-2022:4134-1 as openSUSE-SLE-15.4-2022-4134 is not security or has no CVEs. patches: SUSE-2022-4134,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4134,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4134,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4134,openSUSE-SLE-15.3-2022-4134,openSUSE-SLE-15.4-2022-4134 SKIP SUSE-RU-2022:4135-1 as openSUSE-SLE-15.4-2022-4135 is not security or has no CVEs. patches: SUSE-2022-4135,SUSE-SLE-Micro-5.3-2022-4135,SUSE-SLE-Module-Basesystem-15-SP4-2022-4135,openSUSE-SLE-15.4-2022-4135 SKIP SUSE-RU-2022:4136-1 as SUSE-SLE-SERVER-12-SP5-2022-4136 is not security or has no CVEs. patches: SUSE-2022-4136,SUSE-SLE-SERVER-12-SP5-2022-4136 SKIP SUSE-RU-2022:4137-1 as openSUSE-SLE-15.4-2022-4137 is not security or has no CVEs. patches: SUSE-2022-4137,SUSE-SLE-Module-Basesystem-15-SP4-2022-4137,openSUSE-SLE-15.4-2022-4137 SKIP SUSE-RU-2022:4138-1 as openSUSE-SLE-15.4-2022-4138 is not security or has no CVEs. patches: SUSE-2022-4138,SUSE-SLE-Micro-5.3-2022-4138,SUSE-SLE-Module-Basesystem-15-SP3-2022-4138,SUSE-SLE-Module-Basesystem-15-SP4-2022-4138,SUSE-SLE-Module-Python2-15-SP3-2022-4138,SUSE-SUSE-MicroOS-5.1-2022-4138,SUSE-SUSE-MicroOS-5.2-2022-4138,openSUSE-Leap-Micro-5.2-2022-4138,openSUSE-Leap-Micro-5.3-2022-4138,openSUSE-SLE-15.3-2022-4138,openSUSE-SLE-15.4-2022-4138 SKIP SUSE-RU-2022:4139-1 as openSUSE-SLE-15.4-2022-4139 is not security or has no CVEs. patches: SUSE-2022-4139,SUSE-SLE-Module-Basesystem-15-SP4-2022-4139,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4139,openSUSE-SLE-15.4-2022-4139 SKIP SUSE-RU-2022:4152-1 as openSUSE-SLE-15.4-2022-4152 is not security or has no CVEs. patches: SUSE-2022-4152,SUSE-SLE-Module-Basesystem-15-SP3-2022-4152,SUSE-SLE-Module-Basesystem-15-SP4-2022-4152,openSUSE-SLE-15.3-2022-4152,openSUSE-SLE-15.4-2022-4152 SKIP SUSE-RU-2022:4157-1 as SUSE-SLE-HA-12-SP5-2022-4157 is not security or has no CVEs. patches: SUSE-2022-4157,SUSE-SLE-HA-12-SP4-2022-4157,SUSE-SLE-HA-12-SP5-2022-4157 SKIP SUSE-RU-2022:4160-1 as openSUSE-SLE-15.4-2022-4160 is not security or has no CVEs. patches: SUSE-2022-4160,SUSE-SLE-Micro-5.3-2022-4160,SUSE-SLE-Module-Basesystem-15-SP3-2022-4160,SUSE-SLE-Module-Basesystem-15-SP4-2022-4160,SUSE-SUSE-MicroOS-5.1-2022-4160,SUSE-SUSE-MicroOS-5.2-2022-4160,openSUSE-Leap-Micro-5.2-2022-4160,openSUSE-SLE-15.3-2022-4160,openSUSE-SLE-15.4-2022-4160 SKIP SUSE-RU-2022:4162-1 as openSUSE-SLE-15.4-2022-4162 is not security or has no CVEs. patches: SUSE-2022-4162,SUSE-SLE-Micro-5.3-2022-4162,SUSE-SLE-Module-Basesystem-15-SP4-2022-4162,openSUSE-SLE-15.4-2022-4162 SKIP SUSE-RU-2022:4163-1 as openSUSE-SLE-15.3-2022-4163 is not security or has no CVEs. patches: SUSE-2022-4163,SUSE-SLE-Module-Basesystem-15-SP3-2022-4163,SUSE-SUSE-MicroOS-5.1-2022-4163,SUSE-SUSE-MicroOS-5.2-2022-4163,openSUSE-Leap-Micro-5.2-2022-4163,openSUSE-SLE-15.3-2022-4163 SKIP SUSE-RU-2022:4164-1 as openSUSE-SLE-15.4-2022-4164 is not security or has no CVEs. patches: SUSE-2022-4164,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4164,SUSE-SLE-Product-WE-15-SP4-2022-4164,openSUSE-SLE-15.4-2022-4164 SKIP SUSE-RU-2022:4165-1 as SUSE-SLE-SERVER-12-SP5-2022-4165 is not security or has no CVEs. patches: SUSE-2022-4165,SUSE-SLE-SDK-12-SP5-2022-4165,SUSE-SLE-SERVER-12-SP5-2022-4165 SKIP SUSE-RU-2022:4171-1 as SUSE-SLE-Product-HPC-15-SP4-2022-4171 is not security or has no CVEs. patches: SUSE-2022-4171,SUSE-SLE-Module-HPC-15-SP4-2022-4171,SUSE-SLE-Product-HPC-15-SP4-2022-4171 SKIP SUSE-RU-2022:4172-1 as openSUSE-SLE-15.3-2022-4172 is not security or has no CVEs. patches: SUSE-2022-4172,SUSE-SLE-Product-SLED-15-SP3-2022-4172,openSUSE-SLE-15.3-2022-4172 SKIP SUSE-RU-2022:4173-1 as SUSE-SLE-Product-RT-15-SP4-2022-4173 is not security or has no CVEs. patches: SUSE-2022-4173,SUSE-SLE-Module-RT-15-SP4-2022-4173,SUSE-SLE-Product-RT-15-SP4-2022-4173 SKIP SUSE-RU-2022:4174-1 as SUSE-SLE-Product-HPC-15-SP3-2022-4174 is not security or has no CVEs. patches: SUSE-2022-4174,SUSE-SLE-Module-HPC-15-SP3-2022-4174,SUSE-SLE-Product-HPC-15-SP3-2022-4174 SKIP SUSE-RU-2022:4175-1 as SUSE-SLE-Product-RT-15-SP3-2022-4175 is not security or has no CVEs. patches: SUSE-2022-4175,SUSE-SLE-Module-RT-15-SP3-2022-4175,SUSE-SLE-Product-RT-15-SP3-2022-4175 SKIP SUSE-RU-2022:4176-1 as openSUSE-SLE-15.4-2022-4176 is not security or has no CVEs. patches: SUSE-2022-4176,SUSE-SLE-Product-SLED-15-SP4-2022-4176,openSUSE-SLE-15.4-2022-4176 SKIP SUSE-RU-2022:4177-1 as SUSE-Storage-7-2022-4177 is not security or has no CVEs. patches: SUSE-2022-4177,SUSE-SLE-INSTALLER-15-SP2-2022-4177,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4177,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4177,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4177,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4177,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4177,SUSE-Storage-7-2022-4177 SKIP SUSE-RU-2022:4178-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2022-4178 is not security or has no CVEs. patches: SUSE-2022-4178,SUSE-SLE-Module-SAP-Applications-15-SP3-2022-4178 SKIP SUSE-RU-2022:4179-1 as SUSE-SLE-Product-SLES_SAP-15-2022-4179 is not security or has no CVEs. patches: SUSE-2022-4179,SUSE-SLE-INSTALLER-15-2022-4179,SUSE-SLE-Product-SLES-15-2022-4179,SUSE-SLE-Product-SLES_SAP-15-2022-4179 SKIP SUSE-RU-2022:4180-1 as SUSE-Storage-6-2022-4180 is not security or has no CVEs. patches: SUSE-2022-4180,SUSE-SLE-INSTALLER-15-SP1-2022-4180,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4180,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4180,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4180,SUSE-Storage-6-2022-4180 SKIP SUSE-RU-2022:4181-1 as openSUSE-SLE-15.3-2022-4181 is not security or has no CVEs. patches: SUSE-2022-4181,SUSE-SLE-INSTALLER-15-SP3-2022-4181,SUSE-SLE-Product-SLES-15-SP3-2022-4181,openSUSE-SLE-15.3-2022-4181 SKIP SUSE-RU-2022:4182-1 as openSUSE-SLE-15.4-2022-4182 is not security or has no CVEs. patches: SUSE-2022-4182,SUSE-SLE-INSTALLER-15-SP4-2022-4182,SUSE-SLE-Product-SLES-15-SP4-2022-4182,openSUSE-SLE-15.4-2022-4182 SKIP SUSE-RU-2022:4183-1 as SUSE-SUSE-MicroOS-5.2-2022-4183 is not security or has no CVEs. patches: SUSE-2022-4183,SUSE-SUSE-MicroOS-5.2-2022-4183 SKIP SUSE-RU-2022:4184-1 as SUSE-SUSE-MicroOS-5.1-2022-4184 is not security or has no CVEs. patches: SUSE-2022-4184,SUSE-SUSE-MicroOS-5.1-2022-4184 SKIP SUSE-RU-2022:4187-1 as SUSE-SLE-SERVER-INSTALLER-12-SP5-2022-4187 is not security or has no CVEs. patches: SUSE-2022-4187,SUSE-SLE-SERVER-12-SP5-2022-4187,SUSE-SLE-SERVER-INSTALLER-12-SP5-2022-4187 SKIP SUSE-RU-2022:4188-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2022-4188 is not security or has no CVEs. patches: SUSE-2022-4188,SUSE-SLE-Module-SAP-Applications-15-SP4-2022-4188 SKIP SUSE-RU-2022:4189-1 as openSUSE-SLE-15.4-2022-4189 is not security or has no CVEs. patches: SUSE-2022-4189,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4189,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4189,SUSE-SLE-Product-WE-15-SP3-2022-4189,SUSE-SLE-Product-WE-15-SP4-2022-4189,openSUSE-SLE-15.3-2022-4189,openSUSE-SLE-15.4-2022-4189 SKIP SUSE-RU-2022:4190-1 as SUSE-SLE-SERVER-12-SP5-2022-4190 is not security or has no CVEs. patches: SUSE-2022-4190,SUSE-SLE-SDK-12-SP5-2022-4190,SUSE-SLE-SERVER-12-SP5-2022-4190 SKIP SUSE-RU-2022:4198-1 as openSUSE-SLE-15.4-2022-4198 is not security or has no CVEs. patches: SUSE-2022-4198,SUSE-SLE-Micro-5.3-2022-4198,SUSE-SLE-Module-Basesystem-15-SP3-2022-4198,SUSE-SLE-Module-Basesystem-15-SP4-2022-4198,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4198,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4198,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4198,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4198,SUSE-SLE-Module-Python2-15-SP3-2022-4198,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2022-4198,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-4198,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2022-4198,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4198,SUSE-SUSE-MicroOS-5.1-2022-4198,SUSE-SUSE-MicroOS-5.2-2022-4198,openSUSE-Leap-Micro-5.2-2022-4198,openSUSE-SLE-15.3-2022-4198,openSUSE-SLE-15.4-2022-4198 SKIP SUSE-RU-2022:4199-1 as SUSE-Storage-7-2022-4199 is not security or has no CVEs. patches: SUSE-2022-4199,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4199,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2022-4199,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-4199,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4199,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4199,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4199,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4199,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4199,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4199,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4199,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4199,SUSE-Storage-7-2022-4199 SKIP SUSE-RU-2022:4200-1 as openSUSE-SLE-15.4-2022-4200 is not security or has no CVEs. patches: SUSE-2022-4200,SUSE-SLE-Module-Basesystem-15-SP3-2022-4200,SUSE-SLE-Module-Basesystem-15-SP4-2022-4200,openSUSE-SLE-15.3-2022-4200,openSUSE-SLE-15.4-2022-4200 SKIP SUSE-RU-2022:4212-1 as openSUSE-SLE-15.4-2022-4212 is not security or has no CVEs. patches: SUSE-2022-4212,SUSE-SLE-Micro-5.3-2022-4212,SUSE-SLE-Module-Basesystem-15-SP4-2022-4212,openSUSE-Leap-Micro-5.3-2022-4212,openSUSE-SLE-15.4-2022-4212 SKIP SUSE-RU-2022:4213-1 as openSUSE-SLE-15.4-2022-4213 is not security or has no CVEs. patches: SUSE-2022-4213,SUSE-SLE-Module-Containers-15-SP3-2022-4213,SUSE-SLE-Module-Containers-15-SP4-2022-4213,openSUSE-SLE-15.3-2022-4213,openSUSE-SLE-15.4-2022-4213 SKIP SUSE-RU-2022:4217-1 as openSUSE-SLE-15.4-2022-4217 is not security or has no CVEs. patches: SUSE-2022-4217,SUSE-SLE-Module-Basesystem-15-SP3-2022-4217,SUSE-SLE-Module-Basesystem-15-SP4-2022-4217,openSUSE-SLE-15.3-2022-4217,openSUSE-SLE-15.4-2022-4217 SKIP SUSE-RU-2022:4220-1 as SUSE-SLE-SERVER-12-SP5-2022-4220 is not security or has no CVEs. patches: SUSE-2022-4220,SUSE-SLE-SERVER-12-SP5-2022-4220 SKIP SUSE-RU-2022:4225-1 as openSUSE-SLE-15.4-2022-4225 is not security or has no CVEs. patches: SUSE-2022-4225,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4225,openSUSE-SLE-15.4-2022-4225 SKIP SUSE-RU-2022:4226-1 as openSUSE-Leap-Micro-5.3-2022-4226 is not security or has no CVEs. patches: SUSE-2022-4226,SUSE-SLE-Micro-5.3-2022-4226,SUSE-SLE-Module-Basesystem-15-SP4-2022-4226,openSUSE-Leap-Micro-5.3-2022-4226 SKIP SUSE-RU-2022:4227-1 as openSUSE-SLE-15.4-2022-4227 is not security or has no CVEs. patches: SUSE-2022-4227,SUSE-SLE-Micro-5.3-2022-4227,SUSE-SLE-Module-Basesystem-15-SP4-2022-4227,SUSE-SLE-Product-HA-15-SP4-2022-4227,openSUSE-SLE-15.4-2022-4227 SKIP SUSE-RU-2022:4228-1 as SUSE-SLE-SDK-12-SP5-2022-4228 is not security or has no CVEs. patches: SUSE-2022-4228,SUSE-SLE-SDK-12-SP5-2022-4228 SKIP SUSE-RU-2022:4230-1 as openSUSE-SLE-15.3-2022-4230 is not security or has no CVEs. patches: SUSE-2022-4230,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-4230,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4230,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4230,openSUSE-SLE-15.3-2022-4230 SKIP SUSE-RU-2022:4231-1 as SUSE-SLE-Module-Public-Cloud-12-2022-4231 is not security or has no CVEs. patches: SUSE-2022-4231,SUSE-SLE-Module-Public-Cloud-12-2022-4231 SKIP SUSE-RU-2022:4232-1 as openSUSE-SLE-15.4-2022-4232 is not security or has no CVEs. patches: SUSE-2022-4232,SUSE-SLE-Module-Basesystem-15-SP3-2022-4232,SUSE-SLE-Module-Basesystem-15-SP4-2022-4232,openSUSE-SLE-15.3-2022-4232,openSUSE-SLE-15.4-2022-4232 SKIP SUSE-RU-2022:4233-1 as openSUSE-SLE-15.4-2022-4233 is not security or has no CVEs. patches: SUSE-2022-4233,SUSE-SLE-Module-Basesystem-15-SP3-2022-4233,SUSE-SLE-Module-Basesystem-15-SP4-2022-4233,openSUSE-SLE-15.3-2022-4233,openSUSE-SLE-15.4-2022-4233 SKIP SUSE-RU-2022:4234-1 as openSUSE-SLE-15.4-2022-4234 is not security or has no CVEs. patches: SUSE-2022-4234,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4234,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4234,openSUSE-SLE-15.3-2022-4234,openSUSE-SLE-15.4-2022-4234 SKIP SUSE-RU-2022:4235-1 as openSUSE-SLE-15.4-2022-4235 is not security or has no CVEs. patches: SUSE-2022-4235,SUSE-SLE-INSTALLER-15-SP4-2022-4235,SUSE-SLE-Module-Basesystem-15-SP4-2022-4235,openSUSE-SLE-15.4-2022-4235 SKIP SUSE-RU-2022:4236-1 as openSUSE-SLE-15.4-2022-4236 is not security or has no CVEs. patches: SUSE-2022-4236,SUSE-SLE-Micro-5.3-2022-4236,SUSE-SLE-Module-Basesystem-15-SP4-2022-4236,openSUSE-SLE-15.4-2022-4236 SKIP SUSE-RU-2022:4237-1 as SUSE-SLE-SERVER-12-SP5-2022-4237 is not security or has no CVEs. patches: SUSE-2022-4237,SUSE-SLE-SDK-12-SP5-2022-4237,SUSE-SLE-SERVER-12-SP5-2022-4237 SKIP SUSE-RU-2022:4238-1 as openSUSE-SLE-15.4-2022-4238 is not security or has no CVEs. patches: SUSE-2022-4238,SUSE-SLE-Module-Basesystem-15-SP4-2022-4238,openSUSE-SLE-15.4-2022-4238 SKIP SUSE-RU-2022:4239-1 as openSUSE-SLE-15.4-2022-4239 is not security or has no CVEs. patches: SUSE-2022-4239,SUSE-SLE-Module-Basesystem-15-SP4-2022-4239,openSUSE-SLE-15.4-2022-4239 SKIP SUSE-RU-2022:4245-1 as SUSE-SLE-SERVER-12-SP5-2022-4245 is not security or has no CVEs. patches: SUSE-2022-4245,SUSE-OpenStack-Cloud-9-2022-4245,SUSE-OpenStack-Cloud-Crowbar-9-2022-4245,SUSE-SLE-Module-Toolchain-12-2022-4245,SUSE-SLE-SAP-12-SP4-2022-4245,SUSE-SLE-SERVER-12-SP2-BCL-2022-4245,SUSE-SLE-SERVER-12-SP3-BCL-2022-4245,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4245,SUSE-SLE-SERVER-12-SP5-2022-4245 SKIP SUSE-RU-2022:4246-1 as SUSE-SLE-SERVER-12-SP5-2022-4246 is not security or has no CVEs. patches: SUSE-2022-4246,SUSE-SLE-SERVER-12-SP5-2022-4246 SKIP SUSE-RU-2022:4256-1 as openSUSE-SLE-15.4-2022-4256 is not security or has no CVEs. patches: SUSE-2022-4256,SUSE-SLE-Micro-5.3-2022-4256,SUSE-SLE-Module-Basesystem-15-SP3-2022-4256,SUSE-SLE-Module-Basesystem-15-SP4-2022-4256,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4256,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4256,SUSE-SLE-Module-Legacy-15-SP3-2022-4256,SUSE-SLE-Module-Legacy-15-SP4-2022-4256,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4256,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4256,SUSE-SLE-Product-HPC-15-2022-4256,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4256,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4256,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4256,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4256,SUSE-SLE-Product-SLES-15-2022-4256,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4256,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4256,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4256,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4256,SUSE-SLE-Product-SLES_SAP-15-2022-4256,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4256,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4256,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4256,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4256,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4256,SUSE-SUSE-MicroOS-5.1-2022-4256,SUSE-SUSE-MicroOS-5.2-2022-4256,SUSE-Storage-6-2022-4256,SUSE-Storage-7-2022-4256,openSUSE-Leap-Micro-5.2-2022-4256,openSUSE-Leap-Micro-5.3-2022-4256,openSUSE-SLE-15.3-2022-4256,openSUSE-SLE-15.4-2022-4256 SKIP SUSE-RU-2022:4256-2 as SUSE-SLE-INSTALLER-15-SP4-2023-422 is not security or has no CVEs. patches: SUSE-2022-4256,SUSE-SLE-INSTALLER-15-SP1-2023-422,SUSE-SLE-INSTALLER-15-SP2-2023-422,SUSE-SLE-INSTALLER-15-SP3-2023-422,SUSE-SLE-INSTALLER-15-SP4-2023-422 SKIP SUSE-RU-2022:4262-1 as openSUSE-SLE-15.4-2022-4262 is not security or has no CVEs. patches: SUSE-2022-4262,SUSE-SLE-Micro-5.3-2022-4262,SUSE-SLE-Module-Basesystem-15-SP4-2022-4262,SUSE-SLE-Product-HA-15-SP4-2022-4262,openSUSE-Leap-Micro-5.3-2022-4262,openSUSE-SLE-15.4-2022-4262 SKIP SUSE-RU-2022:4263-1 as openSUSE-SLE-15.4-2022-4263 is not security or has no CVEs. patches: SUSE-2022-4263,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4263,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4263,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-4263,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4263,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4263,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4263,SUSE-Storage-6-2022-4263,openSUSE-SLE-15.3-2022-4263,openSUSE-SLE-15.4-2022-4263 SKIP SUSE-RU-2022:4267-1 as openSUSE-Leap-Micro-5.2-2022-4267 is not security or has no CVEs. patches: SUSE-2022-4267,SUSE-SUSE-MicroOS-5.2-2022-4267,openSUSE-Leap-Micro-5.2-2022-4267 SKIP SUSE-RU-2022:4268-1 as SUSE-SLE-Module-Containers-15-SP4-2022-4268 is not security or has no CVEs. patches: SUSE-2022-4268,SUSE-SLE-Module-Containers-15-SP3-2022-4268,SUSE-SLE-Module-Containers-15-SP4-2022-4268 SKIP SUSE-RU-2022:4269-1 as SUSE-SUSE-MicroOS-5.2-2022-4269 is not security or has no CVEs. patches: SUSE-2022-4269,SUSE-SUSE-MicroOS-5.2-2022-4269 SKIP SUSE-RU-2022:4270-1 as openSUSE-SLE-15.3-2022-4270 is not security or has no CVEs. patches: SUSE-2022-4270,SUSE-SLE-Module-Basesystem-15-SP3-2022-4270,SUSE-SLE-Product-HA-15-SP2-2022-4270,SUSE-SLE-Product-HA-15-SP3-2022-4270,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4270,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4270,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4270,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4270,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4270,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4270,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4270,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4270,SUSE-SUSE-MicroOS-5.1-2022-4270,SUSE-SUSE-MicroOS-5.2-2022-4270,SUSE-Storage-7-2022-4270,openSUSE-Leap-Micro-5.2-2022-4270,openSUSE-SLE-15.3-2022-4270 SKIP SUSE-RU-2022:4286-1 as SUSE-SLE-SERVER-12-SP5-2022-4286 is not security or has no CVEs. patches: SUSE-2022-4286,SUSE-OpenStack-Cloud-9-2022-4286,SUSE-OpenStack-Cloud-Crowbar-9-2022-4286,SUSE-SLE-SAP-12-SP4-2022-4286,SUSE-SLE-SDK-12-SP5-2022-4286,SUSE-SLE-SERVER-12-SP2-BCL-2022-4286,SUSE-SLE-SERVER-12-SP3-BCL-2022-4286,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4286,SUSE-SLE-SERVER-12-SP5-2022-4286 SKIP SUSE-RU-2022:4291-1 as openSUSE-SLE-15.4-2022-4291 is not security or has no CVEs. patches: SUSE-2022-4291,openSUSE-SLE-15.4-2022-4291 SKIP SUSE-RU-2022:4299-1 as openSUSE-SLE-15.4-2022-4299 is not security or has no CVEs. patches: SUSE-2022-4299,SUSE-SLE-Module-Basesystem-15-SP4-2022-4299,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4299,openSUSE-SLE-15.4-2022-4299 SKIP SUSE-RU-2022:4300-1 as SUSE-SLE-Module-Web-Scripting-12-2022-4300 is not security or has no CVEs. patches: SUSE-2022-4300,SUSE-SLE-Module-Web-Scripting-12-2022-4300 SKIP SUSE-RU-2022:4311-1 as openSUSE-SLE-15.4-2022-4311 is not security or has no CVEs. patches: SUSE-2022-4311,SUSE-SLE-Micro-5.3-2022-4311,SUSE-SLE-Module-Basesystem-15-SP3-2022-4311,SUSE-SLE-Module-Basesystem-15-SP4-2022-4311,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4311,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4311,SUSE-SUSE-MicroOS-5.1-2022-4311,SUSE-SUSE-MicroOS-5.2-2022-4311,openSUSE-Leap-Micro-5.2-2022-4311,openSUSE-Leap-Micro-5.3-2022-4311,openSUSE-SLE-15.3-2022-4311,openSUSE-SLE-15.4-2022-4311 SKIP SUSE-RU-2022:4312-1 as openSUSE-SLE-15.4-2022-4312 is not security or has no CVEs. patches: SUSE-2022-4312,SUSE-SLE-Micro-5.3-2022-4312,SUSE-SLE-Module-Basesystem-15-SP3-2022-4312,SUSE-SLE-Module-Basesystem-15-SP4-2022-4312,SUSE-SLE-Product-HPC-15-2022-4312,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4312,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4312,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4312,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4312,SUSE-SLE-Product-SLES-15-2022-4312,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4312,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4312,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4312,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4312,SUSE-SLE-Product-SLES_SAP-15-2022-4312,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4312,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4312,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4312,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4312,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4312,SUSE-SUSE-MicroOS-5.1-2022-4312,SUSE-SUSE-MicroOS-5.2-2022-4312,SUSE-Storage-6-2022-4312,SUSE-Storage-7-2022-4312,openSUSE-Leap-Micro-5.2-2022-4312,openSUSE-Leap-Micro-5.3-2022-4312,openSUSE-SLE-15.3-2022-4312,openSUSE-SLE-15.4-2022-4312 SKIP SUSE-RU-2022:4314-1 as openSUSE-SLE-15.4-2022-4314 is not security or has no CVEs. patches: SUSE-2022-4314,SUSE-SLE-INSTALLER-15-SP4-2022-4314,SUSE-SLE-Module-Basesystem-15-SP4-2022-4314,openSUSE-SLE-15.4-2022-4314 SKIP SUSE-RU-2022:4315-1 as openSUSE-SLE-15.3-2022-4315 is not security or has no CVEs. patches: SUSE-2022-4315,SUSE-SLE-INSTALLER-15-SP3-2022-4315,SUSE-SLE-Module-Basesystem-15-SP3-2022-4315,openSUSE-SLE-15.3-2022-4315 SKIP SUSE-RU-2022:4316-1 as SUSE-Storage-7-2022-4316 is not security or has no CVEs. patches: SUSE-2022-4316,SUSE-SLE-INSTALLER-15-SP2-2022-4316,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4316,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4316,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4316,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4316,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4316,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4316,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4316,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4316,SUSE-Storage-7-2022-4316 SKIP SUSE-RU-2022:4317-1 as SUSE-Storage-6-2022-4317 is not security or has no CVEs. patches: SUSE-2022-4317,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4317,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4317,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4317,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4317,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4317,SUSE-Storage-6-2022-4317 SKIP SUSE-RU-2022:4319-1 as SUSE-SLE-HA-12-SP4-2022-4319 is not security or has no CVEs. patches: SUSE-2022-4319,SUSE-SLE-HA-12-SP4-2022-4319 SKIP SUSE-RU-2022:4320-1 as SUSE-SLE-SDK-12-SP5-2022-4320 is not security or has no CVEs. patches: SUSE-2022-4320,SUSE-SLE-HA-12-SP5-2022-4320,SUSE-SLE-SDK-12-SP5-2022-4320 SKIP SUSE-RU-2022:4321-1 as SUSE-SLE-HA-12-SP5-2022-4321 is not security or has no CVEs. patches: SUSE-2022-4321,SUSE-SLE-HA-12-SP4-2022-4321,SUSE-SLE-HA-12-SP5-2022-4321 SKIP SUSE-RU-2022:4322-1 as SUSE-SLE-Product-HA-15-2022-4322 is not security or has no CVEs. patches: SUSE-2022-4322,SUSE-SLE-Product-HA-15-2022-4322 SKIP SUSE-RU-2022:4323-1 as SUSE-SLE-Product-HA-15-SP1-2022-4323 is not security or has no CVEs. patches: SUSE-2022-4323,SUSE-SLE-Product-HA-15-SP1-2022-4323 SKIP SUSE-RU-2022:4324-1 as SUSE-SLE-Product-HA-15-SP2-2022-4324 is not security or has no CVEs. patches: SUSE-2022-4324,SUSE-SLE-Product-HA-15-SP2-2022-4324 SKIP SUSE-RU-2022:4325-1 as openSUSE-SLE-15.3-2022-4325 is not security or has no CVEs. patches: SUSE-2022-4325,SUSE-SLE-Product-HA-15-SP3-2022-4325,openSUSE-SLE-15.3-2022-4325 SKIP SUSE-RU-2022:4326-1 as openSUSE-SLE-15.4-2022-4326 is not security or has no CVEs. patches: SUSE-2022-4326,SUSE-SLE-Product-HA-15-2022-4326,SUSE-SLE-Product-HA-15-SP1-2022-4326,SUSE-SLE-Product-HA-15-SP2-2022-4326,SUSE-SLE-Product-HA-15-SP3-2022-4326,SUSE-SLE-Product-HA-15-SP4-2022-4326,openSUSE-SLE-15.3-2022-4326,openSUSE-SLE-15.4-2022-4326 SKIP SUSE-RU-2022:4327-1 as openSUSE-SLE-15.4-2022-4327 is not security or has no CVEs. patches: SUSE-2022-4327,SUSE-SLE-Micro-5.3-2022-4327,SUSE-SLE-Module-Basesystem-15-SP4-2022-4327,openSUSE-SLE-15.4-2022-4327 SKIP SUSE-RU-2022:4328-1 as openSUSE-SLE-15.4-2022-4328 is not security or has no CVEs. patches: SUSE-2022-4328,SUSE-SLE-Micro-5.3-2022-4328,SUSE-SLE-Module-Basesystem-15-SP4-2022-4328,openSUSE-Leap-Micro-5.3-2022-4328,openSUSE-SLE-15.4-2022-4328 SKIP SUSE-RU-2022:4329-1 as SUSE-SLE-SERVER-12-SP5-2022-4329 is not security or has no CVEs. patches: SUSE-2022-4329,SUSE-SLE-SERVER-12-SP5-2022-4329 SKIP SUSE-RU-2022:4333-1 as SUSE-SLE-SERVER-12-SP5-2022-4333 is not security or has no CVEs. patches: SUSE-2022-4333,SUSE-OpenStack-Cloud-9-2022-4333,SUSE-OpenStack-Cloud-Crowbar-9-2022-4333,SUSE-SLE-SAP-12-SP4-2022-4333,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4333,SUSE-SLE-SERVER-12-SP5-2022-4333 SKIP SUSE-RU-2022:4336-1 as openSUSE-SLE-15.4-2022-4336 is not security or has no CVEs. patches: SUSE-2022-4336,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4336,openSUSE-SLE-15.3-2022-4336,openSUSE-SLE-15.4-2022-4336 SKIP SUSE-RU-2022:4337-1 as openSUSE-SLE-15.4-2022-4337 is not security or has no CVEs. patches: SUSE-2022-4337,SUSE-SLE-Module-Basesystem-15-SP4-2022-4337,openSUSE-SLE-15.4-2022-4337 SKIP SUSE-RU-2022:4338-1 as openSUSE-SLE-15.4-2022-4338 is not security or has no CVEs. patches: SUSE-2022-4338,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4338,openSUSE-SLE-15.4-2022-4338 SKIP SUSE-RU-2022:4339-1 as openSUSE-SLE-15.4-2022-4339 is not security or has no CVEs. patches: SUSE-2022-4339,SUSE-SLE-Module-Basesystem-15-SP4-2022-4339,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4339,openSUSE-SLE-15.4-2022-4339 SKIP SUSE-RU-2022:4345-1 as SUSE-SLE-SERVER-12-SP5-2022-4345 is not security or has no CVEs. patches: SUSE-2022-4345,SUSE-OpenStack-Cloud-9-2022-4345,SUSE-OpenStack-Cloud-Crowbar-9-2022-4345,SUSE-SLE-SAP-12-SP4-2022-4345,SUSE-SLE-SDK-12-SP5-2022-4345,SUSE-SLE-SERVER-12-SP2-BCL-2022-4345,SUSE-SLE-SERVER-12-SP3-BCL-2022-4345,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4345,SUSE-SLE-SERVER-12-SP5-2022-4345 SKIP SUSE-RU-2022:4347-1 as SUSE-SLE-SERVER-12-SP5-2022-4347 is not security or has no CVEs. patches: SUSE-2022-4347,SUSE-SLE-SERVER-12-SP5-2022-4347 SKIP SUSE-RU-2022:4353-1 as SUSE-SLE-SERVER-12-SP5-2022-4353 is not security or has no CVEs. patches: SUSE-2022-4353,SUSE-SLE-SERVER-12-SP5-2022-4353 SKIP SUSE-RU-2022:4354-1 as openSUSE-SLE-15.4-2022-4354 is not security or has no CVEs. patches: SUSE-2022-4354,SUSE-SLE-Module-HPC-15-SP3-2022-4354,SUSE-SLE-Module-HPC-15-SP4-2022-4354,openSUSE-SLE-15.3-2022-4354,openSUSE-SLE-15.4-2022-4354 SKIP SUSE-RU-2022:4355-1 as openSUSE-SLE-15.4-2022-4355 is not security or has no CVEs. patches: SUSE-2022-4355,SUSE-SLE-INSTALLER-15-SP3-2022-4355,SUSE-SLE-Module-Basesystem-15-SP3-2022-4355,openSUSE-SLE-15.3-2022-4355,openSUSE-SLE-15.4-2022-4355 SKIP SUSE-RU-2022:4356-1 as SUSE-SLE-SERVER-12-SP5-2022-4356 is not security or has no CVEs. patches: SUSE-2022-4356,SUSE-OpenStack-Cloud-9-2022-4356,SUSE-OpenStack-Cloud-Crowbar-9-2022-4356,SUSE-SLE-SAP-12-SP4-2022-4356,SUSE-SLE-SDK-12-SP5-2022-4356,SUSE-SLE-SERVER-12-SP2-BCL-2022-4356,SUSE-SLE-SERVER-12-SP3-BCL-2022-4356,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4356,SUSE-SLE-SERVER-12-SP5-2022-4356 SKIP SUSE-RU-2022:4357-1 as SUSE-SLE-SERVER-12-SP5-2022-4357 is not security or has no CVEs. patches: SUSE-2022-4357,SUSE-OpenStack-Cloud-9-2022-4357,SUSE-OpenStack-Cloud-Crowbar-9-2022-4357,SUSE-SLE-SAP-12-SP4-2022-4357,SUSE-SLE-SERVER-12-SP2-BCL-2022-4357,SUSE-SLE-SERVER-12-SP3-BCL-2022-4357,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4357,SUSE-SLE-SERVER-12-SP5-2022-4357 SKIP SUSE-RU-2022:4358-1 as openSUSE-SLE-15.3-2022-4358 is not security or has no CVEs. patches: SUSE-2022-4358,SUSE-SLE-Module-Basesystem-15-SP3-2022-4358,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4358,openSUSE-SLE-15.3-2022-4358 SKIP SUSE-RU-2022:4363-1 as openSUSE-SLE-15.4-2022-4363 is not security or has no CVEs. patches: SUSE-2022-4363,SUSE-SLE-Module-Legacy-15-SP3-2022-4363,openSUSE-SLE-15.3-2022-4363,openSUSE-SLE-15.4-2022-4363 SKIP SUSE-RU-2022:4364-1 as SUSE-SLE-SERVER-12-SP5-2022-4364 is not security or has no CVEs. patches: SUSE-2022-4364,SUSE-SLE-SDK-12-SP5-2022-4364,SUSE-SLE-SERVER-12-SP5-2022-4364 SKIP SUSE-RU-2022:4365-1 as openSUSE-SLE-15.4-2022-4365 is not security or has no CVEs. patches: SUSE-2022-4365,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4365,openSUSE-SLE-15.4-2022-4365 SKIP SUSE-RU-2022:4366-1 as openSUSE-SLE-15.3-2022-4366 is not security or has no CVEs. patches: SUSE-2022-4366,SUSE-SLE-Module-Basesystem-15-SP3-2022-4366,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4366,openSUSE-SLE-15.3-2022-4366 SKIP SUSE-RU-2022:4367-1 as openSUSE-SLE-15.4-2022-4367 is not security or has no CVEs. patches: SUSE-2022-4367,SUSE-SLE-Micro-5.3-2022-4367,SUSE-SLE-Module-Public-Cloud-15-2022-4367,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-4367,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4367,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4367,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4367,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-4367,openSUSE-Leap-Micro-5.3-2022-4367,openSUSE-SLE-15.3-2022-4367,openSUSE-SLE-15.4-2022-4367 SKIP SUSE-RU-2022:4368-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-4368 is not security or has no CVEs. patches: SUSE-2022-4368,SUSE-SLE-Module-Public-Cloud-12-2022-4368,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-4368 SKIP SUSE-RU-2022:4370-1 as openSUSE-SLE-15.4-2022-4370 is not security or has no CVEs. patches: SUSE-2022-4370,SUSE-SLE-Module-Basesystem-15-SP4-2022-4370,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4370,openSUSE-SLE-15.4-2022-4370 SKIP SUSE-RU-2022:4374-1 as SUSE-SLE-SERVER-12-SP5-2022-4374 is not security or has no CVEs. patches: SUSE-2022-4374,SUSE-SLE-SERVER-12-SP5-2022-4374 SKIP SUSE-RU-2022:4375-1 as openSUSE-SLE-15.4-2022-4375 is not security or has no CVEs. patches: SUSE-2022-4375,SUSE-SLE-Module-Basesystem-15-SP4-2022-4375,openSUSE-SLE-15.4-2022-4375 SKIP SUSE-RU-2022:4376-1 as SUSE-SLE-SERVER-12-SP5-2022-4376 is not security or has no CVEs. patches: SUSE-2022-4376,SUSE-SLE-SDK-12-SP5-2022-4376,SUSE-SLE-SERVER-12-SP5-2022-4376 SKIP SUSE-RU-2022:4377-1 as SUSE-SLE-SERVER-12-SP5-2022-4377 is not security or has no CVEs. patches: SUSE-2022-4377,SUSE-SLE-SDK-12-SP5-2022-4377,SUSE-SLE-SERVER-12-SP5-2022-4377 SKIP SUSE-RU-2022:4381-1 as openSUSE-SLE-15.3-2022-4381 is not security or has no CVEs. patches: SUSE-2022-4381,SUSE-SLE-Module-Basesystem-15-SP3-2022-4381,SUSE-SUSE-MicroOS-5.1-2022-4381,SUSE-SUSE-MicroOS-5.2-2022-4381,openSUSE-Leap-Micro-5.2-2022-4381,openSUSE-SLE-15.3-2022-4381 SKIP SUSE-RU-2022:4382-1 as openSUSE-SLE-15.4-2022-4382 is not security or has no CVEs. patches: SUSE-2022-4382,SUSE-SLE-Micro-5.3-2022-4382,SUSE-SLE-Module-Basesystem-15-SP4-2022-4382,openSUSE-Leap-Micro-5.3-2022-4382,openSUSE-SLE-15.4-2022-4382 SKIP SUSE-RU-2022:4383-1 as openSUSE-SLE-15.4-2022-4383 is not security or has no CVEs. patches: SUSE-2022-4383,SUSE-SLE-Micro-5.3-2022-4383,SUSE-SLE-Module-Basesystem-15-SP4-2022-4383,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4383,openSUSE-Leap-Micro-5.3-2022-4383,openSUSE-SLE-15.4-2022-4383 SKIP SUSE-RU-2022:4384-1 as SUSE-SLE-Module-Server-Applications-15-SP4-2022-4384 is not security or has no CVEs. patches: SUSE-2022-4384,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4384,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4384 SKIP SUSE-RU-2022:4385-1 as openSUSE-SLE-15.4-2022-4385 is not security or has no CVEs. patches: SUSE-2022-4385,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4385,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4385,openSUSE-SLE-15.3-2022-4385,openSUSE-SLE-15.4-2022-4385 SKIP SUSE-RU-2022:4386-1 as openSUSE-SLE-15.4-2022-4386 is not security or has no CVEs. patches: SUSE-2022-4386,openSUSE-SLE-15.3-2022-4386,openSUSE-SLE-15.4-2022-4386 SKIP SUSE-RU-2022:4387-1 as openSUSE-SLE-15.4-2022-4387 is not security or has no CVEs. patches: SUSE-2022-4387,SUSE-SLE-Module-Basesystem-15-SP3-2022-4387,SUSE-SLE-Module-Basesystem-15-SP4-2022-4387,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4387,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4387,openSUSE-SLE-15.3-2022-4387,openSUSE-SLE-15.4-2022-4387 SKIP SUSE-RU-2022:4388-1 as openSUSE-SLE-15.3-2022-4388 is not security or has no CVEs. patches: SUSE-2022-4388,SUSE-SLE-Module-Basesystem-15-SP3-2022-4388,SUSE-SUSE-MicroOS-5.1-2022-4388,SUSE-SUSE-MicroOS-5.2-2022-4388,openSUSE-Leap-Micro-5.2-2022-4388,openSUSE-SLE-15.3-2022-4388 SKIP SUSE-RU-2022:4389-1 as openSUSE-SLE-15.4-2022-4389 is not security or has no CVEs. patches: SUSE-2022-4389,SUSE-SLE-Module-Basesystem-15-SP3-2022-4389,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4389,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4389,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4389,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4389,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4389,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4389,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4389,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4389,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4389,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4389,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4389,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4389,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4389,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4389,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4389,SUSE-SUSE-MicroOS-5.2-2022-4389,SUSE-Storage-6-2022-4389,SUSE-Storage-7-2022-4389,openSUSE-Leap-Micro-5.2-2022-4389,openSUSE-SLE-15.3-2022-4389,openSUSE-SLE-15.4-2022-4389 SKIP SUSE-RU-2022:4390-1 as SUSE-SLE-Product-SLES_SAP-15-2022-4390 is not security or has no CVEs. patches: SUSE-2022-4390,SUSE-SLE-Product-HPC-15-2022-4390,SUSE-SLE-Product-SLES-15-2022-4390,SUSE-SLE-Product-SLES_SAP-15-2022-4390 SKIP SUSE-RU-2022:4391-1 as openSUSE-SLE-15.4-2022-4391 is not security or has no CVEs. patches: SUSE-2022-4391,SUSE-SLE-Module-Basesystem-15-SP3-2022-4391,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4391,SUSE-SUSE-MicroOS-5.1-2022-4391,SUSE-SUSE-MicroOS-5.2-2022-4391,openSUSE-Leap-Micro-5.2-2022-4391,openSUSE-SLE-15.3-2022-4391,openSUSE-SLE-15.4-2022-4391 SKIP SUSE-RU-2022:4392-1 as SUSE-SLE-SERVER-12-SP5-2022-4392 is not security or has no CVEs. patches: SUSE-2022-4392,SUSE-SLE-SDK-12-SP5-2022-4392,SUSE-SLE-SERVER-12-SP5-2022-4392 SKIP SUSE-RU-2022:4396-1 as openSUSE-SLE-15.4-2022-4396 is not security or has no CVEs. patches: SUSE-2022-4396,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4396,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4396,openSUSE-SLE-15.3-2022-4396,openSUSE-SLE-15.4-2022-4396 SKIP SUSE-RU-2022:4399-1 as SUSE-Storage-7-2022-4399 is not security or has no CVEs. patches: SUSE-2022-4399,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4399,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4399,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4399,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4399,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4399,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4399,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4399,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4399,SUSE-Storage-7-2022-4399 SKIP SUSE-RU-2022:4400-1 as SUSE-Storage-6-2022-4400 is not security or has no CVEs. patches: SUSE-2022-4400,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4400,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4400,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4400,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4400,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4400,SUSE-Storage-6-2022-4400 SKIP SUSE-RU-2022:4401-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2022-4401 is not security or has no CVEs. patches: SUSE-2022-4401,SUSE-OpenStack-Cloud-9-2022-4401,SUSE-OpenStack-Cloud-Crowbar-9-2022-4401,SUSE-SLE-SAP-12-SP4-2022-4401,SUSE-SLE-SERVER-12-SP3-BCL-2022-4401,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4401 SKIP SUSE-RU-2022:4402-1 as SUSE-SLE-Product-SLES_SAP-15-2022-4402 is not security or has no CVEs. patches: SUSE-2022-4402,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-4402,SUSE-SLE-Product-HPC-15-2022-4402,SUSE-SLE-Product-SLES-15-2022-4402,SUSE-SLE-Product-SLES_SAP-15-2022-4402 SKIP SUSE-RU-2022:4403-1 as SUSE-SLE-SERVER-12-SP5-2022-4403 is not security or has no CVEs. patches: SUSE-2022-4403,SUSE-SLE-SERVER-12-SP5-2022-4403 SKIP SUSE-RU-2022:4404-1 as openSUSE-SLE-15.4-2022-4404 is not security or has no CVEs. patches: SUSE-2022-4404,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4404,openSUSE-SLE-15.4-2022-4404 SKIP SUSE-RU-2022:4405-1 as openSUSE-Leap-Micro-5.2-2022-4405 is not security or has no CVEs. patches: SUSE-2022-4405,SUSE-SUSE-MicroOS-5.2-2022-4405,openSUSE-Leap-Micro-5.2-2022-4405 SKIP SUSE-RU-2022:4406-1 as SUSE-SUSE-MicroOS-5.1-2022-4406 is not security or has no CVEs. patches: SUSE-2022-4406,SUSE-SUSE-MicroOS-5.1-2022-4406 SKIP SUSE-RU-2022:4407-1 as openSUSE-SLE-15.4-2022-4407 is not security or has no CVEs. patches: SUSE-2022-4407,openSUSE-SLE-15.4-2022-4407 SKIP SUSE-RU-2022:4412-1 as openSUSE-SLE-15.4-2022-4412 is not security or has no CVEs. patches: SUSE-2022-4412,SUSE-SLE-Micro-5.3-2022-4412,SUSE-SLE-Module-Basesystem-15-SP3-2022-4412,SUSE-SLE-Module-Basesystem-15-SP4-2022-4412,SUSE-SLE-Product-HPC-15-2022-4412,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4412,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4412,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4412,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4412,SUSE-SLE-Product-SLES-15-2022-4412,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4412,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4412,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4412,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4412,SUSE-SLE-Product-SLES_SAP-15-2022-4412,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4412,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4412,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4412,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4412,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4412,SUSE-SUSE-MicroOS-5.1-2022-4412,SUSE-SUSE-MicroOS-5.2-2022-4412,SUSE-Storage-6-2022-4412,SUSE-Storage-7-2022-4412,openSUSE-Leap-Micro-5.2-2022-4412,openSUSE-SLE-15.3-2022-4412,openSUSE-SLE-15.4-2022-4412 SKIP SUSE-RU-2022:4413-1 as openSUSE-SLE-15.4-2022-4413 is not security or has no CVEs. patches: SUSE-2022-4413,SUSE-SLE-Product-HA-15-SP4-2022-4413,openSUSE-SLE-15.4-2022-4413 SKIP SUSE-RU-2022:4417-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4417 is not security or has no CVEs. patches: SUSE-2022-4417,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-4417,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4417 SKIP SUSE-RU-2022:4419-1 as SUSE-Storage-7-2022-4419 is not security or has no CVEs. patches: SUSE-2022-4419,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4419,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4419,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4419,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4419,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4419,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4419,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4419,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4419,SUSE-Storage-7-2022-4419 SKIP SUSE-RU-2022:4420-1 as openSUSE-SLE-15.4-2022-4420 is not security or has no CVEs. patches: SUSE-2022-4420,SUSE-SLE-Micro-5.3-2022-4420,SUSE-SLE-Module-Basesystem-15-SP4-2022-4420,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4420,SUSE-SLE-Module-Transactional-Server-15-SP4-2022-4420,openSUSE-Leap-Micro-5.3-2022-4420,openSUSE-SLE-15.4-2022-4420 SKIP SUSE-RU-2022:4421-1 as SUSE-SLE-Product-SLES_SAP-15-2022-4421 is not security or has no CVEs. patches: SUSE-2022-4421,SUSE-SLE-Product-HPC-15-2022-4421,SUSE-SLE-Product-SLES-15-2022-4421,SUSE-SLE-Product-SLES_SAP-15-2022-4421 SKIP SUSE-RU-2022:4422-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-4422 is not security or has no CVEs. patches: SUSE-2022-4422,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2022-4422,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2022-4422,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-4422 SKIP SUSE-RU-2022:4424-1 as SUSE-EL-9-CLIENT-TOOLS-2022-4424 is not security or has no CVEs. patches: SUSE-2022-4424,SUSE-EL-9-CLIENT-TOOLS-2022-4424 SKIP SUSE-RU-2022:4427-1 as SUSE-EL-9-CLIENT-TOOLS-2022-4427 is not security or has no CVEs. patches: SUSE-2022-4427,SUSE-EL-9-CLIENT-TOOLS-2022-4427 ERROR: notice SUSE-RU-2022:4429-1 has no valid patches out of: SUSE-2022-4429,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-4429 SKIP SUSE-RU-2022:4430-1 as SUSE-SLE-Manager-Tools-12-2022-4430 is not security or has no CVEs. patches: SUSE-2022-4430,SUSE-SLE-Manager-Tools-12-2022-4430 SKIP SUSE-RU-2022:4431-1 as openSUSE-SLE-15.3-2022-4431 is not security or has no CVEs. patches: SUSE-2022-4431,SUSE-SLE-Module-Basesystem-15-SP3-2022-4431,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4431,SUSE-SLE-Module-Transactional-Server-15-SP3-2022-4431,SUSE-SUSE-MicroOS-5.1-2022-4431,SUSE-SUSE-MicroOS-5.2-2022-4431,openSUSE-Leap-Micro-5.2-2022-4431,openSUSE-SLE-15.3-2022-4431 SKIP SUSE-RU-2022:4432-1 as SUSE-SLE-Module-Adv-Systems-Management-12-2022-4432 is not security or has no CVEs. patches: SUSE-2022-4432,SUSE-SLE-Manager-Tools-12-2022-4432,SUSE-SLE-Module-Adv-Systems-Management-12-2022-4432 ERROR: notice SUSE-RU-2022:4435-1 has no valid patches out of: SUSE-2022-4435,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-4435 ERROR: notice SUSE-RU-2022:4436-1 has no valid patches out of: SUSE-2022-4436,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-4436 ERROR: notice SUSE-RU-2022:4438-1 has no valid patches out of: SUSE-2022-4438,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2022-4438 SKIP SUSE-RU-2022:4440-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4440 is not security or has no CVEs. patches: SUSE-2022-4440,SUSE-SLE-Manager-Tools-15-2022-4440,SUSE-SLE-Manager-Tools-For-Micro-5-2022-4440,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-4440,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4440 SKIP SUSE-RU-2022:4444-1 as openSUSE-SLE-15.3-2022-4444 is not security or has no CVEs. patches: SUSE-2022-4444,SUSE-SLE-Product-HA-15-SP3-2022-4444,openSUSE-SLE-15.3-2022-4444 SKIP SUSE-RU-2022:4445-1 as SUSE-Storage-6-2022-4445 is not security or has no CVEs. patches: SUSE-2022-4445,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4445,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4445,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4445,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4445,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4445,SUSE-Storage-6-2022-4445 SKIP SUSE-RU-2022:4446-1 as openSUSE-SLE-15.4-2022-4446 is not security or has no CVEs. patches: SUSE-2022-4446,SUSE-SLE-Module-Legacy-15-SP3-2022-4446,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4446,openSUSE-SLE-15.3-2022-4446,openSUSE-SLE-15.4-2022-4446 SKIP SUSE-RU-2022:4447-1 as openSUSE-SLE-15.4-2022-4447 is not security or has no CVEs. patches: SUSE-2022-4447,SUSE-SLE-Module-Basesystem-15-SP3-2022-4447,SUSE-SLE-Module-Legacy-15-SP4-2022-4447,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4447,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4447,openSUSE-SLE-15.3-2022-4447,openSUSE-SLE-15.4-2022-4447 SKIP SUSE-RU-2022:4448-1 as SUSE-Storage-7.1-2022-4448 is not security or has no CVEs. patches: SUSE-2022-4448,SUSE-SLE-Product-SLES-15-SP3-LTSS-2022-4448,SUSE-Storage-7.1-2022-4448 SKIP SUSE-RU-2022:4449-1 as SUSE-SLE-SERVER-12-SP5-2022-4449 is not security or has no CVEs. patches: SUSE-2022-4449,SUSE-OpenStack-Cloud-9-2022-4449,SUSE-OpenStack-Cloud-Crowbar-9-2022-4449,SUSE-SLE-SAP-12-SP4-2022-4449,SUSE-SLE-SDK-12-SP5-2022-4449,SUSE-SLE-SERVER-12-SP3-BCL-2022-4449,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4449,SUSE-SLE-SERVER-12-SP5-2022-4449 SKIP SUSE-RU-2022:4450-1 as SUSE-SLE-Product-HA-15-SP2-2022-4450 is not security or has no CVEs. patches: SUSE-2022-4450,SUSE-SLE-Product-HA-15-SP2-2022-4450 SKIP SUSE-RU-2022:4451-1 as SUSE-SLE-Product-HA-15-SP1-2022-4451 is not security or has no CVEs. patches: SUSE-2022-4451,SUSE-SLE-Product-HA-15-SP1-2022-4451 SKIP SUSE-RU-2022:4454-1 as SUSE-SLE-SERVER-12-SP5-2022-4454 is not security or has no CVEs. patches: SUSE-2022-4454,SUSE-OpenStack-Cloud-9-2022-4454,SUSE-OpenStack-Cloud-Crowbar-9-2022-4454,SUSE-SLE-SAP-12-SP4-2022-4454,SUSE-SLE-SDK-12-SP5-2022-4454,SUSE-SLE-SERVER-12-SP2-BCL-2022-4454,SUSE-SLE-SERVER-12-SP3-BCL-2022-4454,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4454,SUSE-SLE-SERVER-12-SP5-2022-4454 SKIP SUSE-RU-2022:4455-1 as openSUSE-SLE-15.4-2022-4455 is not security or has no CVEs. patches: SUSE-2022-4455,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4455,openSUSE-SLE-15.4-2022-4455 SKIP SUSE-RU-2022:4458-1 as openSUSE-SLE-15.3-2022-4458 is not security or has no CVEs. patches: SUSE-2022-4458,SUSE-SLE-Module-Containers-15-SP3-2022-4458,SUSE-SLE-Module-Containers-15-SP4-2022-4458,openSUSE-SLE-15.3-2022-4458 SKIP SUSE-RU-2022:4465-1 as openSUSE-SLE-15.4-2022-4465 is not security or has no CVEs. patches: SUSE-2022-4465,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4465,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4465,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4465,openSUSE-SLE-15.3-2022-4465,openSUSE-SLE-15.4-2022-4465 SKIP SUSE-RU-2022:4466-1 as openSUSE-SLE-15.4-2022-4466 is not security or has no CVEs. patches: SUSE-2022-4466,SUSE-SLE-Micro-5.3-2022-4466,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4466,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4466,SUSE-SUSE-MicroOS-5.1-2022-4466,SUSE-SUSE-MicroOS-5.2-2022-4466,openSUSE-Leap-Micro-5.2-2022-4466,openSUSE-Leap-Micro-5.3-2022-4466,openSUSE-SLE-15.3-2022-4466,openSUSE-SLE-15.4-2022-4466 SKIP SUSE-RU-2022:4467-1 as openSUSE-SLE-15.4-2022-4467 is not security or has no CVEs. patches: SUSE-2022-4467,SUSE-SLE-Product-HA-15-SP2-2022-4467,SUSE-SLE-Product-HA-15-SP3-2022-4467,SUSE-SLE-Product-HA-15-SP4-2022-4467,openSUSE-SLE-15.3-2022-4467,openSUSE-SLE-15.4-2022-4467 SKIP SUSE-RU-2022:4468-1 as SUSE-SLE-SERVER-12-SP2-BCL-2022-4468 is not security or has no CVEs. patches: SUSE-2022-4468,SUSE-SLE-SERVER-12-SP2-BCL-2022-4468 SKIP SUSE-RU-2022:4469-1 as openSUSE-SLE-15.4-2022-4469 is not security or has no CVEs. patches: SUSE-2022-4469,SUSE-SLE-Micro-5.3-2022-4469,SUSE-SLE-Module-Basesystem-15-SP4-2022-4469,openSUSE-Leap-Micro-5.3-2022-4469,openSUSE-SLE-15.4-2022-4469 SKIP SUSE-RU-2022:4470-1 as openSUSE-SLE-15.3-2022-4470 is not security or has no CVEs. patches: SUSE-2022-4470,SUSE-SLE-Module-Basesystem-15-SP3-2022-4470,SUSE-SUSE-MicroOS-5.1-2022-4470,SUSE-SUSE-MicroOS-5.2-2022-4470,openSUSE-Leap-Micro-5.2-2022-4470,openSUSE-SLE-15.3-2022-4470 SKIP SUSE-RU-2022:4471-1 as SUSE-Storage-7-2022-4471 is not security or has no CVEs. patches: SUSE-2022-4471,SUSE-SLE-Product-HPC-15-2022-4471,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4471,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4471,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4471,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4471,SUSE-SLE-Product-SLES-15-2022-4471,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4471,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4471,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4471,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4471,SUSE-SLE-Product-SLES_SAP-15-2022-4471,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4471,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4471,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4471,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4471,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4471,SUSE-Storage-6-2022-4471,SUSE-Storage-7-2022-4471 SKIP SUSE-RU-2022:4472-1 as openSUSE-SLE-15.4-2022-4472 is not security or has no CVEs. patches: SUSE-2022-4472,SUSE-SLE-Module-Basesystem-15-SP3-2022-4472,SUSE-SLE-Module-Basesystem-15-SP4-2022-4472,openSUSE-SLE-15.3-2022-4472,openSUSE-SLE-15.4-2022-4472 SKIP SUSE-RU-2022:4473-1 as SUSE-Storage-7.1-2022-4473 is not security or has no CVEs. patches: SUSE-2022-4473,SUSE-Storage-7.1-2022-4473 SKIP SUSE-RU-2022:4474-1 as openSUSE-SLE-15.4-2022-4474 is not security or has no CVEs. patches: SUSE-2022-4474,SUSE-SLE-Module-Basesystem-15-SP3-2022-4474,SUSE-SLE-Module-Basesystem-15-SP4-2022-4474,SUSE-SLE-Module-Python2-15-SP3-2022-4474,openSUSE-SLE-15.3-2022-4474,openSUSE-SLE-15.4-2022-4474 SKIP SUSE-RU-2022:4475-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4475 is not security or has no CVEs. patches: SUSE-2022-4475,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4475 SKIP SUSE-RU-2022:4476-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-4476 is not security or has no CVEs. patches: SUSE-2022-4476,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2022-4476 SKIP SUSE-RU-2022:4489-1 as openSUSE-SLE-15.4-2022-4489 is not security or has no CVEs. patches: SUSE-2022-4489,SUSE-SLE-Micro-5.3-2022-4489,SUSE-SLE-Product-HA-15-SP4-2022-4489,openSUSE-Leap-Micro-5.3-2022-4489,openSUSE-SLE-15.4-2022-4489 SKIP SUSE-RU-2022:4490-1 as SUSE-SLE-Module-Toolchain-12-2022-4490 is not security or has no CVEs. patches: SUSE-2022-4490,SUSE-SLE-Module-Toolchain-12-2022-4490 SKIP SUSE-RU-2022:4491-1 as openSUSE-SLE-15.4-2022-4491 is not security or has no CVEs. patches: SUSE-2022-4491,SUSE-SLE-Micro-5.3-2022-4491,SUSE-SLE-Module-Basesystem-15-SP3-2022-4491,SUSE-SLE-Module-Basesystem-15-SP4-2022-4491,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4491,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4491,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4491,SUSE-SLE-Module-Python2-15-SP3-2022-4491,SUSE-SUSE-MicroOS-5.1-2022-4491,SUSE-SUSE-MicroOS-5.2-2022-4491,openSUSE-Leap-Micro-5.2-2022-4491,openSUSE-SLE-15.3-2022-4491,openSUSE-SLE-15.4-2022-4491 SKIP SUSE-RU-2022:4492-1 as openSUSE-SLE-15.4-2022-4492 is not security or has no CVEs. patches: SUSE-2022-4492,SUSE-SLE-Micro-5.3-2022-4492,SUSE-SLE-Module-Basesystem-15-SP4-2022-4492,openSUSE-Leap-Micro-5.3-2022-4492,openSUSE-SLE-15.4-2022-4492 SKIP SUSE-RU-2022:4493-1 as openSUSE-SLE-15.4-2022-4493 is not security or has no CVEs. patches: SUSE-2022-4493,openSUSE-SLE-15.3-2022-4493,openSUSE-SLE-15.4-2022-4493 SKIP SUSE-RU-2022:4494-1 as openSUSE-SLE-15.3-2022-4494 is not security or has no CVEs. patches: SUSE-2022-4494,SUSE-SLE-Module-Basesystem-15-SP3-2022-4494,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4494,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4494,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4494,openSUSE-SLE-15.3-2022-4494 SKIP SUSE-RU-2022:4497-1 as SUSE-SLE-Product-HA-15-SP2-2022-4497 is not security or has no CVEs. patches: SUSE-2022-4497,SUSE-SLE-Product-HA-15-SP2-2022-4497 SKIP SUSE-RU-2022:4498-1 as openSUSE-SLE-15.3-2022-4498 is not security or has no CVEs. patches: SUSE-2022-4498,SUSE-SLE-Product-HA-15-SP3-2022-4498,openSUSE-SLE-15.3-2022-4498 SKIP SUSE-RU-2022:4499-1 as openSUSE-SLE-15.4-2022-4499 is not security or has no CVEs. patches: SUSE-2022-4499,SUSE-SLE-Micro-5.3-2022-4499,SUSE-SLE-Module-Basesystem-15-SP3-2022-4499,SUSE-SLE-Module-Basesystem-15-SP4-2022-4499,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-4499,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4499,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4499,SUSE-SUSE-MicroOS-5.1-2022-4499,SUSE-SUSE-MicroOS-5.2-2022-4499,openSUSE-Leap-Micro-5.2-2022-4499,openSUSE-Leap-Micro-5.3-2022-4499,openSUSE-SLE-15.3-2022-4499,openSUSE-SLE-15.4-2022-4499 SKIP SUSE-RU-2022:4502-1 as openSUSE-SLE-15.4-2022-4502 is not security or has no CVEs. patches: SUSE-2022-4502,SUSE-SLE-Module-Basesystem-15-SP4-2022-4502,openSUSE-SLE-15.4-2022-4502 SKIP SUSE-RU-2022:4568-1 as openSUSE-SLE-15.4-2022-4568 is not security or has no CVEs. patches: SUSE-2022-4568,SUSE-SLE-Module-Basesystem-15-SP4-2022-4568,openSUSE-SLE-15.4-2022-4568 SKIP SUSE-RU-2022:4581-1 as SUSE-SLE-RT-12-SP5-2022-4581 is not security or has no CVEs. patches: SUSE-2022-4581,SUSE-SLE-RT-12-SP5-2022-4581 SKIP SUSE-RU-2022:4583-1 as SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-4583 is not security or has no CVEs. patches: SUSE-2022-4583,SUSE-SLE-Module-Public-Cloud-12-2022-4583,SUSE-SLE-Module-Public-Cloud-Unrestricted-12-2022-4583 SKIP SUSE-RU-2022:4584-1 as openSUSE-SLE-15.4-2022-4584 is not security or has no CVEs. patches: SUSE-2022-4584,SUSE-SLE-Micro-5.3-2022-4584,SUSE-SLE-Module-Public-Cloud-15-SP1-2022-4584,SUSE-SLE-Module-Public-Cloud-15-SP2-2022-4584,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-4584,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-4584,SUSE-SLE-Module-Public-Cloud-Unrestricted-15-2022-4584,openSUSE-Leap-Micro-5.3-2022-4584,openSUSE-SLE-15.3-2022-4584,openSUSE-SLE-15.4-2022-4584 SKIP SUSE-RU-2022:4590-1 as openSUSE-SLE-15.4-2022-4590 is not security or has no CVEs. patches: SUSE-2022-4590,SUSE-SLE-Module-Basesystem-15-SP4-2022-4590,openSUSE-SLE-15.4-2022-4590 SKIP SUSE-RU-2022:4604-1 as SUSE-SLE-SERVER-12-SP5-2022-4604 is not security or has no CVEs. patches: SUSE-2022-4604,SUSE-SLE-SERVER-12-SP5-2022-4604 SKIP SUSE-RU-2022:4609-1 as SUSE-SLE-Live-Patching-12-SP5-2022-4609 is not security or has no CVEs. patches: SUSE-2022-4609,SUSE-SLE-Live-Patching-12-2022-4609,SUSE-SLE-Live-Patching-12-SP4-2022-4609,SUSE-SLE-Live-Patching-12-SP5-2022-4609 SKIP SUSE-RU-2022:4618-1 as openSUSE-SLE-15.4-2022-4618 is not security or has no CVEs. patches: SUSE-2022-4618,SUSE-SLE-Micro-5.3-2022-4618,SUSE-SLE-Module-Containers-15-SP3-2022-4618,SUSE-SLE-Module-Containers-15-SP4-2022-4618,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2022-4618,SUSE-SLE-Product-HPC-15-SP3-LTSS-2022-4618,SUSE-SLE-Product-SLES-15-SP3-BCL-2022-4618,SUSE-SLE-Product-SLES-15-SP3-LTSS-2022-4618,SUSE-SLE-Product-SLES_SAP-15-SP3-2022-4618,SUSE-SUSE-MicroOS-5.1-2022-4618,SUSE-SUSE-MicroOS-5.2-2022-4618,SUSE-Storage-7.1-2022-4618,openSUSE-Leap-Micro-5.2-2022-4618,openSUSE-Leap-Micro-5.3-2022-4618,openSUSE-SLE-15.3-2022-4618,openSUSE-SLE-15.4-2022-4618 SKIP SUSE-RU-2022:4623-1 as openSUSE-SLE-15.4-2022-4623 is not security or has no CVEs. patches: SUSE-2022-4623,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4623,openSUSE-SLE-15.4-2022-4623 SKIP SUSE-RU-2022:4632-1 as openSUSE-SLE-15.4-2022-4632 is not security or has no CVEs. patches: SUSE-2022-4632,SUSE-SLE-Module-Live-Patching-15-2022-4632,SUSE-SLE-Module-Live-Patching-15-SP1-2022-4632,SUSE-SLE-Module-Live-Patching-15-SP2-2022-4632,SUSE-SLE-Module-Live-Patching-15-SP3-2022-4632,SUSE-SLE-Module-Live-Patching-15-SP4-2022-4632,openSUSE-SLE-15.3-2022-4632,openSUSE-SLE-15.4-2022-4632 SKIP SUSE-RU-2022:4637-1 as SUSE-SLE-HA-12-SP5-2022-4637 is not security or has no CVEs. patches: SUSE-2022-4637,SUSE-SLE-HA-12-SP4-2022-4637,SUSE-SLE-HA-12-SP5-2022-4637 SKIP SUSE-RU-2022:4638-1 as SUSE-SLE-HA-12-SP5-2022-4638 is not security or has no CVEs. patches: SUSE-2022-4638,SUSE-SLE-HA-12-SP5-2022-4638 SKIP SUSE-RU-2022:4640-1 as openSUSE-SLE-15.4-2022-4640 is not security or has no CVEs. patches: SUSE-2022-4640,SUSE-SLE-Micro-5.3-2022-4640,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-4640,SUSE-SLE-Product-HA-15-SP4-2022-4640,openSUSE-Leap-Micro-5.3-2022-4640,openSUSE-SLE-15.4-2022-4640 SKIP SUSE-RU-2022:4645-1 as openSUSE-SLE-15.4-2022-4645 is not security or has no CVEs. patches: SUSE-2022-4645,SUSE-SLE-Module-Basesystem-15-SP3-2022-4645,SUSE-SLE-Module-Basesystem-15-SP4-2022-4645,SUSE-SLE-Module-Legacy-15-SP4-2022-4645,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4645,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4645,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4645,SUSE-SLE-Module-Server-Applications-15-SP4-2022-4645,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4645,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4645,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4645,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4645,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4645,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4645,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4645,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4645,SUSE-Storage-7-2022-4645,openSUSE-SLE-15.3-2022-4645,openSUSE-SLE-15.4-2022-4645 ERROR: notice SUSE-RU-202302:15177-1 has no valid patches out of: suse-ubu184ct-client-tools-202302-15177 ERROR: notice SUSE-RU-202302:15178-1 has no valid patches out of: suse-ubu204ct-client-tools-202302-15178 ERROR: notice SUSE-RU-202302:15179-1 has no valid patches out of: suse-ubu224ct-client-tools-202302-15179 ERROR: notice SUSE-RU-202302:15181-1 has no valid patches out of: suse-ubu184ct-client-tools-202302-15181 ERROR: notice SUSE-RU-202302:15182-1 has no valid patches out of: suse-ubu204ct-client-tools-202302-15182 ERROR: notice SUSE-RU-202302:15183-1 has no valid patches out of: suse-ubu224ct-client-tools-202302-15183 ERROR: notice SUSE-RU-202305:15214-1 has no valid patches out of: suse-ubu184ct-client-tools-202305-15214 ERROR: notice SUSE-RU-202305:15216-1 has no valid patches out of: suse-ubu204ct-client-tools-202305-15216 ERROR: notice SUSE-RU-202305:15217-1 has no valid patches out of: suse-ubu204ct-client-tools-202305-15217 ERROR: notice SUSE-RU-202305:15219-1 has no valid patches out of: suse-ubu224ct-client-tools-202305-15219 ERROR: notice SUSE-RU-202305:15220-1 has no valid patches out of: suse-ubu224ct-client-tools-202305-15220 ERROR: notice SUSE-RU-202306:15229-1 has no valid patches out of: suse-ubu224ct-client-tools-202306-15229 ERROR: notice SUSE-RU-202310:15236-1 has no valid patches out of: suse-ubu204ct-client-tools-202310-15236 ERROR: notice SUSE-RU-202310:15237-1 has no valid patches out of: suse-ubu224ct-client-tools-202310-15237 ERROR: notice SUSE-RU-202310:15239-1 has no valid patches out of: suse-ubu204ct-client-tools-202310-15239 ERROR: notice SUSE-RU-202310:15240-1 has no valid patches out of: suse-ubu224ct-client-tools-202310-15240 SKIP SUSE-RU-2023:0013-1 as openSUSE-SLE-15.3-2023-13 is not security or has no CVEs. patches: SUSE-2023-13,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-13,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-13,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-13,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-13,SUSE-SLE-Product-RT-15-SP3-2023-13,SUSE-SLE-Product-SLES-15-SP1-BCL-2023-13,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-13,SUSE-SLE-Product-SLES-15-SP2-BCL-2023-13,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-13,SUSE-SLE-Product-SLES-15-SP3-BCL-2023-13,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-13,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-13,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-13,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-13,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2023-13,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-13,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2023-13,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-13,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2023-13,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-13,SUSE-SUSE-MicroOS-5.1-2023-13,SUSE-SUSE-MicroOS-5.2-2023-13,SUSE-Storage-6-2023-13,SUSE-Storage-7-2023-13,SUSE-Storage-7.1-2023-13,openSUSE-Leap-Micro-5.2-2023-13,openSUSE-SLE-15.3-2023-13 SKIP SUSE-RU-2023:0016-1 as openSUSE-SLE-15.4-2023-16 is not security or has no CVEs. patches: SUSE-2023-16,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-16,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-16,openSUSE-SLE-15.3-2023-16,openSUSE-SLE-15.4-2023-16 SKIP SUSE-RU-2023:0017-1 as SUSE-SLE-SERVER-12-SP5-2023-17 is not security or has no CVEs. patches: SUSE-2023-17,SUSE-SLE-SERVER-12-SP5-2023-17 SKIP SUSE-RU-2023:0018-1 as openSUSE-SLE-15.4-2023-18 is not security or has no CVEs. patches: SUSE-2023-18,SUSE-SLE-Micro-5.3-2023-18,SUSE-SLE-Module-Basesystem-15-SP4-2023-18,openSUSE-Leap-Micro-5.3-2023-18,openSUSE-SLE-15.4-2023-18 SKIP SUSE-RU-2023:0024-1 as openSUSE-SLE-15.3-2023-24 is not security or has no CVEs. patches: SUSE-2023-24,SUSE-SLE-Module-Basesystem-15-SP3-2023-24,openSUSE-SLE-15.3-2023-24 SKIP SUSE-RU-2023:0025-1 as openSUSE-SLE-15.4-2023-25 is not security or has no CVEs. patches: SUSE-2023-25,SUSE-SLE-Micro-5.3-2023-25,SUSE-SLE-Module-Basesystem-15-SP3-2023-25,SUSE-SLE-Module-Basesystem-15-SP4-2023-25,SUSE-SLE-Product-HPC-15-2023-25,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2023-25,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-25,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2023-25,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-25,SUSE-SLE-Product-SLES-15-2023-25,SUSE-SLE-Product-SLES-15-SP1-BCL-2023-25,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-25,SUSE-SLE-Product-SLES-15-SP2-BCL-2023-25,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-25,SUSE-SLE-Product-SLES_SAP-15-2023-25,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-25,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-25,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2023-25,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2023-25,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2023-25,SUSE-SUSE-MicroOS-5.1-2023-25,SUSE-SUSE-MicroOS-5.2-2023-25,SUSE-Storage-6-2023-25,SUSE-Storage-7-2023-25,openSUSE-Leap-Micro-5.2-2023-25,openSUSE-Leap-Micro-5.3-2023-25,openSUSE-SLE-15.3-2023-25,openSUSE-SLE-15.4-2023-25 SKIP SUSE-RU-2023:0026-1 as SUSE-SLE-SERVER-12-SP5-2023-26 is not security or has no CVEs. patches: SUSE-2023-26,SUSE-OpenStack-Cloud-9-2023-26,SUSE-OpenStack-Cloud-Crowbar-9-2023-26,SUSE-SLE-SAP-12-SP4-2023-26,SUSE-SLE-SERVER-12-SP2-BCL-2023-26,SUSE-SLE-SERVER-12-SP3-BCL-2023-26,SUSE-SLE-SERVER-12-SP4-LTSS-2023-26,SUSE-SLE-SERVER-12-SP5-2023-26 SKIP SUSE-RU-2023:0027-1 as openSUSE-SLE-15.4-2023-27 is not security or has no CVEs. patches: SUSE-2023-27,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-27,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-27,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-27,openSUSE-SLE-15.3-2023-27,openSUSE-SLE-15.4-2023-27 SKIP SUSE-RU-2023:0028-1 as openSUSE-SLE-15.4-2023-28 is not security or has no CVEs. patches: SUSE-2023-28,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-28,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-28,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-28,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-28,openSUSE-SLE-15.3-2023-28,openSUSE-SLE-15.4-2023-28 SKIP SUSE-RU-2023:0029-1 as openSUSE-SLE-15.3-2023-29 is not security or has no CVEs. patches: SUSE-2023-29,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2023-29,SUSE-SLE-Product-WE-15-SP3-2023-29,openSUSE-SLE-15.3-2023-29 SKIP SUSE-RU-2023:0038-1 as SUSE-SLE-SERVER-12-SP5-2023-38 is not security or has no CVEs. patches: SUSE-2023-38,SUSE-OpenStack-Cloud-9-2023-38,SUSE-OpenStack-Cloud-Crowbar-9-2023-38,SUSE-SLE-SAP-12-SP4-2023-38,SUSE-SLE-SDK-12-SP5-2023-38,SUSE-SLE-SERVER-12-SP2-BCL-2023-38,SUSE-SLE-SERVER-12-SP4-LTSS-2023-38,SUSE-SLE-SERVER-12-SP5-2023-38 SKIP SUSE-RU-2023:0039-1 as openSUSE-SLE-15.4-2023-39 is not security or has no CVEs. patches: SUSE-2023-39,SUSE-SLE-INSTALLER-15-SP4-2023-39,SUSE-SLE-Module-Basesystem-15-SP4-2023-39,openSUSE-SLE-15.4-2023-39 SKIP SUSE-RU-2023:0040-1 as SUSE-SUSE-MicroOS-5.2-2023-40 is not security or has no CVEs. patches: SUSE-2023-40,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-40,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-40,SUSE-SUSE-MicroOS-5.1-2023-40,SUSE-SUSE-MicroOS-5.2-2023-40 SKIP SUSE-RU-2023:0041-1 as openSUSE-SLE-15.4-2023-41 is not security or has no CVEs. patches: SUSE-2023-41,SUSE-SLE-Micro-5.3-2023-41,SUSE-SLE-Module-Basesystem-15-SP4-2023-41,openSUSE-Leap-Micro-5.3-2023-41,openSUSE-SLE-15.4-2023-41 SKIP SUSE-RU-2023:0042-1 as openSUSE-SLE-15.4-2023-42 is not security or has no CVEs. patches: SUSE-2023-42,SUSE-SLE-INSTALLER-15-SP4-2023-42,SUSE-SLE-Module-Basesystem-15-SP4-2023-42,SUSE-SLE-Product-HA-15-SP4-2023-42,openSUSE-SLE-15.4-2023-42 SKIP SUSE-RU-2023:0043-1 as SUSE-SLE-SERVER-12-SP5-2023-43 is not security or has no CVEs. patches: SUSE-2023-43,SUSE-SLE-HA-12-SP5-2023-43,SUSE-SLE-SERVER-12-SP5-2023-43 SKIP SUSE-RU-2023:0044-1 as SUSE-SLE-SERVER-12-SP5-2023-44 is not security or has no CVEs. patches: SUSE-2023-44,SUSE-SLE-SERVER-12-SP5-2023-44 SKIP SUSE-RU-2023:0045-1 as openSUSE-SLE-15.4-2023-45 is not security or has no CVEs. patches: SUSE-2023-45,SUSE-SLE-Micro-5.3-2023-45,SUSE-SLE-Module-Basesystem-15-SP4-2023-45,openSUSE-Leap-Micro-5.3-2023-45,openSUSE-SLE-15.4-2023-45 SKIP SUSE-RU-2023:0046-1 as openSUSE-SLE-15.4-2023-46 is not security or has no CVEs. patches: SUSE-2023-46,SUSE-SLE-Manager-Tools-15-2023-46,SUSE-SLE-Micro-5.3-2023-46,SUSE-SLE-Module-Basesystem-15-SP4-2023-46,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-46,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-46,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-46,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-46,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-46,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-46,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-46,SUSE-SLE-Product-RT-15-SP3-2023-46,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-46,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-46,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-46,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-46,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2023-46,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-46,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2023-46,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-46,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2023-46,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-46,SUSE-SUSE-MicroOS-5.2-2023-46,SUSE-Storage-7-2023-46,SUSE-Storage-7.1-2023-46,openSUSE-Leap-Micro-5.2-2023-46,openSUSE-Leap-Micro-5.3-2023-46,openSUSE-SLE-15.4-2023-46 SKIP SUSE-RU-2023:0047-1 as openSUSE-SLE-15.4-2023-47 is not security or has no CVEs. patches: SUSE-2023-47,SUSE-SLE-Module-Basesystem-15-SP4-2023-47,openSUSE-SLE-15.4-2023-47 SKIP SUSE-RU-2023:0048-1 as openSUSE-SLE-15.4-2023-48 is not security or has no CVEs. patches: SUSE-2023-48,SUSE-SLE-Micro-5.3-2023-48,SUSE-SLE-Module-Basesystem-15-SP4-2023-48,SUSE-SLE-Product-RT-15-SP3-2023-48,SUSE-SUSE-MicroOS-5.1-2023-48,SUSE-SUSE-MicroOS-5.2-2023-48,openSUSE-Leap-Micro-5.2-2023-48,openSUSE-Leap-Micro-5.3-2023-48,openSUSE-SLE-15.4-2023-48 SKIP SUSE-RU-2023:0049-1 as openSUSE-SLE-15.4-2023-49 is not security or has no CVEs. patches: SUSE-2023-49,SUSE-SLE-Module-Basesystem-15-SP4-2023-49,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-49,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-49,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-49,SUSE-SLE-Product-RT-15-SP3-2023-49,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-49,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-49,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-49,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-49,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2023-49,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-49,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2023-49,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-49,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2023-49,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-49,SUSE-Storage-7-2023-49,SUSE-Storage-7.1-2023-49,openSUSE-SLE-15.3-2023-49,openSUSE-SLE-15.4-2023-49 SKIP SUSE-RU-2023:0050-1 as openSUSE-SLE-15.4-2023-50 is not security or has no CVEs. patches: SUSE-2023-50,SUSE-SLE-Micro-5.3-2023-50,SUSE-SLE-Module-Basesystem-15-SP4-2023-50,openSUSE-Leap-Micro-5.3-2023-50,openSUSE-SLE-15.4-2023-50 SKIP SUSE-RU-2023:0051-1 as openSUSE-SLE-15.4-2023-51 is not security or has no CVEs. patches: SUSE-2023-51,SUSE-SLE-Micro-5.3-2023-51,SUSE-SLE-Module-Basesystem-15-SP4-2023-51,openSUSE-Leap-Micro-5.3-2023-51,openSUSE-SLE-15.4-2023-51 SKIP SUSE-RU-2023:0052-1 as openSUSE-SLE-15.4-2023-52 is not security or has no CVEs. patches: SUSE-2023-52,SUSE-SLE-Micro-5.3-2023-52,SUSE-SLE-Module-Basesystem-15-SP4-2023-52,openSUSE-Leap-Micro-5.3-2023-52,openSUSE-SLE-15.4-2023-52 SKIP SUSE-RU-2023:0053-1 as SUSE-SLE-SAP-12-SP5-2023-53 is not security or has no CVEs. patches: SUSE-2023-53,SUSE-SLE-SAP-12-SP4-2023-53,SUSE-SLE-SAP-12-SP5-2023-53 SKIP SUSE-RU-2023:0054-1 as openSUSE-SLE-15.4-2023-54 is not security or has no CVEs. patches: SUSE-2023-54,SUSE-SLE-Micro-5.3-2023-54,SUSE-SLE-Module-Basesystem-15-SP4-2023-54,openSUSE-Leap-Micro-5.3-2023-54,openSUSE-SLE-15.4-2023-54 SKIP SUSE-RU-2023:0055-1 as openSUSE-SLE-15.4-2023-55 is not security or has no CVEs. patches: SUSE-2023-55,SUSE-SLE-Module-Web-Scripting-15-SP4-2023-55,openSUSE-SLE-15.4-2023-55 SKIP SUSE-RU-2023:0059-1 as openSUSE-SLE-15.4-2023-59 is not security or has no CVEs. patches: SUSE-2023-59,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-59,SUSE-SLE-Product-WE-15-SP4-2023-59,openSUSE-SLE-15.4-2023-59 SKIP SUSE-RU-2023:0062-1 as SUSE-Storage-7-2023-62 is not security or has no CVEs. patches: SUSE-2023-62,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-62,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-62,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-62,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2023-62,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2023-62,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2023-62,SUSE-Storage-7-2023-62 SKIP SUSE-RU-2023:0082-1 as openSUSE-SLE-15.4-2023-82 is not security or has no CVEs. patches: SUSE-2023-82,SUSE-SLE-Manager-Tools-For-Micro-5-2023-82,SUSE-SLE-Module-Basesystem-15-SP4-2023-82,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-82,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-82,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-82,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-82,SUSE-SLE-Product-RT-15-SP3-2023-82,SUSE-SLE-Product-SLES-15-SP1-BCL-2023-82,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-82,SUSE-SLE-Product-SLES-15-SP2-BCL-2023-82,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-82,SUSE-SLE-Product-SLES-15-SP3-BCL-2023-82,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-82,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-82,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-82,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-82,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2023-82,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-82,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2023-82,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-82,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2023-82,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-82,SUSE-Storage-6-2023-82,SUSE-Storage-7-2023-82,SUSE-Storage-7.1-2023-82,openSUSE-SLE-15.3-2023-82,openSUSE-SLE-15.4-2023-82 SKIP SUSE-RU-2023:0083-1 as openSUSE-SLE-15.4-2023-83 is not security or has no CVEs. patches: SUSE-2023-83,SUSE-SLE-Module-Basesystem-15-SP3-2023-83,SUSE-SLE-Module-Legacy-15-SP4-2023-83,SUSE-SLE-Module-Server-Applications-15-SP3-2023-83,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-83,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-83,SUSE-SLE-Product-RT-15-SP3-2023-83,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-83,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-83,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-83,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-83,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-83,SUSE-Storage-7.1-2023-83,openSUSE-SLE-15.4-2023-83 SKIP SUSE-RU-2023:0085-1 as SUSE-SLE-WE-12-SP5-2023-85 is not security or has no CVEs. patches: SUSE-2023-85,SUSE-SLE-SDK-12-SP5-2023-85,SUSE-SLE-SERVER-12-SP5-2023-85,SUSE-SLE-WE-12-SP5-2023-85 SKIP SUSE-RU-2023:0087-1 as openSUSE-SLE-15.4-2023-87 is not security or has no CVEs. patches: SUSE-2023-87,SUSE-SLE-Micro-5.3-2023-87,SUSE-SLE-Module-Basesystem-15-SP4-2023-87,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-87,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-87,SUSE-SLE-Product-RT-15-SP3-2023-87,openSUSE-Leap-Micro-5.3-2023-87,openSUSE-SLE-15.4-2023-87 SKIP SUSE-RU-2023:0097-1 as SUSE-SLE-Module-Basesystem-15-SP4-2023-97 is not security or has no CVEs. patches: SUSE-2023-97,SUSE-SLE-Module-Basesystem-15-SP4-2023-97 SKIP SUSE-RU-2023:0105-1 as SUSE-Storage-7.1-2023-105 is not security or has no CVEs. patches: SUSE-2023-105,SUSE-Storage-7.1-2023-105 SKIP SUSE-RU-2023:0107-1 as openSUSE-SLE-15.4-2023-107 is not security or has no CVEs. patches: SUSE-2023-107,SUSE-SLE-Module-Legacy-15-SP4-2023-107,SUSE-Storage-6-2023-107,openSUSE-SLE-15.4-2023-107 SKIP SUSE-RU-2023:0125-1 as openSUSE-Leap-Micro-5.3-2023-125 is not security or has no CVEs. patches: SUSE-2023-125,SUSE-SLE-Micro-5.3-2023-125,openSUSE-Leap-Micro-5.3-2023-125 SKIP SUSE-RU-2023:0128-1 as SUSE-SUSE-MicroOS-5.2-2023-128 is not security or has no CVEs. patches: SUSE-2023-128,SUSE-SUSE-MicroOS-5.2-2023-128 SKIP SUSE-RU-2023:0129-1 as SUSE-SUSE-MicroOS-5.1-2023-129 is not security or has no CVEs. patches: SUSE-2023-129,SUSE-SUSE-MicroOS-5.1-2023-129 SKIP SUSE-RU-2023:0131-1 as SUSE-SLE-Micro-5.3-2023-131 is not security or has no CVEs. patches: SUSE-2023-131,SUSE-SLE-Micro-5.3-2023-131 SKIP SUSE-RU-2023:0137-1 as SUSE-Storage-6-2023-137 is not security or has no CVEs. patches: SUSE-2023-137,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-137,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-137,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-137,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-137,SUSE-Storage-6-2023-137 SKIP SUSE-RU-2023:0141-1 as SUSE-SLE-Product-HA-15-SP3-2023-141 is not security or has no CVEs. patches: SUSE-2023-141,SUSE-SLE-Product-HA-15-SP3-2023-141 SKIP SUSE-RU-2023:0143-1 as openSUSE-SLE-15.4-2023-143 is not security or has no CVEs. patches: SUSE-2023-143,SUSE-SLE-Module-Basesystem-15-SP4-2023-143,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-143,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-143,SUSE-SLE-Product-RT-15-SP3-2023-143,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-143,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-143,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-143,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-143,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-143,SUSE-Storage-7.1-2023-143,openSUSE-SLE-15.4-2023-143 SKIP SUSE-RU-2023:0144-1 as openSUSE-SLE-15.4-2023-144 is not security or has no CVEs. patches: SUSE-2023-144,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-144,SUSE-SLE-Product-WE-15-SP4-2023-144,openSUSE-SLE-15.4-2023-144 SKIP SUSE-RU-2023:0157-1 as openSUSE-Leap-Micro-5.2-2023-157 is not security or has no CVEs. patches: SUSE-2023-157,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-157,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-157,SUSE-SLE-Product-RT-15-SP3-2023-157,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-157,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-157,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-157,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-157,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-157,SUSE-SUSE-MicroOS-5.1-2023-157,SUSE-SUSE-MicroOS-5.2-2023-157,SUSE-Storage-7.1-2023-157,openSUSE-Leap-Micro-5.2-2023-157 SKIP SUSE-RU-2023:0158-1 as openSUSE-SLE-15.4-2023-158 is not security or has no CVEs. patches: SUSE-2023-158,SUSE-SLE-Module-Basesystem-15-SP4-2023-158,openSUSE-SLE-15.4-2023-158 SKIP SUSE-RU-2023:0175-1 as openSUSE-SLE-15.4-2023-175 is not security or has no CVEs. patches: SUSE-2023-175,SUSE-SLE-Module-Basesystem-15-SP4-2023-175,openSUSE-SLE-15.4-2023-175 SKIP SUSE-RU-2023:0176-1 as openSUSE-Leap-Micro-5.2-2023-176 is not security or has no CVEs. patches: SUSE-2023-176,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-176,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-176,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-176,SUSE-SLE-Product-RT-15-SP3-2023-176,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-176,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-176,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-176,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-176,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-176,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-176,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-176,SUSE-SUSE-MicroOS-5.1-2023-176,SUSE-SUSE-MicroOS-5.2-2023-176,SUSE-Storage-7-2023-176,SUSE-Storage-7.1-2023-176,openSUSE-Leap-Micro-5.2-2023-176 SKIP SUSE-RU-2023:0177-1 as openSUSE-SLE-15.4-2023-177 is not security or has no CVEs. patches: SUSE-2023-177,SUSE-SLE-Micro-5.3-2023-177,SUSE-SLE-Module-Basesystem-15-SP4-2023-177,SUSE-SLE-Module-Server-Applications-15-SP4-2023-177,openSUSE-Leap-Micro-5.3-2023-177,openSUSE-SLE-15.4-2023-177 SKIP SUSE-RU-2023:0178-1 as openSUSE-SLE-15.4-2023-178 is not security or has no CVEs. patches: SUSE-2023-178,SUSE-SLE-Micro-5.3-2023-178,SUSE-SLE-Module-Basesystem-15-SP4-2023-178,openSUSE-Leap-Micro-5.3-2023-178,openSUSE-SLE-15.4-2023-178 SKIP SUSE-RU-2023:0179-1 as openSUSE-SLE-15.4-2023-179 is not security or has no CVEs. patches: SUSE-2023-179,SUSE-SLE-Micro-5.3-2023-179,SUSE-SLE-Module-Basesystem-15-SP4-2023-179,SUSE-SLE-Product-RT-15-SP3-2023-179,SUSE-SUSE-MicroOS-5.1-2023-179,SUSE-SUSE-MicroOS-5.2-2023-179,openSUSE-Leap-Micro-5.2-2023-179,openSUSE-Leap-Micro-5.3-2023-179,openSUSE-SLE-15.4-2023-179 SKIP SUSE-RU-2023:0180-1 as SUSE-SLE-SERVER-12-SP5-2023-180 is not security or has no CVEs. patches: SUSE-2023-180,SUSE-SLE-SERVER-12-SP5-2023-180 SKIP SUSE-RU-2023:0181-1 as openSUSE-SLE-15.4-2023-181 is not security or has no CVEs. patches: SUSE-2023-181,SUSE-SLE-Micro-5.3-2023-181,SUSE-SLE-Module-Basesystem-15-SP4-2023-181,SUSE-SLE-Product-RT-15-SP3-2023-181,SUSE-SUSE-MicroOS-5.1-2023-181,SUSE-SUSE-MicroOS-5.2-2023-181,openSUSE-Leap-Micro-5.2-2023-181,openSUSE-Leap-Micro-5.3-2023-181,openSUSE-SLE-15.4-2023-181 SKIP SUSE-RU-2023:0182-1 as openSUSE-SLE-15.4-2023-182 is not security or has no CVEs. patches: SUSE-2023-182,SUSE-SLE-Product-HA-15-SP3-2023-182,SUSE-SLE-Product-HA-15-SP4-2023-182,openSUSE-SLE-15.4-2023-182 SKIP SUSE-RU-2023:0188-1 as openSUSE-SLE-15.4-2023-188 is not security or has no CVEs. patches: SUSE-2023-188,SUSE-SLE-Micro-5.3-2023-188,SUSE-SLE-Module-Basesystem-15-SP4-2023-188,SUSE-SLE-Module-Development-Tools-15-SP4-2023-188,SUSE-SLE-Product-RT-15-SP3-2023-188,SUSE-SUSE-MicroOS-5.1-2023-188,SUSE-SUSE-MicroOS-5.2-2023-188,openSUSE-Leap-Micro-5.2-2023-188,openSUSE-Leap-Micro-5.3-2023-188,openSUSE-SLE-15.4-2023-188 SKIP SUSE-RU-2023:0189-1 as SUSE-SLE-SERVER-12-SP5-2023-189 is not security or has no CVEs. patches: SUSE-2023-189,SUSE-SLE-SDK-12-SP5-2023-189,SUSE-SLE-SERVER-12-SP5-2023-189 SKIP SUSE-RU-2023:0190-1 as openSUSE-SLE-15.4-2023-190 is not security or has no CVEs. patches: SUSE-2023-190,SUSE-SLE-Module-Basesystem-15-SP4-2023-190,SUSE-SLE-Product-RT-15-SP3-2023-190,openSUSE-SLE-15.4-2023-190 SKIP SUSE-RU-2023:0191-1 as SUSE-SLE-SERVER-12-SP2-BCL-2023-191 is not security or has no CVEs. patches: SUSE-2023-191,SUSE-SLE-SERVER-12-SP2-BCL-2023-191 SKIP SUSE-RU-2023:0192-1 as SUSE-Storage-6-2023-192 is not security or has no CVEs. patches: SUSE-2023-192,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-192,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-192,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-192,SUSE-Storage-6-2023-192 SKIP SUSE-RU-2023:0193-1 as SUSE-SLE-SERVER-12-SP5-2023-193 is not security or has no CVEs. patches: SUSE-2023-193,SUSE-OpenStack-Cloud-9-2023-193,SUSE-OpenStack-Cloud-Crowbar-9-2023-193,SUSE-SLE-SAP-12-SP4-2023-193,SUSE-SLE-SERVER-12-SP4-LTSS-2023-193,SUSE-SLE-SERVER-12-SP5-2023-193 SKIP SUSE-RU-2023:0196-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2023-196 is not security or has no CVEs. patches: SUSE-2023-196,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-196 SKIP SUSE-RU-2023:0197-1 as openSUSE-SLE-15.4-2023-197 is not security or has no CVEs. patches: SUSE-2023-197,SUSE-SLE-INSTALLER-15-SP4-2023-197,SUSE-SLE-Product-SLES-15-SP4-2023-197,openSUSE-SLE-15.4-2023-197 SKIP SUSE-RU-2023:0208-1 as SUSE-SLE-SERVER-12-SP5-2023-208 is not security or has no CVEs. patches: SUSE-2023-208,SUSE-SLE-SDK-12-SP5-2023-208,SUSE-SLE-SERVER-12-SP5-2023-208 SKIP SUSE-RU-2023:0218-1 as openSUSE-SLE-15.4-2023-218 is not security or has no CVEs. patches: SUSE-2023-218,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-218,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-218,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-218,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-218,openSUSE-SLE-15.4-2023-218 SKIP SUSE-RU-2023:0219-1 as SUSE-SLE-SAP-12-SP5-2023-219 is not security or has no CVEs. patches: SUSE-2023-219,SUSE-SLE-SAP-12-SP4-2023-219,SUSE-SLE-SAP-12-SP5-2023-219 SKIP SUSE-RU-2023:0290-1 as openSUSE-SLE-15.4-2023-290 is not security or has no CVEs. patches: SUSE-2023-290,SUSE-SLE-Module-Development-Tools-15-SP4-2023-290,openSUSE-SLE-15.4-2023-290 SKIP SUSE-RU-2023:0296-1 as SUSE-SLE-Product-SLES_SAP-15-SP3-2023-296 is not security or has no CVEs. patches: SUSE-2023-296,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-296 SKIP SUSE-RU-2023:0297-1 as openSUSE-SLE-15.4-2023-297 is not security or has no CVEs. patches: SUSE-2023-297,SUSE-SLE-Module-Basesystem-15-SP4-2023-297,openSUSE-SLE-15.4-2023-297 SKIP SUSE-RU-2023:0298-1 as SUSE-SLE-SERVER-12-SP5-2023-298 is not security or has no CVEs. patches: SUSE-2023-298,SUSE-OpenStack-Cloud-9-2023-298,SUSE-OpenStack-Cloud-Crowbar-9-2023-298,SUSE-SLE-SAP-12-SP4-2023-298,SUSE-SLE-SDK-12-SP5-2023-298,SUSE-SLE-SERVER-12-SP2-BCL-2023-298,SUSE-SLE-SERVER-12-SP4-LTSS-2023-298,SUSE-SLE-SERVER-12-SP5-2023-298 SKIP SUSE-RU-2023:0299-1 as openSUSE-SLE-15.4-2023-299 is not security or has no CVEs. patches: SUSE-2023-299,openSUSE-SLE-15.4-2023-299 SKIP SUSE-RU-2023:0302-1 as openSUSE-SLE-15.4-2023-302 is not security or has no CVEs. patches: SUSE-2023-302,SUSE-SLE-Module-Live-Patching-15-SP4-2023-302,openSUSE-SLE-15.4-2023-302 SKIP SUSE-RU-2023:0303-1 as openSUSE-SLE-15.4-2023-303 is not security or has no CVEs. patches: SUSE-2023-303,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-303,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-303,openSUSE-SLE-15.4-2023-303 SKIP SUSE-RU-2023:0330-1 as openSUSE-SLE-15.4-2023-330 is not security or has no CVEs. patches: SUSE-2023-330,SUSE-SLE-Module-Basesystem-15-SP4-2023-330,openSUSE-SLE-15.4-2023-330 SKIP SUSE-RU-2023:0332-1 as openSUSE-SLE-15.4-2023-332 is not security or has no CVEs. patches: SUSE-2023-332,openSUSE-SLE-15.4-2023-332 SKIP SUSE-RU-2023:0333-1 as openSUSE-SLE-15.4-2023-333 is not security or has no CVEs. patches: SUSE-2023-333,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-333,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-333,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-333,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-333,openSUSE-SLE-15.4-2023-333 SKIP SUSE-RU-2023:0334-1 as openSUSE-SLE-15.4-2023-334 is not security or has no CVEs. patches: SUSE-2023-334,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-334,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-334,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-334,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-334,openSUSE-SLE-15.4-2023-334 SKIP SUSE-RU-2023:0335-1 as openSUSE-SLE-15.4-2023-335 is not security or has no CVEs. patches: SUSE-2023-335,SUSE-SLE-Micro-5.3-2023-335,SUSE-SLE-Module-Basesystem-15-SP4-2023-335,SUSE-SLE-Product-RT-15-SP3-2023-335,SUSE-SUSE-MicroOS-5.1-2023-335,SUSE-SUSE-MicroOS-5.2-2023-335,openSUSE-Leap-Micro-5.2-2023-335,openSUSE-Leap-Micro-5.3-2023-335,openSUSE-SLE-15.4-2023-335 SKIP SUSE-RU-2023:0335-2 as openSUSE-SLE-15.5-2023-335 is not security or has no CVEs. patches: SUSE-2023-335,SUSE-SLE-Micro-5.3-2023-335,SUSE-SLE-Micro-5.4-2023-335,SUSE-SLE-Module-Basesystem-15-SP4-2023-335,SUSE-SLE-Module-Basesystem-15-SP5-2023-335,SUSE-SLE-Product-RT-15-SP3-2023-335,SUSE-SUSE-MicroOS-5.1-2023-335,SUSE-SUSE-MicroOS-5.2-2023-335,openSUSE-Leap-Micro-5.3-2023-335,openSUSE-Leap-Micro-5.4-2023-335,openSUSE-SLE-15.4-2023-335,openSUSE-SLE-15.5-2023-335 SKIP SUSE-RU-2023:0345-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-345 is not security or has no CVEs. patches: SUSE-2023-345,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-345 SKIP SUSE-RU-2023:0346-1 as openSUSE-SLE-15.4-2023-346 is not security or has no CVEs. patches: SUSE-2023-346,SUSE-SLE-Micro-5.3-2023-346,SUSE-SLE-Module-Basesystem-15-SP4-2023-346,SUSE-SLE-Module-Server-Applications-15-SP4-2023-346,SUSE-SLE-Module-Transactional-Server-15-SP4-2023-346,openSUSE-Leap-Micro-5.3-2023-346,openSUSE-SLE-15.4-2023-346 SKIP SUSE-RU-2023:0347-1 as openSUSE-Leap-Micro-5.2-2023-347 is not security or has no CVEs. patches: SUSE-2023-347,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-347,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-347,SUSE-SLE-Product-RT-15-SP3-2023-347,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-347,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-347,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-347,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-347,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-347,SUSE-SUSE-MicroOS-5.1-2023-347,SUSE-SUSE-MicroOS-5.2-2023-347,SUSE-Storage-7.1-2023-347,openSUSE-Leap-Micro-5.2-2023-347 SKIP SUSE-RU-2023:0349-1 as openSUSE-SLE-15.4-2023-349 is not security or has no CVEs. patches: SUSE-2023-349,SUSE-SLE-Micro-5.3-2023-349,SUSE-SLE-Module-Basesystem-15-SP4-2023-349,openSUSE-Leap-Micro-5.3-2023-349,openSUSE-SLE-15.4-2023-349 SKIP SUSE-RU-2023:0350-1 as SUSE-Storage-7-2023-350 is not security or has no CVEs. patches: SUSE-2023-350,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-350,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-350,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-350,SUSE-Storage-7-2023-350 SKIP SUSE-RU-2023:0351-1 as SUSE-Storage-6-2023-351 is not security or has no CVEs. patches: SUSE-2023-351,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-351,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-351,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-351,SUSE-Storage-6-2023-351 ERROR: notice SUSE-RU-2023:0357-1 has no valid patches out of: SUSE-2023-357,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-357 ERROR: notice SUSE-RU-2023:0358-1 has no valid patches out of: SUSE-2023-358,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-358 SKIP SUSE-RU-2023:0361-1 as SUSE-EL-9-CLIENT-TOOLS-2023-361 is not security or has no CVEs. patches: SUSE-2023-361,SUSE-EL-9-CLIENT-TOOLS-2023-361 SKIP SUSE-RU-2023:0363-1 as SUSE-SLE-Manager-Tools-12-2023-363 is not security or has no CVEs. patches: SUSE-2023-363,SUSE-SLE-Manager-Tools-12-2023-363 SKIP SUSE-RU-2023:0364-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-364 is not security or has no CVEs. patches: SUSE-2023-364,SUSE-SLE-Manager-Tools-15-2023-364,SUSE-SLE-Manager-Tools-For-Micro-5-2023-364,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-364,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-364 ERROR: notice SUSE-RU-2023:0368-1 has no valid patches out of: SUSE-2023-368,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-368 ERROR: notice SUSE-RU-2023:0369-1 has no valid patches out of: SUSE-2023-369,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-369 SKIP SUSE-RU-2023:0372-1 as SUSE-EL-9-CLIENT-TOOLS-2023-372 is not security or has no CVEs. patches: SUSE-2023-372,SUSE-EL-9-CLIENT-TOOLS-2023-372 SKIP SUSE-RU-2023:0373-1 as SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2023-373 is not security or has no CVEs. patches: SUSE-2023-373,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-373,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2023-373 SKIP SUSE-RU-2023:0376-1 as openSUSE-SLE-15.4-2023-376 is not security or has no CVEs. patches: SUSE-2023-376,SUSE-SLE-Product-HA-15-SP4-2023-376,openSUSE-SLE-15.4-2023-376 SKIP SUSE-RU-2023:0377-1 as SUSE-SLE-Product-HA-15-SP3-2023-377 is not security or has no CVEs. patches: SUSE-2023-377,SUSE-SLE-Product-HA-15-SP3-2023-377 SKIP SUSE-RU-2023:0378-1 as SUSE-SLE-Product-HA-15-SP2-2023-378 is not security or has no CVEs. patches: SUSE-2023-378,SUSE-SLE-Product-HA-15-SP2-2023-378 SKIP SUSE-RU-2023:0379-1 as SUSE-SLE-Product-HA-15-SP1-2023-379 is not security or has no CVEs. patches: SUSE-2023-379,SUSE-SLE-Product-HA-15-SP1-2023-379 SKIP SUSE-RU-2023:0380-1 as SUSE-SLE-HA-12-SP4-2023-380 is not security or has no CVEs. patches: SUSE-2023-380,SUSE-SLE-HA-12-SP4-2023-380 SKIP SUSE-RU-2023:0381-1 as SUSE-SLE-SDK-12-SP5-2023-381 is not security or has no CVEs. patches: SUSE-2023-381,SUSE-SLE-HA-12-SP5-2023-381,SUSE-SLE-SDK-12-SP5-2023-381 SKIP SUSE-RU-2023:0382-1 as SUSE-SLE-HA-12-SP5-2023-382 is not security or has no CVEs. patches: SUSE-2023-382,SUSE-SLE-HA-12-SP4-2023-382,SUSE-SLE-HA-12-SP5-2023-382 SKIP SUSE-RU-2023:0383-1 as SUSE-SLE-Product-HA-15-SP3-2023-383 is not security or has no CVEs. patches: SUSE-2023-383,SUSE-SLE-Product-HA-15-SP2-2023-383,SUSE-SLE-Product-HA-15-SP3-2023-383 SKIP SUSE-RU-2023:0384-1 as openSUSE-SLE-15.4-2023-384 is not security or has no CVEs. patches: SUSE-2023-384,SUSE-SLE-Micro-5.3-2023-384,SUSE-SLE-Module-Basesystem-15-SP4-2023-384,openSUSE-Leap-Micro-5.3-2023-384,openSUSE-SLE-15.4-2023-384 SKIP SUSE-RU-2023:0385-1 as openSUSE-Leap-Micro-5.2-2023-385 is not security or has no CVEs. patches: SUSE-2023-385,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-385,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-385,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-385,SUSE-SLE-Product-RT-15-SP3-2023-385,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-385,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-385,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-385,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-385,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-385,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-385,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-385,SUSE-SUSE-MicroOS-5.1-2023-385,SUSE-SUSE-MicroOS-5.2-2023-385,SUSE-Storage-7-2023-385,SUSE-Storage-7.1-2023-385,openSUSE-Leap-Micro-5.2-2023-385 SKIP SUSE-RU-2023:0386-1 as openSUSE-SLE-15.4-2023-386 is not security or has no CVEs. patches: SUSE-2023-386,SUSE-SLE-Product-WE-15-SP4-2023-386,openSUSE-SLE-15.4-2023-386 SKIP SUSE-RU-2023:0388-1 as openSUSE-SLE-15.4-2023-388 is not security or has no CVEs. patches: SUSE-2023-388,SUSE-SLE-Product-HA-15-SP4-2023-388,openSUSE-SLE-15.4-2023-388 SKIP SUSE-RU-2023:0414-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-414 is not security or has no CVEs. patches: SUSE-2023-414,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-414,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-414,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-414 SKIP SUSE-RU-2023:0415-1 as openSUSE-SLE-15.4-2023-415 is not security or has no CVEs. patches: SUSE-2023-415,SUSE-SLE-Module-Basesystem-15-SP4-2023-415,openSUSE-SLE-15.4-2023-415 SKIP SUSE-RU-2023:0432-1 as openSUSE-SLE-15.4-2023-432 is not security or has no CVEs. patches: SUSE-2023-432,SUSE-SLE-Micro-5.3-2023-432,SUSE-SLE-Module-Basesystem-15-SP4-2023-432,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-432,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-432,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-432,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-432,SUSE-SLE-Product-RT-15-SP3-2023-432,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-432,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-432,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-432,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-432,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-432,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-432,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-432,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-432,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-432,SUSE-SUSE-MicroOS-5.2-2023-432,SUSE-Storage-7-2023-432,SUSE-Storage-7.1-2023-432,openSUSE-Leap-Micro-5.2-2023-432,openSUSE-Leap-Micro-5.3-2023-432,openSUSE-SLE-15.4-2023-432 SKIP SUSE-RU-2023:0439-1 as openSUSE-SLE-15.4-2023-439 is not security or has no CVEs. patches: SUSE-2023-439,SUSE-SLE-Micro-5.3-2023-439,SUSE-SLE-Module-Basesystem-15-SP4-2023-439,openSUSE-Leap-Micro-5.3-2023-439,openSUSE-SLE-15.4-2023-439 SKIP SUSE-RU-2023:0440-1 as openSUSE-SLE-15.4-2023-440 is not security or has no CVEs. patches: SUSE-2023-440,openSUSE-SLE-15.4-2023-440 SKIP SUSE-RU-2023:0445-1 as SUSE-SLE-SERVER-12-SP5-2023-445 is not security or has no CVEs. patches: SUSE-2023-445,SUSE-SLE-SERVER-12-SP5-2023-445 SKIP SUSE-RU-2023:0446-1 as SUSE-Storage-7-2023-446 is not security or has no CVEs. patches: SUSE-2023-446,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-446,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-446,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-446,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-446,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-446,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-446,SUSE-Storage-6-2023-446,SUSE-Storage-7-2023-446 SKIP SUSE-RU-2023:0449-1 as openSUSE-SLE-15.4-2023-449 is not security or has no CVEs. patches: SUSE-2023-449,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-449,openSUSE-SLE-15.4-2023-449 SKIP SUSE-RU-2023:0452-1 as openSUSE-SLE-15.4-2023-452 is not security or has no CVEs. patches: SUSE-2023-452,SUSE-SLE-Module-Development-Tools-15-SP4-2023-452,SUSE-SLE-Product-RT-15-SP3-2023-452,openSUSE-SLE-15.4-2023-452 SKIP SUSE-RU-2023:0457-1 as openSUSE-SLE-15.4-2023-457 is not security or has no CVEs. patches: SUSE-2023-457,SUSE-SLE-Manager-Tools-For-Micro-5-2023-457,SUSE-SLE-Module-Basesystem-15-SP4-2023-457,SUSE-SLE-Product-RT-15-SP3-2023-457,openSUSE-SLE-15.4-2023-457 SKIP SUSE-RU-2023:0464-1 as openSUSE-SLE-15.4-2023-464 is not security or has no CVEs. patches: SUSE-2023-464,SUSE-SLE-Micro-5.3-2023-464,SUSE-SLE-Module-Basesystem-15-SP4-2023-464,openSUSE-Leap-Micro-5.3-2023-464,openSUSE-SLE-15.4-2023-464 SKIP SUSE-RU-2023:0473-1 as openSUSE-SLE-15.4-2023-473 is not security or has no CVEs. patches: SUSE-2023-473,SUSE-SLE-Module-Server-Applications-15-SP4-2023-473,openSUSE-SLE-15.4-2023-473 SKIP SUSE-RU-2023:0474-1 as openSUSE-SLE-15.4-2023-474 is not security or has no CVEs. patches: SUSE-2023-474,SUSE-SLE-Module-HPC-15-SP3-2023-474,SUSE-SLE-Module-HPC-15-SP4-2023-474,openSUSE-SLE-15.4-2023-474 SKIP SUSE-RU-2023:0477-1 as openSUSE-SLE-15.4-2023-477 is not security or has no CVEs. patches: SUSE-2023-477,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-477,openSUSE-SLE-15.4-2023-477 SKIP SUSE-RU-2023:0478-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2023-478 is not security or has no CVEs. patches: SUSE-2023-478,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-478 SKIP SUSE-RU-2023:0481-1 as SUSE-SLE-Module-SAP-Applications-15-SP2-2023-481 is not security or has no CVEs. patches: SUSE-2023-481,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-481,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-481 SKIP SUSE-RU-2023:0483-1 as SUSE-SLE-SERVER-12-SP5-2023-483 is not security or has no CVEs. patches: SUSE-2023-483,SUSE-SLE-SERVER-12-SP5-2023-483 SKIP SUSE-RU-2023:0491-1 as openSUSE-SLE-15.4-2023-491 is not security or has no CVEs. patches: SUSE-2023-491,SUSE-SLE-INSTALLER-15-SP4-2023-491,SUSE-SLE-Module-Basesystem-15-SP4-2023-491,openSUSE-SLE-15.4-2023-491 SKIP SUSE-RU-2023:0498-1 as openSUSE-SLE-15.4-2023-498 is not security or has no CVEs. patches: SUSE-2023-498,SUSE-SLE-Product-HA-15-SP1-2023-498,SUSE-SLE-Product-HA-15-SP2-2023-498,SUSE-SLE-Product-HA-15-SP3-2023-498,SUSE-SLE-Product-HA-15-SP4-2023-498,openSUSE-SLE-15.4-2023-498 SKIP SUSE-RU-2023:0499-1 as SUSE-SLE-SAP-12-SP5-2023-499 is not security or has no CVEs. patches: SUSE-2023-499,SUSE-SLE-SAP-12-SP4-2023-499,SUSE-SLE-SAP-12-SP5-2023-499 SKIP SUSE-RU-2023:0500-1 as openSUSE-SLE-15.4-2023-500 is not security or has no CVEs. patches: SUSE-2023-500,SUSE-SLE-Product-HA-15-SP4-2023-500,openSUSE-SLE-15.4-2023-500 SKIP SUSE-RU-2023:0501-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2023-501 is not security or has no CVEs. patches: SUSE-2023-501,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-501 SKIP SUSE-RU-2023:0502-1 as SUSE-SLE-HA-12-SP5-2023-502 is not security or has no CVEs. patches: SUSE-2023-502,SUSE-SLE-HA-12-SP4-2023-502,SUSE-SLE-HA-12-SP5-2023-502 SKIP SUSE-RU-2023:0503-1 as SUSE-SLE-Product-HA-15-SP3-2023-503 is not security or has no CVEs. patches: SUSE-2023-503,SUSE-SLE-Product-HA-15-SP3-2023-503 SKIP SUSE-RU-2023:0504-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-504 is not security or has no CVEs. patches: SUSE-2023-504,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-504,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-504,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-504 SKIP SUSE-RU-2023:0505-1 as SUSE-Storage-7-2023-505 is not security or has no CVEs. patches: SUSE-2023-505,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-505,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-505,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-505,SUSE-Storage-7-2023-505 SKIP SUSE-RU-2023:0506-1 as SUSE-SLE-SERVER-12-SP5-2023-506 is not security or has no CVEs. patches: SUSE-2023-506,SUSE-OpenStack-Cloud-9-2023-506,SUSE-OpenStack-Cloud-Crowbar-9-2023-506,SUSE-SLE-SAP-12-SP4-2023-506,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-506,SUSE-SLE-SERVER-12-SP4-LTSS-2023-506,SUSE-SLE-SERVER-12-SP5-2023-506 SKIP SUSE-RU-2023:0507-1 as openSUSE-SLE-15.4-2023-507 is not security or has no CVEs. patches: SUSE-2023-507,SUSE-SLE-Module-Basesystem-15-SP4-2023-507,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-507,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-507,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-507,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-507,SUSE-SLE-Product-RT-15-SP3-2023-507,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-507,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-507,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-507,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-507,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-507,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-507,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-507,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-507,SUSE-Storage-6-2023-507,SUSE-Storage-7-2023-507,SUSE-Storage-7.1-2023-507,openSUSE-SLE-15.4-2023-507 SKIP SUSE-RU-2023:0508-1 as SUSE-SLE-Product-HA-15-SP2-2023-508 is not security or has no CVEs. patches: SUSE-2023-508,SUSE-SLE-Product-HA-15-SP2-2023-508 SKIP SUSE-RU-2023:0517-1 as openSUSE-SLE-15.4-2023-517 is not security or has no CVEs. patches: SUSE-2023-517,SUSE-SLE-Module-Server-Applications-15-SP4-2023-517,openSUSE-SLE-15.4-2023-517 SKIP SUSE-RU-2023:0558-1 as SUSE-Storage-7.1-2023-558 is not security or has no CVEs. patches: SUSE-2023-558,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-558,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-558,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-558,SUSE-SLE-Product-RT-15-SP3-2023-558,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-558,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-558,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-558,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-558,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-558,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-558,SUSE-Storage-7-2023-558,SUSE-Storage-7.1-2023-558 SKIP SUSE-RU-2023:0563-1 as openSUSE-SLE-15.4-2023-563 is not security or has no CVEs. patches: SUSE-2023-563,SUSE-SLE-Micro-5.3-2023-563,SUSE-SLE-Module-Basesystem-15-SP4-2023-563,openSUSE-Leap-Micro-5.3-2023-563,openSUSE-SLE-15.4-2023-563 SKIP SUSE-RU-2023:0577-1 as openSUSE-SLE-15.4-2023-577 is not security or has no CVEs. patches: SUSE-2023-577,SUSE-SLE-Product-HA-15-SP4-2023-577,openSUSE-SLE-15.4-2023-577 SKIP SUSE-RU-2023:0580-1 as SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-580 is not security or has no CVEs. patches: SUSE-2023-580,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-580 SKIP SUSE-RU-2023:0585-1 as openSUSE-SLE-15.4-2023-585 is not security or has no CVEs. patches: SUSE-2023-585,SUSE-SLE-Module-Server-Applications-15-SP4-2023-585,openSUSE-SLE-15.4-2023-585 SKIP SUSE-RU-2023:0588-1 as openSUSE-SLE-15.4-2023-588 is not security or has no CVEs. patches: SUSE-2023-588,SUSE-SLE-Micro-5.3-2023-588,SUSE-SLE-Module-Basesystem-15-SP4-2023-588,openSUSE-Leap-Micro-5.3-2023-588,openSUSE-SLE-15.4-2023-588 SKIP SUSE-RU-2023:0590-1 as SUSE-SLE-SERVER-12-SP2-BCL-2023-590 is not security or has no CVEs. patches: SUSE-2023-590,SUSE-SLE-SERVER-12-SP2-BCL-2023-590 SKIP SUSE-RU-2023:0594-1 as openSUSE-SLE-15.4-2023-594 is not security or has no CVEs. patches: SUSE-2023-594,SUSE-SLE-Micro-5.3-2023-594,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-594,SUSE-SLE-Product-HA-15-SP4-2023-594,openSUSE-Leap-Micro-5.3-2023-594,openSUSE-SLE-15.4-2023-594 SKIP SUSE-RU-2023:0596-1 as SUSE-SLE-SERVER-12-SP2-BCL-2023-596 is not security or has no CVEs. patches: SUSE-2023-596,SUSE-SLE-SERVER-12-SP2-BCL-2023-596 SKIP SUSE-RU-2023:0605-1 as openSUSE-SLE-15.4-2023-605 is not security or has no CVEs. patches: SUSE-2023-605,SUSE-SLE-Module-Server-Applications-15-SP4-2023-605,openSUSE-SLE-15.4-2023-605 SKIP SUSE-RU-2023:0614-1 as openSUSE-SLE-15.4-2023-614 is not security or has no CVEs. patches: SUSE-2023-614,SUSE-SLE-Module-Basesystem-15-SP4-2023-614,SUSE-SLE-Module-Server-Applications-15-SP4-2023-614,openSUSE-SLE-15.4-2023-614 SKIP SUSE-RU-2023:0615-1 as openSUSE-SLE-15.4-2023-615 is not security or has no CVEs. patches: SUSE-2023-615,SUSE-SLE-Module-HPC-15-SP4-2023-615,openSUSE-SLE-15.4-2023-615 SKIP SUSE-RU-2023:0617-1 as openSUSE-SLE-15.4-2023-617 is not security or has no CVEs. patches: SUSE-2023-617,SUSE-SLE-Micro-5.3-2023-617,SUSE-SLE-Module-Basesystem-15-SP4-2023-617,openSUSE-Leap-Micro-5.3-2023-617,openSUSE-SLE-15.4-2023-617 SKIP SUSE-RU-2023:0619-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2023-619 is not security or has no CVEs. patches: SUSE-2023-619,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-619 SKIP SUSE-RU-2023:0621-1 as SUSE-SLE-SERVER-12-SP5-2023-621 is not security or has no CVEs. patches: SUSE-2023-621,SUSE-SLE-SDK-12-SP5-2023-621,SUSE-SLE-SERVER-12-SP5-2023-621 SKIP SUSE-RU-2023:0622-1 as openSUSE-SLE-15.4-2023-622 is not security or has no CVEs. patches: SUSE-2023-622,SUSE-SLE-Micro-5.3-2023-622,SUSE-SLE-Module-Basesystem-15-SP4-2023-622,SUSE-SLE-Product-RT-15-SP3-2023-622,openSUSE-Leap-Micro-5.3-2023-622,openSUSE-SLE-15.4-2023-622 SKIP SUSE-RU-2023:0622-2 as SUSE-SLE-Micro-5.4-2023-622 is not security or has no CVEs. patches: SUSE-2023-622,SUSE-SLE-Micro-5.4-2023-622 SKIP SUSE-RU-2023:0623-1 as openSUSE-SLE-15.4-2023-623 is not security or has no CVEs. patches: SUSE-2023-623,SUSE-SLE-Module-Basesystem-15-SP4-2023-623,openSUSE-SLE-15.4-2023-623 SKIP SUSE-RU-2023:0624-1 as SUSE-SLE-Live-Patching-12-SP5-2023-624 is not security or has no CVEs. patches: SUSE-2023-624,SUSE-SLE-Live-Patching-12-2023-624,SUSE-SLE-Live-Patching-12-SP4-2023-624,SUSE-SLE-Live-Patching-12-SP5-2023-624 SKIP SUSE-RU-2023:0625-1 as openSUSE-SLE-15.4-2023-625 is not security or has no CVEs. patches: SUSE-2023-625,SUSE-SLE-Module-Development-Tools-15-SP4-2023-625,openSUSE-SLE-15.4-2023-625 SKIP SUSE-RU-2023:0626-1 as openSUSE-SLE-15.4-2023-626 is not security or has no CVEs. patches: SUSE-2023-626,SUSE-SLE-Micro-5.3-2023-626,SUSE-SLE-Module-Basesystem-15-SP4-2023-626,openSUSE-Leap-Micro-5.3-2023-626,openSUSE-SLE-15.4-2023-626 SKIP SUSE-RU-2023:0627-1 as SUSE-SLE-SERVER-12-SP5-2023-627 is not security or has no CVEs. patches: SUSE-2023-627,SUSE-SLE-HA-12-SP5-2023-627,SUSE-SLE-SDK-12-SP5-2023-627,SUSE-SLE-SERVER-12-SP5-2023-627 SKIP SUSE-RU-2023:0630-1 as openSUSE-SLE-15.4-2023-630 is not security or has no CVEs. patches: SUSE-2023-630,SUSE-SLE-Module-Development-Tools-15-SP4-2023-630,openSUSE-SLE-15.4-2023-630 SKIP SUSE-RU-2023:0632-1 as openSUSE-SLE-15.4-2023-632 is not security or has no CVEs. patches: SUSE-2023-632,SUSE-SLE-Module-Basesystem-15-SP4-2023-632,openSUSE-SLE-15.4-2023-632 SKIP SUSE-RU-2023:0633-1 as openSUSE-SLE-15.4-2023-633 is not security or has no CVEs. patches: SUSE-2023-633,SUSE-SLE-Module-Server-Applications-15-SP4-2023-633,openSUSE-SLE-15.4-2023-633 SKIP SUSE-RU-2023:0645-1 as openSUSE-SLE-15.4-2023-645 is not security or has no CVEs. patches: SUSE-2023-645,SUSE-SLE-Module-Live-Patching-15-SP1-2023-645,SUSE-SLE-Module-Live-Patching-15-SP2-2023-645,SUSE-SLE-Module-Live-Patching-15-SP3-2023-645,SUSE-SLE-Module-Live-Patching-15-SP4-2023-645,openSUSE-SLE-15.4-2023-645 SKIP SUSE-RU-2023:0651-1 as openSUSE-SLE-15.4-2023-651 is not security or has no CVEs. patches: SUSE-2023-651,SUSE-SLE-Module-Basesystem-15-SP4-2023-651,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-651,SUSE-SLE-Product-WE-15-SP4-2023-651,openSUSE-SLE-15.4-2023-651 SKIP SUSE-RU-2023:0658-1 as openSUSE-SLE-15.4-2023-658 is not security or has no CVEs. patches: SUSE-2023-658,SUSE-SLE-Micro-5.3-2023-658,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-658,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-658,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-658,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-658,openSUSE-Leap-Micro-5.3-2023-658,openSUSE-SLE-15.4-2023-658 SKIP SUSE-RU-2023:0658-2 as SUSE-SLE-Micro-5.4-2023-658 is not security or has no CVEs. patches: SUSE-2023-658,SUSE-SLE-Micro-5.4-2023-658 SKIP SUSE-RU-2023:0659-1 as SUSE-SLE-Module-Public-Cloud-12-2023-659 is not security or has no CVEs. patches: SUSE-2023-659,SUSE-SLE-Module-Public-Cloud-12-2023-659 SKIP SUSE-RU-2023:0664-1 as openSUSE-SLE-15.4-2023-664 is not security or has no CVEs. patches: SUSE-2023-664,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-664,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-664,openSUSE-SLE-15.4-2023-664 SKIP SUSE-RU-2023:0665-1 as openSUSE-SLE-15.4-2023-665 is not security or has no CVEs. patches: SUSE-2023-665,SUSE-SLE-Module-Development-Tools-15-SP4-2023-665,openSUSE-SLE-15.4-2023-665 SKIP SUSE-RU-2023:0670-1 as SUSE-SLE-Product-HPC-15-SP4-2023-670 is not security or has no CVEs. patches: SUSE-2023-670,SUSE-SLE-Module-HPC-15-SP4-2023-670,SUSE-SLE-Product-HPC-15-SP4-2023-670 SKIP SUSE-RU-2023:0676-1 as openSUSE-SLE-15.4-2023-676 is not security or has no CVEs. patches: SUSE-2023-676,SUSE-SLE-Product-RT-15-SP3-2023-676,SUSE-SUSE-MicroOS-5.1-2023-676,SUSE-SUSE-MicroOS-5.2-2023-676,openSUSE-SLE-15.4-2023-676 SKIP SUSE-RU-2023:0678-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-678 is not security or has no CVEs. patches: SUSE-2023-678,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-678 SKIP SUSE-RU-2023:0686-1 as openSUSE-SLE-15.4-2023-686 is not security or has no CVEs. patches: SUSE-2023-686,openSUSE-SLE-15.4-2023-686 SKIP SUSE-RU-2023:0687-1 as openSUSE-SLE-15.4-2023-687 is not security or has no CVEs. patches: SUSE-2023-687,openSUSE-SLE-15.4-2023-687 SKIP SUSE-RU-2023:0688-1 as SUSE-SLE-Product-RT-15-SP3-2023-688 is not security or has no CVEs. patches: SUSE-2023-688,SUSE-SLE-Product-RT-15-SP3-2023-688 SKIP SUSE-RU-2023:0698-1 as SUSE-Storage-7-2023-698 is not security or has no CVEs. patches: SUSE-2023-698,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-698,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-698,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-698,SUSE-Storage-7-2023-698 SKIP SUSE-RU-2023:0699-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-699 is not security or has no CVEs. patches: SUSE-2023-699,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-699,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-699,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-699 SKIP SUSE-RU-2023:0700-1 as openSUSE-SLE-15.4-2023-700 is not security or has no CVEs. patches: SUSE-2023-700,SUSE-SLE-Micro-5.3-2023-700,SUSE-SLE-Module-Basesystem-15-SP4-2023-700,openSUSE-Leap-Micro-5.3-2023-700,openSUSE-SLE-15.4-2023-700 SKIP SUSE-RU-2023:0701-1 as SUSE-Storage-7.1-2023-701 is not security or has no CVEs. patches: SUSE-2023-701,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-701,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-701,SUSE-SLE-Product-RT-15-SP3-2023-701,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-701,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-701,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-701,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-701,SUSE-SUSE-MicroOS-5.1-2023-701,SUSE-SUSE-MicroOS-5.2-2023-701,SUSE-Storage-7.1-2023-701 SKIP SUSE-RU-2023:0703-1 as SUSE-SLE-HA-12-SP5-2023-703 is not security or has no CVEs. patches: SUSE-2023-703,SUSE-SLE-HA-12-SP5-2023-703 SKIP SUSE-RU-2023:0708-1 as SUSE-Storage-7-2023-708 is not security or has no CVEs. patches: SUSE-2023-708,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-708,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-708,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-708,SUSE-Storage-7-2023-708 SKIP SUSE-RU-2023:0709-1 as openSUSE-SLE-15.4-2023-709 is not security or has no CVEs. patches: SUSE-2023-709,SUSE-SLE-Micro-5.3-2023-709,SUSE-SLE-Module-Basesystem-15-SP4-2023-709,openSUSE-Leap-Micro-5.3-2023-709,openSUSE-SLE-15.4-2023-709 SKIP SUSE-RU-2023:0713-1 as openSUSE-SLE-15.4-2023-713 is not security or has no CVEs. patches: SUSE-2023-713,SUSE-SLE-Micro-5.3-2023-713,SUSE-SLE-Module-Basesystem-15-SP4-2023-713,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-713,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-713,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-713,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-713,SUSE-SLE-Product-RT-15-SP3-2023-713,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-713,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-713,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-713,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-713,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-713,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-713,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-713,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-713,SUSE-SUSE-MicroOS-5.1-2023-713,SUSE-SUSE-MicroOS-5.2-2023-713,SUSE-Storage-7-2023-713,SUSE-Storage-7.1-2023-713,openSUSE-Leap-Micro-5.3-2023-713,openSUSE-SLE-15.4-2023-713 SKIP SUSE-RU-2023:0713-2 as SUSE-SLE-Micro-5.4-2023-713 is not security or has no CVEs. patches: SUSE-2023-713,SUSE-SLE-Micro-5.4-2023-713 SKIP SUSE-RU-2023:0714-1 as openSUSE-SLE-15.4-2023-714 is not security or has no CVEs. patches: SUSE-2023-714,SUSE-SLE-Micro-5.3-2023-714,SUSE-SLE-Module-Basesystem-15-SP4-2023-714,SUSE-SLE-Module-Development-Tools-15-SP4-2023-714,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-714,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-714,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-714,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-714,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-714,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-714,SUSE-SLE-Product-RT-15-SP3-2023-714,SUSE-SUSE-MicroOS-5.1-2023-714,SUSE-SUSE-MicroOS-5.2-2023-714,openSUSE-Leap-Micro-5.3-2023-714,openSUSE-SLE-15.4-2023-714 SKIP SUSE-RU-2023:0714-2 as SUSE-SLE-Micro-5.4-2023-714 is not security or has no CVEs. patches: SUSE-2023-714,SUSE-SLE-Micro-5.4-2023-714 SKIP SUSE-RU-2023:0716-1 as SUSE-SLE-Module-RT-15-SP4-2023-716 is not security or has no CVEs. patches: SUSE-2023-716,SUSE-SLE-Module-RT-15-SP4-2023-716 SKIP SUSE-RU-2023:0716-2 as SUSE-SLE-Micro-5.4-2023-716 is not security or has no CVEs. patches: SUSE-2023-716,SUSE-SLE-Micro-5.4-2023-716 SKIP SUSE-RU-2023:0717-1 as SUSE-Storage-7.1-2023-717 is not security or has no CVEs. patches: SUSE-2023-717,SUSE-Storage-7.1-2023-717 SKIP SUSE-RU-2023:0718-1 as SUSE-SLE-Module-HPC-12-2023-718 is not security or has no CVEs. patches: SUSE-2023-718,SUSE-SLE-Module-HPC-12-2023-718 SKIP SUSE-RU-2023:0721-1 as SUSE-SLE-SERVER-12-SP5-2023-721 is not security or has no CVEs. patches: SUSE-2023-721,SUSE-SLE-SDK-12-SP5-2023-721,SUSE-SLE-SERVER-12-SP5-2023-721 SKIP SUSE-RU-2023:0723-1 as SUSE-Storage-7.1-2023-723 is not security or has no CVEs. patches: SUSE-2023-723,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-723,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-723,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-723,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-723,SUSE-SLE-Product-RT-15-SP3-2023-723,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-723,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-723,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-723,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-723,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-723,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-723,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-723,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-723,SUSE-Storage-7-2023-723,SUSE-Storage-7.1-2023-723 SKIP SUSE-RU-2023:0726-1 as openSUSE-SLE-15.4-2023-726 is not security or has no CVEs. patches: SUSE-2023-726,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-726,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-726,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-726,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-726,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-726,openSUSE-SLE-15.4-2023-726 SKIP SUSE-RU-2023:0732-1 as openSUSE-SLE-15.4-2023-732 is not security or has no CVEs. patches: SUSE-2023-732,SUSE-SLE-Module-Development-Tools-15-SP4-2023-732,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-732,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-732,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-732,SUSE-SLE-Product-RT-15-SP3-2023-732,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-732,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-732,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-732,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-732,SUSE-Storage-7-2023-732,SUSE-Storage-7.1-2023-732,openSUSE-SLE-15.4-2023-732 SKIP SUSE-RU-2023:0734-1 as openSUSE-SLE-15.4-2023-734 is not security or has no CVEs. patches: SUSE-2023-734,SUSE-SLE-Module-Development-Tools-15-SP4-2023-734,SUSE-SLE-Product-RT-15-SP3-2023-734,openSUSE-SLE-15.4-2023-734 SKIP SUSE-RU-2023:0739-1 as SUSE-SLE-Product-RT-15-SP3-2023-739 is not security or has no CVEs. patches: SUSE-2023-739,SUSE-SLE-Product-RT-15-SP3-2023-739 SKIP SUSE-RU-2023:0740-1 as SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-740 is not security or has no CVEs. patches: SUSE-2023-740,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-740 SKIP SUSE-RU-2023:0741-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-741 is not security or has no CVEs. patches: SUSE-2023-741,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-741 SKIP SUSE-RU-2023:0742-1 as SUSE-SLE-Module-Public-Cloud-12-2023-742 is not security or has no CVEs. patches: SUSE-2023-742,SUSE-SLE-Module-Public-Cloud-12-2023-742 SKIP SUSE-RU-2023:0743-1 as openSUSE-SLE-15.4-2023-743 is not security or has no CVEs. patches: SUSE-2023-743,SUSE-SLE-Module-Basesystem-15-SP4-2023-743,openSUSE-SLE-15.4-2023-743 SKIP SUSE-RU-2023:0743-2 as SUSE-SLE-Micro-5.4-2023-743 is not security or has no CVEs. patches: SUSE-2023-743,SUSE-SLE-Micro-5.4-2023-743 SKIP SUSE-RU-2023:0745-1 as SUSE-SLE-Product-RT-15-SP4-2023-745 is not security or has no CVEs. patches: SUSE-2023-745,SUSE-SLE-Module-RT-15-SP4-2023-745,SUSE-SLE-Product-RT-15-SP4-2023-745 SKIP SUSE-RU-2023:0750-1 as SUSE-Storage-7.1-2023-750 is not security or has no CVEs. patches: SUSE-2023-750,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-750,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-750,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-750,SUSE-SLE-Product-RT-15-SP3-2023-750,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-750,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-750,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-750,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-750,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-750,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-750,SUSE-SUSE-MicroOS-5.1-2023-750,SUSE-SUSE-MicroOS-5.2-2023-750,SUSE-Storage-7-2023-750,SUSE-Storage-7.1-2023-750 SKIP SUSE-RU-2023:0751-1 as SUSE-SLE-SERVER-12-SP5-2023-751 is not security or has no CVEs. patches: SUSE-2023-751,SUSE-SLE-SERVER-12-SP5-2023-751 SKIP SUSE-RU-2023:0753-1 as openSUSE-SLE-15.4-2023-753 is not security or has no CVEs. patches: SUSE-2023-753,SUSE-SLE-Module-Basesystem-15-SP4-2023-753,SUSE-SLE-Module-HPC-15-SP3-2023-753,SUSE-SLE-Module-HPC-15-SP4-2023-753,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-753,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-753,openSUSE-SLE-15.4-2023-753 SKIP SUSE-RU-2023:0754-1 as openSUSE-SLE-15.4-2023-754 is not security or has no CVEs. patches: SUSE-2023-754,SUSE-SLE-Module-Basesystem-15-SP4-2023-754,openSUSE-SLE-15.4-2023-754 SKIP SUSE-RU-2023:0755-1 as openSUSE-SLE-15.4-2023-755 is not security or has no CVEs. patches: SUSE-2023-755,SUSE-SLE-Module-Basesystem-15-SP4-2023-755,openSUSE-SLE-15.4-2023-755 SKIP SUSE-RU-2023:0756-1 as openSUSE-SLE-15.4-2023-756 is not security or has no CVEs. patches: SUSE-2023-756,SUSE-SLE-Micro-5.3-2023-756,SUSE-SLE-Module-Basesystem-15-SP4-2023-756,SUSE-SLE-Module-Development-Tools-15-SP4-2023-756,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-756,SUSE-SLE-Product-RT-15-SP3-2023-756,SUSE-SUSE-MicroOS-5.2-2023-756,openSUSE-Leap-Micro-5.3-2023-756,openSUSE-SLE-15.4-2023-756 SKIP SUSE-RU-2023:0756-2 as SUSE-SLE-Micro-5.4-2023-756 is not security or has no CVEs. patches: SUSE-2023-756,SUSE-SLE-Micro-5.4-2023-756 SKIP SUSE-RU-2023:0757-1 as SUSE-SLE-SERVER-12-SP5-2023-757 is not security or has no CVEs. patches: SUSE-2023-757,SUSE-SLE-SERVER-12-SP5-2023-757 SKIP SUSE-RU-2023:0765-1 as openSUSE-SLE-15.4-2023-765 is not security or has no CVEs. patches: SUSE-2023-765,SUSE-SLE-Module-HPC-15-SP4-2023-765,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-765,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-765,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-765,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-765,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-765,openSUSE-SLE-15.4-2023-765 SKIP SUSE-RU-2023:0776-1 as openSUSE-SLE-15.4-2023-776 is not security or has no CVEs. patches: SUSE-2023-776,SUSE-SLE-INSTALLER-15-SP1-2023-776,SUSE-SLE-INSTALLER-15-SP2-2023-776,SUSE-SLE-INSTALLER-15-SP3-2023-776,SUSE-SLE-INSTALLER-15-SP4-2023-776,SUSE-SLE-Micro-5.3-2023-776,SUSE-SLE-Module-Basesystem-15-SP4-2023-776,SUSE-SLE-Module-Development-Tools-15-SP4-2023-776,SUSE-SLE-Module-Legacy-15-SP4-2023-776,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-776,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-776,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-776,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-776,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-776,SUSE-SLE-Product-RT-15-SP3-2023-776,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-776,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-776,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-776,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-776,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-776,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-776,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-776,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-776,SUSE-SUSE-MicroOS-5.1-2023-776,SUSE-SUSE-MicroOS-5.2-2023-776,SUSE-Storage-7-2023-776,SUSE-Storage-7.1-2023-776,openSUSE-Leap-Micro-5.3-2023-776,openSUSE-SLE-15.4-2023-776 SKIP SUSE-RU-2023:0782-1 as openSUSE-SLE-15.4-2023-782 is not security or has no CVEs. patches: SUSE-2023-782,SUSE-SLE-Micro-5.3-2023-782,SUSE-SLE-Module-Basesystem-15-SP4-2023-782,openSUSE-Leap-Micro-5.3-2023-782,openSUSE-SLE-15.4-2023-782 SKIP SUSE-RU-2023:0782-2 as SUSE-SLE-Micro-5.4-2023-782 is not security or has no CVEs. patches: SUSE-2023-782,SUSE-SLE-Micro-5.4-2023-782 SKIP SUSE-RU-2023:0783-1 as openSUSE-SLE-15.4-2023-783 is not security or has no CVEs. patches: SUSE-2023-783,SUSE-SLE-Micro-5.3-2023-783,SUSE-SLE-Module-Basesystem-15-SP4-2023-783,openSUSE-Leap-Micro-5.3-2023-783,openSUSE-SLE-15.4-2023-783 SKIP SUSE-RU-2023:0784-1 as SUSE-Storage-7.1-2023-784 is not security or has no CVEs. patches: SUSE-2023-784,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-784,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-784,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-784,SUSE-SLE-Product-RT-15-SP3-2023-784,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-784,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-784,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-784,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-784,SUSE-SUSE-MicroOS-5.2-2023-784,SUSE-Storage-7.1-2023-784 SKIP SUSE-RU-2023:0785-1 as openSUSE-SLE-15.4-2023-785 is not security or has no CVEs. patches: SUSE-2023-785,SUSE-SLE-Micro-5.3-2023-785,SUSE-SLE-Module-Basesystem-15-SP4-2023-785,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-785,SUSE-SLE-Module-Server-Applications-15-SP4-2023-785,openSUSE-Leap-Micro-5.3-2023-785,openSUSE-SLE-15.4-2023-785 SKIP SUSE-RU-2023:0786-1 as SUSE-Storage-7.1-2023-786 is not security or has no CVEs. patches: SUSE-2023-786,SUSE-SLE-INSTALLER-15-SP2-2023-786,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-786,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-786,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-786,SUSE-SLE-Product-RT-15-SP3-2023-786,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-786,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-786,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-786,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-786,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-786,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-786,SUSE-SUSE-MicroOS-5.1-2023-786,SUSE-SUSE-MicroOS-5.2-2023-786,SUSE-Storage-7-2023-786,SUSE-Storage-7.1-2023-786 SKIP SUSE-RU-2023:0787-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-787 is not security or has no CVEs. patches: SUSE-2023-787,SUSE-SLE-INSTALLER-15-SP1-2023-787,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-787,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-787,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-787 SKIP SUSE-RU-2023:0788-1 as openSUSE-SLE-15.4-2023-788 is not security or has no CVEs. patches: SUSE-2023-788,SUSE-SLE-Micro-5.3-2023-788,SUSE-SLE-Module-Basesystem-15-SP4-2023-788,SUSE-SLE-Module-Development-Tools-15-SP4-2023-788,openSUSE-Leap-Micro-5.3-2023-788,openSUSE-SLE-15.4-2023-788 SKIP SUSE-RU-2023:0790-1 as openSUSE-SLE-15.4-2023-790 is not security or has no CVEs. patches: SUSE-2023-790,SUSE-SLE-Micro-5.3-2023-790,SUSE-SLE-Module-Basesystem-15-SP4-2023-790,openSUSE-Leap-Micro-5.3-2023-790,openSUSE-SLE-15.4-2023-790 SKIP SUSE-RU-2023:0792-1 as openSUSE-SLE-15.4-2023-792 is not security or has no CVEs. patches: SUSE-2023-792,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-792,SUSE-SLE-Product-WE-15-SP4-2023-792,openSUSE-SLE-15.4-2023-792 SKIP SUSE-RU-2023:0793-1 as openSUSE-SLE-15.4-2023-793 is not security or has no CVEs. patches: SUSE-2023-793,SUSE-SLE-Module-Basesystem-15-SP4-2023-793,SUSE-SLE-Product-RT-15-SP3-2023-793,openSUSE-SLE-15.4-2023-793 SKIP SUSE-RU-2023:0798-1 as SUSE-SLE-Module-Public-Cloud-12-2023-798 is not security or has no CVEs. patches: SUSE-2023-798,SUSE-SLE-Module-Public-Cloud-12-2023-798 SKIP SUSE-RU-2023:0807-1 as openSUSE-SLE-15.4-2023-807 is not security or has no CVEs. patches: SUSE-2023-807,SUSE-SLE-Micro-5.3-2023-807,SUSE-SLE-Module-Basesystem-15-SP4-2023-807,SUSE-SLE-Module-Server-Applications-15-SP4-2023-807,SUSE-SLE-Module-Transactional-Server-15-SP4-2023-807,openSUSE-Leap-Micro-5.3-2023-807,openSUSE-SLE-15.4-2023-807 SKIP SUSE-RU-2023:0807-2 as SUSE-SLE-Micro-5.4-2023-807 is not security or has no CVEs. patches: SUSE-2023-807,SUSE-SLE-Micro-5.4-2023-807 SKIP SUSE-RU-2023:0808-1 as SUSE-Storage-7.1-2023-808 is not security or has no CVEs. patches: SUSE-2023-808,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-808,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-808,SUSE-SLE-Product-RT-15-SP3-2023-808,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-808,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-808,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-808,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-808,SUSE-SUSE-MicroOS-5.1-2023-808,SUSE-SUSE-MicroOS-5.2-2023-808,SUSE-Storage-7.1-2023-808 SKIP SUSE-RU-2023:0809-1 as SUSE-Storage-7-2023-809 is not security or has no CVEs. patches: SUSE-2023-809,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-809,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-809,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-809,SUSE-Storage-7-2023-809 SKIP SUSE-RU-2023:0810-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-810 is not security or has no CVEs. patches: SUSE-2023-810,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-810,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-810,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-810 ERROR: notice SUSE-RU-2023:0816-1 has no valid patches out of: SUSE-2023-816,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-816 ERROR: notice SUSE-RU-2023:0817-1 has no valid patches out of: SUSE-2023-817,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-817 SKIP SUSE-RU-2023:0820-1 as SUSE-EL-9-CLIENT-TOOLS-2023-820 is not security or has no CVEs. patches: SUSE-2023-820,SUSE-EL-9-CLIENT-TOOLS-2023-820 SKIP SUSE-RU-2023:0822-1 as SUSE-SLE-Manager-Tools-12-2023-822 is not security or has no CVEs. patches: SUSE-2023-822,SUSE-SLE-Manager-Tools-12-2023-822 SKIP SUSE-RU-2023:0823-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-823 is not security or has no CVEs. patches: SUSE-2023-823,SUSE-SLE-Manager-Tools-15-2023-823,SUSE-SLE-Manager-Tools-For-Micro-5-2023-823,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-823,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-823 ERROR: notice SUSE-RU-2023:0827-1 has no valid patches out of: SUSE-2023-827,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-827 ERROR: notice SUSE-RU-2023:0828-1 has no valid patches out of: SUSE-2023-828,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-828 SKIP SUSE-RU-2023:0831-1 as SUSE-EL-9-CLIENT-TOOLS-2023-831 is not security or has no CVEs. patches: SUSE-2023-831,SUSE-EL-9-CLIENT-TOOLS-2023-831 SKIP SUSE-RU-2023:0860-1 as openSUSE-SLE-15.4-2023-860 is not security or has no CVEs. patches: SUSE-2023-860,SUSE-SLE-INSTALLER-15-SP4-2023-860,SUSE-SLE-Module-Basesystem-15-SP4-2023-860,openSUSE-SLE-15.4-2023-860 SKIP SUSE-RU-2023:0866-1 as openSUSE-SLE-15.4-2023-866 is not security or has no CVEs. patches: SUSE-2023-866,openSUSE-SLE-15.4-2023-866 SKIP SUSE-RU-2023:0874-1 as openSUSE-SLE-15.4-2023-874 is not security or has no CVEs. patches: SUSE-2023-874,openSUSE-SLE-15.4-2023-874 SKIP SUSE-RU-2023:0874-2 as SUSE-Storage-7-2023-874 is not security or has no CVEs. patches: SUSE-2023-874,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-874,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-874,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-874,SUSE-Storage-7-2023-874 SKIP SUSE-RU-2023:0875-1 as openSUSE-SLE-15.4-2023-875 is not security or has no CVEs. patches: SUSE-2023-875,SUSE-SLE-Micro-5.3-2023-875,SUSE-SLE-Module-Basesystem-15-SP4-2023-875,openSUSE-Leap-Micro-5.3-2023-875,openSUSE-SLE-15.4-2023-875 SKIP SUSE-RU-2023:0875-2 as SUSE-SLE-Micro-5.4-2023-875 is not security or has no CVEs. patches: SUSE-2023-875,SUSE-SLE-Micro-5.4-2023-875 SKIP SUSE-RU-2023:0876-1 as openSUSE-SLE-15.4-2023-876 is not security or has no CVEs. patches: SUSE-2023-876,SUSE-SLE-Module-Development-Tools-15-SP4-2023-876,openSUSE-SLE-15.4-2023-876 SKIP SUSE-RU-2023:1297-1 as SUSE-SLE-SERVER-12-SP5-2023-1297 is not security or has no CVEs. patches: SUSE-2023-1297,SUSE-SLE-SERVER-12-SP5-2023-1297 SKIP SUSE-RU-2023:1298-1 as openSUSE-SLE-15.4-2023-1298 is not security or has no CVEs. patches: SUSE-2023-1298,SUSE-SLE-Micro-5.3-2023-1298,SUSE-SLE-Module-Basesystem-15-SP4-2023-1298,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1298,openSUSE-Leap-Micro-5.3-2023-1298,openSUSE-SLE-15.4-2023-1298 SKIP SUSE-RU-2023:1298-2 as SUSE-SLE-Micro-5.4-2023-1298 is not security or has no CVEs. patches: SUSE-2023-1298,SUSE-SLE-Micro-5.4-2023-1298 ERROR: notice SUSE-RU-2023:15150-1 has no valid patches out of: suse-ubu184ct-client-tools-202301-15150 ERROR: notice SUSE-RU-2023:15151-1 has no valid patches out of: suse-ubu204ct-client-tools-202301-15151 ERROR: notice SUSE-RU-2023:15152-1 has no valid patches out of: suse-ubu224ct-client-tools-202301-15152 ERROR: notice SUSE-RU-2023:15154-1 has no valid patches out of: suse-ubu184ct-client-tools-202301-15154 ERROR: notice SUSE-RU-2023:15155-1 has no valid patches out of: suse-ubu204ct-client-tools-202301-15155 ERROR: notice SUSE-RU-2023:15156-1 has no valid patches out of: suse-ubu224ct-client-tools-202301-15156 SKIP SUSE-RU-2023:1564-1 as openSUSE-SLE-15.4-2023-1564 is not security or has no CVEs. patches: SUSE-2023-1564,SUSE-SLE-Micro-5.3-2023-1564,SUSE-SLE-Module-Containers-15-SP4-2023-1564,openSUSE-Leap-Micro-5.3-2023-1564,openSUSE-SLE-15.4-2023-1564 SKIP SUSE-RU-2023:1565-1 as openSUSE-SLE-15.4-2023-1565 is not security or has no CVEs. patches: SUSE-2023-1565,SUSE-SLE-Micro-5.3-2023-1565,SUSE-SLE-Module-Containers-15-SP4-2023-1565,openSUSE-Leap-Micro-5.3-2023-1565,openSUSE-SLE-15.4-2023-1565 SKIP SUSE-RU-2023:1586-1 as openSUSE-SLE-15.4-2023-1586 is not security or has no CVEs. patches: SUSE-2023-1586,SUSE-SLE-Micro-5.3-2023-1586,SUSE-SLE-Module-Basesystem-15-SP4-2023-1586,SUSE-SLE-Product-RT-15-SP3-2023-1586,SUSE-SUSE-MicroOS-5.1-2023-1586,SUSE-SUSE-MicroOS-5.2-2023-1586,openSUSE-Leap-Micro-5.3-2023-1586,openSUSE-SLE-15.4-2023-1586 SKIP SUSE-RU-2023:1586-2 as SUSE-SLE-Micro-5.4-2023-1586 is not security or has no CVEs. patches: SUSE-2023-1586,SUSE-SLE-Micro-5.4-2023-1586 SKIP SUSE-RU-2023:1587-1 as SUSE-SLE-SERVER-12-SP5-2023-1587 is not security or has no CVEs. patches: SUSE-2023-1587,SUSE-SLE-SERVER-12-SP5-2023-1587 SKIP SUSE-RU-2023:1593-1 as openSUSE-SLE-15.4-2023-1593 is not security or has no CVEs. patches: SUSE-2023-1593,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1593,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1593,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1593,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1593,SUSE-SLE-Product-RT-15-SP3-2023-1593,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1593,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1593,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1593,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1593,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1593,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1593,SUSE-Storage-7-2023-1593,SUSE-Storage-7.1-2023-1593,openSUSE-SLE-15.4-2023-1593 SKIP SUSE-RU-2023:1616-1 as openSUSE-SLE-15.4-2023-1616 is not security or has no CVEs. patches: SUSE-2023-1616,SUSE-SLE-Module-Basesystem-15-SP4-2023-1616,openSUSE-SLE-15.4-2023-1616 SKIP SUSE-RU-2023:1617-1 as openSUSE-SLE-15.4-2023-1617 is not security or has no CVEs. patches: SUSE-2023-1617,SUSE-SLE-Module-Basesystem-15-SP4-2023-1617,SUSE-SLE-Product-RT-15-SP3-2023-1617,openSUSE-SLE-15.4-2023-1617 SKIP SUSE-RU-2023:1618-1 as openSUSE-SLE-15.4-2023-1618 is not security or has no CVEs. patches: SUSE-2023-1618,SUSE-SLE-Module-Basesystem-15-SP4-2023-1618,openSUSE-SLE-15.4-2023-1618 SKIP SUSE-RU-2023:1631-1 as SUSE-SLE-SERVER-12-SP5-2023-1631 is not security or has no CVEs. patches: SUSE-2023-1631,SUSE-SLE-SERVER-12-SP5-2023-1631 SKIP SUSE-RU-2023:1632-1 as openSUSE-SLE-15.4-2023-1632 is not security or has no CVEs. patches: SUSE-2023-1632,SUSE-SLE-Module-Basesystem-15-SP4-2023-1632,openSUSE-SLE-15.4-2023-1632 SKIP SUSE-RU-2023:1636-1 as openSUSE-SLE-15.4-2023-1636 is not security or has no CVEs. patches: SUSE-2023-1636,SUSE-SLE-Micro-5.3-2023-1636,SUSE-SLE-Module-Basesystem-15-SP4-2023-1636,openSUSE-Leap-Micro-5.3-2023-1636,openSUSE-SLE-15.4-2023-1636 SKIP SUSE-RU-2023:1636-2 as SUSE-SLE-Micro-5.4-2023-1636 is not security or has no CVEs. patches: SUSE-2023-1636,SUSE-SLE-Micro-5.4-2023-1636 SKIP SUSE-RU-2023:1648-1 as openSUSE-SLE-15.4-2023-1648 is not security or has no CVEs. patches: SUSE-2023-1648,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1648,SUSE-SLE-Product-RT-15-SP3-2023-1648,openSUSE-SLE-15.4-2023-1648 SKIP SUSE-RU-2023:1660-1 as openSUSE-SLE-15.4-2023-1660 is not security or has no CVEs. patches: SUSE-2023-1660,openSUSE-SLE-15.4-2023-1660 SKIP SUSE-RU-2023:1661-1 as openSUSE-SLE-15.4-2023-1661 is not security or has no CVEs. patches: SUSE-2023-1661,SUSE-SLE-Micro-5.3-2023-1661,SUSE-SLE-Module-Basesystem-15-SP4-2023-1661,SUSE-SLE-Product-RT-15-SP3-2023-1661,SUSE-SUSE-MicroOS-5.1-2023-1661,SUSE-SUSE-MicroOS-5.2-2023-1661,openSUSE-Leap-Micro-5.3-2023-1661,openSUSE-SLE-15.4-2023-1661 SKIP SUSE-RU-2023:1662-1 as openSUSE-SLE-15.4-2023-1662 is not security or has no CVEs. patches: SUSE-2023-1662,SUSE-SLE-Module-Basesystem-15-SP4-2023-1662,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1662,SUSE-SLE-Module-Transactional-Server-15-SP4-2023-1662,openSUSE-SLE-15.4-2023-1662 SKIP SUSE-RU-2023:1666-1 as openSUSE-SLE-15.4-2023-1666 is not security or has no CVEs. patches: SUSE-2023-1666,SUSE-SLE-Module-HPC-15-SP4-2023-1666,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1666,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1666,openSUSE-SLE-15.4-2023-1666 SKIP SUSE-RU-2023:1667-1 as SUSE-Storage-7.1-2023-1667 is not security or has no CVEs. patches: SUSE-2023-1667,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1667,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1667,SUSE-SLE-Product-RT-15-SP3-2023-1667,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1667,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1667,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1667,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1667,SUSE-SUSE-MicroOS-5.1-2023-1667,SUSE-SUSE-MicroOS-5.2-2023-1667,SUSE-Storage-7.1-2023-1667 SKIP SUSE-RU-2023:1668-1 as openSUSE-SLE-15.4-2023-1668 is not security or has no CVEs. patches: SUSE-2023-1668,SUSE-SLE-Micro-5.3-2023-1668,SUSE-SLE-Module-Basesystem-15-SP4-2023-1668,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1668,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1668,openSUSE-Leap-Micro-5.3-2023-1668,openSUSE-SLE-15.4-2023-1668 SKIP SUSE-RU-2023:1668-2 as SUSE-SLE-Micro-5.4-2023-1668 is not security or has no CVEs. patches: SUSE-2023-1668,SUSE-SLE-Micro-5.4-2023-1668 SKIP SUSE-RU-2023:1670-1 as openSUSE-SLE-15.4-2023-1670 is not security or has no CVEs. patches: SUSE-2023-1670,SUSE-SLE-Micro-5.3-2023-1670,SUSE-SLE-Module-Basesystem-15-SP4-2023-1670,openSUSE-Leap-Micro-5.3-2023-1670,openSUSE-SLE-15.4-2023-1670 SKIP SUSE-RU-2023:1670-2 as SUSE-SLE-Micro-5.4-2023-1670 is not security or has no CVEs. patches: SUSE-2023-1670,SUSE-SLE-Micro-5.4-2023-1670 SKIP SUSE-RU-2023:1671-1 as openSUSE-SLE-15.4-2023-1671 is not security or has no CVEs. patches: SUSE-2023-1671,SUSE-SLE-Module-Basesystem-15-SP4-2023-1671,SUSE-SLE-Product-RT-15-SP3-2023-1671,openSUSE-SLE-15.4-2023-1671 SKIP SUSE-RU-2023:1692-1 as openSUSE-SLE-15.4-2023-1692 is not security or has no CVEs. patches: SUSE-2023-1692,SUSE-SLE-Module-Live-Patching-15-SP4-2023-1692,openSUSE-SLE-15.4-2023-1692 SKIP SUSE-RU-2023:1694-1 as openSUSE-SLE-15.4-2023-1694 is not security or has no CVEs. patches: SUSE-2023-1694,SUSE-SLE-Module-Basesystem-15-SP4-2023-1694,openSUSE-SLE-15.4-2023-1694 SKIP SUSE-RU-2023:1695-1 as SUSE-SLE-SERVER-12-SP5-2023-1695 is not security or has no CVEs. patches: SUSE-2023-1695,SUSE-OpenStack-Cloud-9-2023-1695,SUSE-OpenStack-Cloud-Crowbar-9-2023-1695,SUSE-SLE-Module-Toolchain-12-2023-1695,SUSE-SLE-SAP-12-SP4-2023-1695,SUSE-SLE-SERVER-12-SP2-BCL-2023-1695,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1695,SUSE-SLE-SERVER-12-SP4-LTSS-2023-1695,SUSE-SLE-SERVER-12-SP5-2023-1695 SKIP SUSE-RU-2023:1696-1 as openSUSE-SLE-15.4-2023-1696 is not security or has no CVEs. patches: SUSE-2023-1696,SUSE-SLE-Micro-5.3-2023-1696,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-1696,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-1696,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-1696,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1696,openSUSE-Leap-Micro-5.3-2023-1696,openSUSE-SLE-15.4-2023-1696 SKIP SUSE-RU-2023:1697-1 as openSUSE-SLE-15.4-2023-1697 is not security or has no CVEs. patches: SUSE-2023-1697,SUSE-SLE-Module-Basesystem-15-SP4-2023-1697,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1697,openSUSE-SLE-15.4-2023-1697 SKIP SUSE-RU-2023:1707-1 as openSUSE-SLE-15.4-2023-1707 is not security or has no CVEs. patches: SUSE-2023-1707,SUSE-SLE-Module-HPC-15-SP4-2023-1707,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1707,openSUSE-SLE-15.4-2023-1707 SKIP SUSE-RU-2023:1709-1 as openSUSE-SLE-15.4-2023-1709 is not security or has no CVEs. patches: SUSE-2023-1709,SUSE-SLE-Module-Basesystem-15-SP4-2023-1709,openSUSE-SLE-15.4-2023-1709 SKIP SUSE-RU-2023:1709-2 as SUSE-SLE-INSTALLER-15-SP4-2023-1709 is not security or has no CVEs. patches: SUSE-2023-1709,SUSE-SLE-INSTALLER-15-SP4-2023-1709 ERROR: notice SUSE-RU-2023:1720-1 has no valid patches out of: SUSE-2023-1720,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1720,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1720 ERROR: notice SUSE-RU-2023:1720-2 has no valid patches out of: SUSE-2023-1720,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1720,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1720 SKIP SUSE-RU-2023:1721-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1721 is not security or has no CVEs. patches: SUSE-2023-1721,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1721,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1721 SKIP SUSE-RU-2023:1722-1 as SUSE-SLE-Module-Public-Cloud-12-2023-1722 is not security or has no CVEs. patches: SUSE-2023-1722,SUSE-SLE-Module-Public-Cloud-12-2023-1722 SKIP SUSE-RU-2023:1723-1 as SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1723 is not security or has no CVEs. patches: SUSE-2023-1723,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-1723,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-1723,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-1723,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1723 SKIP SUSE-RU-2023:1725-1 as openSUSE-SLE-15.4-2023-1725 is not security or has no CVEs. patches: SUSE-2023-1725,SUSE-SLE-Module-Basesystem-15-SP4-2023-1725,openSUSE-SLE-15.4-2023-1725 SKIP SUSE-RU-2023:1727-1 as openSUSE-SLE-15.4-2023-1727 is not security or has no CVEs. patches: SUSE-2023-1727,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1727,openSUSE-SLE-15.4-2023-1727 SKIP SUSE-RU-2023:1728-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2023-1728 is not security or has no CVEs. patches: SUSE-2023-1728,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-1728,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-1728 SKIP SUSE-RU-2023:1729-1 as openSUSE-SLE-15.4-2023-1729 is not security or has no CVEs. patches: SUSE-2023-1729,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-1729,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1729,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-1729,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-1729,openSUSE-SLE-15.4-2023-1729 SKIP SUSE-RU-2023:1731-1 as openSUSE-SLE-15.4-2023-1731 is not security or has no CVEs. patches: SUSE-2023-1731,SUSE-SLE-INSTALLER-15-SP4-2023-1731,SUSE-SLE-Module-Basesystem-15-SP4-2023-1731,openSUSE-SLE-15.4-2023-1731 SKIP SUSE-RU-2023:1732-1 as openSUSE-SLE-15.4-2023-1732 is not security or has no CVEs. patches: SUSE-2023-1732,SUSE-SLE-Module-Basesystem-15-SP4-2023-1732,SUSE-SLE-Product-RT-15-SP3-2023-1732,openSUSE-SLE-15.4-2023-1732 SKIP SUSE-RU-2023:1735-1 as openSUSE-SLE-15.4-2023-1735 is not security or has no CVEs. patches: SUSE-2023-1735,SUSE-SLE-Micro-5.3-2023-1735,SUSE-SLE-Micro-5.4-2023-1735,SUSE-SLE-Module-Basesystem-15-SP4-2023-1735,openSUSE-Leap-Micro-5.3-2023-1735,openSUSE-SLE-15.4-2023-1735 SKIP SUSE-RU-2023:1741-1 as openSUSE-SLE-15.4-2023-1741 is not security or has no CVEs. patches: SUSE-2023-1741,SUSE-SLE-Module-HPC-15-SP4-2023-1741,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1741,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1741,openSUSE-SLE-15.4-2023-1741 SKIP SUSE-RU-2023:1742-1 as openSUSE-SLE-15.4-2023-1742 is not security or has no CVEs. patches: SUSE-2023-1742,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1742,openSUSE-SLE-15.4-2023-1742 SKIP SUSE-RU-2023:1743-1 as openSUSE-SLE-15.4-2023-1743 is not security or has no CVEs. patches: SUSE-2023-1743,SUSE-SLE-INSTALLER-15-SP4-2023-1743,SUSE-SLE-Module-Basesystem-15-SP4-2023-1743,openSUSE-SLE-15.4-2023-1743 SKIP SUSE-RU-2023:1744-1 as openSUSE-SLE-15.4-2023-1744 is not security or has no CVEs. patches: SUSE-2023-1744,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1744,SUSE-SLE-Product-WE-15-SP4-2023-1744,openSUSE-SLE-15.4-2023-1744 SKIP SUSE-RU-2023:1749-1 as SUSE-SLE-SERVER-12-SP5-2023-1749 is not security or has no CVEs. patches: SUSE-2023-1749,SUSE-SLE-SDK-12-SP5-2023-1749,SUSE-SLE-SERVER-12-SP5-2023-1749 SKIP SUSE-RU-2023:1750-1 as SUSE-SLE-Product-HA-15-SP4-2023-1750 is not security or has no CVEs. patches: SUSE-2023-1750,SUSE-SLE-Product-HA-15-SP2-2023-1750,SUSE-SLE-Product-HA-15-SP3-2023-1750,SUSE-SLE-Product-HA-15-SP4-2023-1750 SKIP SUSE-RU-2023:1751-1 as openSUSE-SLE-15.4-2023-1751 is not security or has no CVEs. patches: SUSE-2023-1751,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1751,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1751,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1751,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1751,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1751,SUSE-SLE-Product-RT-15-SP3-2023-1751,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1751,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1751,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1751,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1751,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1751,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1751,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1751,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1751,SUSE-Storage-7-2023-1751,SUSE-Storage-7.1-2023-1751,openSUSE-SLE-15.4-2023-1751 SKIP SUSE-RU-2023:1753-1 as openSUSE-SLE-15.4-2023-1753 is not security or has no CVEs. patches: SUSE-2023-1753,SUSE-SLE-Module-Basesystem-15-SP4-2023-1753,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1753,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1753,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1753,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1753,SUSE-SLE-Product-RT-15-SP3-2023-1753,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1753,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1753,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1753,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1753,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1753,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1753,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1753,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1753,SUSE-SUSE-MicroOS-5.1-2023-1753,SUSE-SUSE-MicroOS-5.2-2023-1753,SUSE-Storage-7-2023-1753,SUSE-Storage-7.1-2023-1753,openSUSE-SLE-15.4-2023-1753 SKIP SUSE-RU-2023:1757-1 as openSUSE-SLE-15.4-2023-1757 is not security or has no CVEs. patches: SUSE-2023-1757,SUSE-SLE-Module-Basesystem-15-SP4-2023-1757,SUSE-SLE-Product-RT-15-SP3-2023-1757,openSUSE-SLE-15.4-2023-1757 SKIP SUSE-RU-2023:1765-1 as openSUSE-SLE-15.4-2023-1765 is not security or has no CVEs. patches: SUSE-2023-1765,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1765,openSUSE-SLE-15.4-2023-1765 SKIP SUSE-RU-2023:1770-1 as SUSE-SLE-SERVER-12-SP5-2023-1770 is not security or has no CVEs. patches: SUSE-2023-1770,SUSE-SLE-SAP-12-SP5-2023-1770,SUSE-SLE-SERVER-12-SP5-2023-1770 SKIP SUSE-RU-2023:1774-1 as openSUSE-SLE-15.4-2023-1774 is not security or has no CVEs. patches: SUSE-2023-1774,SUSE-SLE-Micro-5.3-2023-1774,SUSE-SLE-Micro-5.4-2023-1774,SUSE-SLE-Module-Basesystem-15-SP4-2023-1774,openSUSE-Leap-Micro-5.3-2023-1774,openSUSE-SLE-15.4-2023-1774 SKIP SUSE-RU-2023:1779-1 as openSUSE-SLE-15.4-2023-1779 is not security or has no CVEs. patches: SUSE-2023-1779,SUSE-SLE-Micro-5.3-2023-1779,SUSE-SLE-Micro-5.4-2023-1779,SUSE-SLE-Module-Basesystem-15-SP4-2023-1779,openSUSE-Leap-Micro-5.3-2023-1779,openSUSE-SLE-15.4-2023-1779 SKIP SUSE-RU-2023:1780-1 as SUSE-SLE-SERVER-12-SP5-2023-1780 is not security or has no CVEs. patches: SUSE-2023-1780,SUSE-SLE-SDK-12-SP5-2023-1780,SUSE-SLE-SERVER-12-SP5-2023-1780 SKIP SUSE-RU-2023:1782-1 as SUSE-SLE-SERVER-12-SP5-2023-1782 is not security or has no CVEs. patches: SUSE-2023-1782,SUSE-OpenStack-Cloud-9-2023-1782,SUSE-OpenStack-Cloud-Crowbar-9-2023-1782,SUSE-SLE-Module-Web-Scripting-12-2023-1782,SUSE-SLE-SAP-12-SP4-2023-1782,SUSE-SLE-SDK-12-SP5-2023-1782,SUSE-SLE-SERVER-12-SP2-BCL-2023-1782,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1782,SUSE-SLE-SERVER-12-SP4-LTSS-2023-1782,SUSE-SLE-SERVER-12-SP5-2023-1782 SKIP SUSE-RU-2023:1783-1 as SUSE-Storage-7-2023-1783 is not security or has no CVEs. patches: SUSE-2023-1783,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1783,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1783,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1783,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1783,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1783,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1783,SUSE-SUSE-MicroOS-5.1-2023-1783,SUSE-Storage-7-2023-1783 SKIP SUSE-RU-2023:1784-1 as openSUSE-SLE-15.4-2023-1784 is not security or has no CVEs. patches: SUSE-2023-1784,SUSE-SLE-Product-HA-15-SP2-2023-1784,SUSE-SLE-Product-HA-15-SP3-2023-1784,SUSE-SLE-Product-HA-15-SP4-2023-1784,openSUSE-SLE-15.4-2023-1784 SKIP SUSE-RU-2023:1785-1 as SUSE-Storage-7-2023-1785 is not security or has no CVEs. patches: SUSE-2023-1785,SUSE-SLE-INSTALLER-15-SP2-2023-1785,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1785,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1785,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1785,SUSE-Storage-7-2023-1785 SKIP SUSE-RU-2023:1786-1 as SUSE-Storage-7.1-2023-1786 is not security or has no CVEs. patches: SUSE-2023-1786,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1786,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1786,SUSE-SLE-Product-RT-15-SP3-2023-1786,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1786,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1786,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1786,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1786,SUSE-SUSE-MicroOS-5.1-2023-1786,SUSE-SUSE-MicroOS-5.2-2023-1786,SUSE-Storage-7.1-2023-1786 SKIP SUSE-RU-2023:1787-1 as SUSE-SLE-SERVER-12-SP5-2023-1787 is not security or has no CVEs. patches: SUSE-2023-1787,SUSE-SLE-SERVER-12-SP5-2023-1787 SKIP SUSE-RU-2023:1805-1 as openSUSE-SLE-15.4-2023-1805 is not security or has no CVEs. patches: SUSE-2023-1805,SUSE-SLE-Micro-5.3-2023-1805,SUSE-SLE-Micro-5.4-2023-1805,SUSE-SLE-Module-Basesystem-15-SP4-2023-1805,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1805,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1805,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1805,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1805,SUSE-SLE-Product-RT-15-SP3-2023-1805,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1805,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1805,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1805,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1805,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1805,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1805,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1805,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1805,SUSE-SUSE-MicroOS-5.1-2023-1805,SUSE-SUSE-MicroOS-5.2-2023-1805,SUSE-Storage-7-2023-1805,SUSE-Storage-7.1-2023-1805,openSUSE-Leap-Micro-5.3-2023-1805,openSUSE-SLE-15.4-2023-1805 SKIP SUSE-RU-2023:1806-1 as SUSE-SLE-SERVER-12-SP5-2023-1806 is not security or has no CVEs. patches: SUSE-2023-1806,SUSE-OpenStack-Cloud-9-2023-1806,SUSE-OpenStack-Cloud-Crowbar-9-2023-1806,SUSE-SLE-SAP-12-SP4-2023-1806,SUSE-SLE-SERVER-12-SP2-BCL-2023-1806,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1806,SUSE-SLE-SERVER-12-SP4-LTSS-2023-1806,SUSE-SLE-SERVER-12-SP5-2023-1806 SKIP SUSE-RU-2023:1809-1 as openSUSE-SLE-15.4-2023-1809 is not security or has no CVEs. patches: SUSE-2023-1809,SUSE-SLE-Micro-5.3-2023-1809,SUSE-SLE-Micro-5.4-2023-1809,SUSE-SLE-Module-Basesystem-15-SP4-2023-1809,openSUSE-Leap-Micro-5.3-2023-1809,openSUSE-SLE-15.4-2023-1809 SKIP SUSE-RU-2023:1810-1 as openSUSE-SLE-15.4-2023-1810 is not security or has no CVEs. patches: SUSE-2023-1810,SUSE-SLE-Micro-5.3-2023-1810,SUSE-SLE-Micro-5.4-2023-1810,SUSE-SLE-Module-Basesystem-15-SP4-2023-1810,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1810,SUSE-SLE-Product-RT-15-SP3-2023-1810,SUSE-SUSE-MicroOS-5.2-2023-1810,openSUSE-Leap-Micro-5.3-2023-1810,openSUSE-SLE-15.4-2023-1810 SKIP SUSE-RU-2023:1813-1 as openSUSE-SLE-15.4-2023-1813 is not security or has no CVEs. patches: SUSE-2023-1813,SUSE-SLE-Micro-5.3-2023-1813,SUSE-SLE-Micro-5.4-2023-1813,SUSE-SLE-Module-Basesystem-15-SP4-2023-1813,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1813,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1813,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1813,SUSE-SLE-Product-RT-15-SP3-2023-1813,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1813,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1813,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1813,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1813,SUSE-SUSE-MicroOS-5.1-2023-1813,SUSE-SUSE-MicroOS-5.2-2023-1813,SUSE-Storage-7.1-2023-1813,openSUSE-Leap-Micro-5.3-2023-1813,openSUSE-SLE-15.4-2023-1813 SKIP SUSE-RU-2023:1835-1 as openSUSE-SLE-15.4-2023-1835 is not security or has no CVEs. patches: SUSE-2023-1835,SUSE-SLE-Module-Live-Patching-15-SP1-2023-1835,SUSE-SLE-Module-Live-Patching-15-SP2-2023-1835,SUSE-SLE-Module-Live-Patching-15-SP3-2023-1835,SUSE-SLE-Module-Live-Patching-15-SP4-2023-1835,openSUSE-SLE-15.4-2023-1835 SKIP SUSE-RU-2023:1836-1 as SUSE-SLE-Live-Patching-12-SP5-2023-1836 is not security or has no CVEs. patches: SUSE-2023-1836,SUSE-SLE-Live-Patching-12-2023-1836,SUSE-SLE-Live-Patching-12-SP4-2023-1836,SUSE-SLE-Live-Patching-12-SP5-2023-1836 SKIP SUSE-RU-2023:1841-1 as openSUSE-SLE-15.4-2023-1841 is not security or has no CVEs. patches: SUSE-2023-1841,SUSE-SLE-Micro-5.3-2023-1841,SUSE-SLE-Micro-5.4-2023-1841,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-1841,SUSE-SLE-Product-HA-15-SP4-2023-1841,openSUSE-Leap-Micro-5.3-2023-1841,openSUSE-SLE-15.4-2023-1841 SKIP SUSE-RU-2023:1842-1 as openSUSE-SLE-15.4-2023-1842 is not security or has no CVEs. patches: SUSE-2023-1842,SUSE-SLE-Product-HA-15-SP4-2023-1842,openSUSE-SLE-15.4-2023-1842 SKIP SUSE-RU-2023:1843-1 as SUSE-SLE-Module-Basesystem-15-SP4-2023-1843 is not security or has no CVEs. patches: SUSE-2023-1843,SUSE-SLE-Module-Basesystem-15-SP4-2023-1843 SKIP SUSE-RU-2023:1868-1 as openSUSE-SLE-15.4-2023-1868 is not security or has no CVEs. patches: SUSE-2023-1868,SUSE-SLE-Module-Basesystem-15-SP4-2023-1868,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1868,openSUSE-SLE-15.4-2023-1868 SKIP SUSE-RU-2023:1878-1 as SUSE-Storage-7.1-2023-1878 is not security or has no CVEs. patches: SUSE-2023-1878,SUSE-SLE-INSTALLER-15-SP3-2023-1878,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1878,SUSE-Storage-7.1-2023-1878 SKIP SUSE-RU-2023:1880-1 as openSUSE-SLE-15.4-2023-1880 is not security or has no CVEs. patches: SUSE-2023-1880,SUSE-SLE-Micro-5.3-2023-1880,SUSE-SLE-Micro-5.4-2023-1880,SUSE-SLE-Module-Basesystem-15-SP4-2023-1880,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1880,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1880,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1880,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1880,SUSE-SLE-Product-RT-15-SP3-2023-1880,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1880,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1880,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1880,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1880,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1880,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1880,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1880,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1880,SUSE-Storage-7-2023-1880,SUSE-Storage-7.1-2023-1880,openSUSE-Leap-Micro-5.3-2023-1880,openSUSE-SLE-15.4-2023-1880 SKIP SUSE-RU-2023:1881-1 as openSUSE-SLE-15.4-2023-1881 is not security or has no CVEs. patches: SUSE-2023-1881,SUSE-SLE-Micro-5.3-2023-1881,SUSE-SLE-Micro-5.4-2023-1881,SUSE-SLE-Module-Basesystem-15-SP4-2023-1881,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1881,SUSE-SLE-Product-WE-15-SP4-2023-1881,openSUSE-Leap-Micro-5.3-2023-1881,openSUSE-SLE-15.4-2023-1881 SKIP SUSE-RU-2023:1882-1 as openSUSE-SLE-15.4-2023-1882 is not security or has no CVEs. patches: SUSE-2023-1882,SUSE-SLE-Micro-5.3-2023-1882,SUSE-SLE-Micro-5.4-2023-1882,SUSE-SLE-Module-Basesystem-15-SP4-2023-1882,openSUSE-Leap-Micro-5.3-2023-1882,openSUSE-SLE-15.4-2023-1882 SKIP SUSE-RU-2023:1883-1 as openSUSE-SLE-15.4-2023-1883 is not security or has no CVEs. patches: SUSE-2023-1883,SUSE-SLE-Micro-5.3-2023-1883,SUSE-SLE-Micro-5.4-2023-1883,SUSE-SLE-Module-Basesystem-15-SP4-2023-1883,openSUSE-SLE-15.4-2023-1883 SKIP SUSE-RU-2023:1884-1 as SUSE-SLE-SERVER-12-SP5-2023-1884 is not security or has no CVEs. patches: SUSE-2023-1884,SUSE-SLE-SERVER-12-SP5-2023-1884 SKIP SUSE-RU-2023:1885-1 as openSUSE-SLE-15.4-2023-1885 is not security or has no CVEs. patches: SUSE-2023-1885,SUSE-SLE-Micro-5.3-2023-1885,SUSE-SLE-Micro-5.4-2023-1885,SUSE-SLE-Module-Basesystem-15-SP4-2023-1885,openSUSE-Leap-Micro-5.3-2023-1885,openSUSE-SLE-15.4-2023-1885 SKIP SUSE-RU-2023:1886-1 as SUSE-SUSE-MicroOS-5.2-2023-1886 is not security or has no CVEs. patches: SUSE-2023-1886,SUSE-SLE-Product-RT-15-SP3-2023-1886,SUSE-SUSE-MicroOS-5.1-2023-1886,SUSE-SUSE-MicroOS-5.2-2023-1886 SKIP SUSE-RU-2023:1887-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1887 is not security or has no CVEs. patches: SUSE-2023-1887,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1887,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1887,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1887 SKIP SUSE-RU-2023:1888-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2023-1888 is not security or has no CVEs. patches: SUSE-2023-1888,SUSE-OpenStack-Cloud-9-2023-1888,SUSE-OpenStack-Cloud-Crowbar-9-2023-1888,SUSE-SLE-SAP-12-SP4-2023-1888,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1888,SUSE-SLE-SERVER-12-SP4-LTSS-2023-1888 SKIP SUSE-RU-2023:1889-1 as openSUSE-SLE-15.4-2023-1889 is not security or has no CVEs. patches: SUSE-2023-1889,SUSE-SLE-Module-Basesystem-15-SP4-2023-1889,openSUSE-SLE-15.4-2023-1889 SKIP SUSE-RU-2023:1890-1 as SUSE-SLE-SERVER-12-SP5-2023-1890 is not security or has no CVEs. patches: SUSE-2023-1890,SUSE-SLE-SERVER-12-SP5-2023-1890 SKIP SUSE-RU-2023:1891-1 as openSUSE-SLE-15.4-2023-1891 is not security or has no CVEs. patches: SUSE-2023-1891,SUSE-SLE-Module-Web-Scripting-15-SP4-2023-1891,openSUSE-SLE-15.4-2023-1891 SKIP SUSE-RU-2023:1893-1 as SUSE-Storage-7.1-2023-1893 is not security or has no CVEs. patches: SUSE-2023-1893,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1893,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1893,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1893,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1893,SUSE-SLE-Product-RT-15-SP3-2023-1893,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1893,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1893,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1893,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1893,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1893,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1893,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1893,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1893,SUSE-Storage-7-2023-1893,SUSE-Storage-7.1-2023-1893 SKIP SUSE-RU-2023:1896-1 as openSUSE-SLE-15.4-2023-1896 is not security or has no CVEs. patches: SUSE-2023-1896,SUSE-SLE-Micro-5.3-2023-1896,SUSE-SLE-Micro-5.4-2023-1896,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-1896,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-1896,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-1896,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1896,openSUSE-Leap-Micro-5.3-2023-1896,openSUSE-SLE-15.4-2023-1896 SKIP SUSE-RU-2023:1900-1 as openSUSE-SLE-15.4-2023-1900 is not security or has no CVEs. patches: SUSE-2023-1900,SUSE-SLE-Module-Basesystem-15-SP4-2023-1900,openSUSE-SLE-15.4-2023-1900 SKIP SUSE-RU-2023:1905-1 as SUSE-SLE-SERVER-12-SP5-2023-1905 is not security or has no CVEs. patches: SUSE-2023-1905,SUSE-OpenStack-Cloud-9-2023-1905,SUSE-OpenStack-Cloud-Crowbar-9-2023-1905,SUSE-SLE-SAP-12-SP4-2023-1905,SUSE-SLE-SERVER-12-SP2-BCL-2023-1905,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1905,SUSE-SLE-SERVER-12-SP4-LTSS-2023-1905,SUSE-SLE-SERVER-12-SP5-2023-1905 SKIP SUSE-RU-2023:1906-1 as SUSE-SLE-SERVER-12-SP5-2023-1906 is not security or has no CVEs. patches: SUSE-2023-1906,SUSE-SLE-SERVER-12-SP5-2023-1906 SKIP SUSE-RU-2023:1913-1 as openSUSE-SLE-15.4-2023-1913 is not security or has no CVEs. patches: SUSE-2023-1913,SUSE-SLE-Micro-5.3-2023-1913,SUSE-SLE-Micro-5.4-2023-1913,SUSE-SLE-Module-Containers-15-SP4-2023-1913,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1913,SUSE-SLE-Product-RT-15-SP3-2023-1913,SUSE-SUSE-MicroOS-5.1-2023-1913,SUSE-SUSE-MicroOS-5.2-2023-1913,SUSE-Storage-7.1-2023-1913,openSUSE-Leap-Micro-5.3-2023-1913,openSUSE-SLE-15.4-2023-1913 SKIP SUSE-RU-2023:1915-1 as openSUSE-SLE-15.4-2023-1915 is not security or has no CVEs. patches: SUSE-2023-1915,SUSE-SLE-Micro-5.3-2023-1915,SUSE-SLE-Micro-5.4-2023-1915,SUSE-SLE-Module-Basesystem-15-SP4-2023-1915,openSUSE-Leap-Micro-5.3-2023-1915,openSUSE-SLE-15.4-2023-1915 SKIP SUSE-RU-2023:1916-1 as SUSE-SLE-Product-SLES-15-SP4-2023-1916 is not security or has no CVEs. patches: SUSE-2023-1916,SUSE-SLE-Product-SLES-15-SP4-2023-1916 SKIP SUSE-RU-2023:1917-1 as openSUSE-SLE-15.4-2023-1917 is not security or has no CVEs. patches: SUSE-2023-1917,SUSE-SLE-Module-Basesystem-15-SP4-2023-1917,openSUSE-SLE-15.4-2023-1917 SKIP SUSE-RU-2023:1918-1 as SUSE-Storage-7.1-2023-1918 is not security or has no CVEs. patches: SUSE-2023-1918,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1918,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1918,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1918,SUSE-SLE-Product-RT-15-SP3-2023-1918,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1918,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1918,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1918,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1918,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1918,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1918,SUSE-Storage-7-2023-1918,SUSE-Storage-7.1-2023-1918 SKIP SUSE-RU-2023:1920-1 as openSUSE-SLE-15.4-2023-1920 is not security or has no CVEs. patches: SUSE-2023-1920,SUSE-SLE-Manager-Tools-15-2023-1920,SUSE-SLE-Micro-5.3-2023-1920,SUSE-SLE-Micro-5.4-2023-1920,SUSE-SLE-Module-Basesystem-15-SP4-2023-1920,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-1920,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-1920,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-1920,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-1920,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1920,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1920,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1920,SUSE-SLE-Product-RT-15-SP3-2023-1920,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1920,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1920,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1920,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1920,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1920,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1920,SUSE-SUSE-MicroOS-5.2-2023-1920,SUSE-Storage-7-2023-1920,SUSE-Storage-7.1-2023-1920,openSUSE-Leap-Micro-5.3-2023-1920,openSUSE-SLE-15.4-2023-1920 SKIP SUSE-RU-2023:1925-1 as openSUSE-SLE-15.4-2023-1925 is not security or has no CVEs. patches: SUSE-2023-1925,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1925,SUSE-SLE-Product-RT-15-SP3-2023-1925,openSUSE-SLE-15.4-2023-1925 SKIP SUSE-RU-2023:1932-1 as SUSE-Storage-7.1-2023-1932 is not security or has no CVEs. patches: SUSE-2023-1932,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-1932,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1932,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1932,SUSE-SLE-Product-RT-15-SP3-2023-1932,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1932,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1932,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1932,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1932,SUSE-SUSE-MicroOS-5.2-2023-1932,SUSE-Storage-7.1-2023-1932 SKIP SUSE-RU-2023:1933-1 as SUSE-SLE-SERVER-12-SP5-2023-1933 is not security or has no CVEs. patches: SUSE-2023-1933,SUSE-OpenStack-Cloud-9-2023-1933,SUSE-OpenStack-Cloud-Crowbar-9-2023-1933,SUSE-SLE-SAP-12-SP4-2023-1933,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1933,SUSE-SLE-SERVER-12-SP4-LTSS-2023-1933,SUSE-SLE-SERVER-12-SP5-2023-1933 SKIP SUSE-RU-2023:1934-1 as SUSE-2023-1934 is not security or has no CVEs. patches: SUSE-2023-1934,SUSE-SLE-Product-SLES-15-SP3-ERICSSON-2023-1934,SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2023-1934 SKIP SUSE-RU-2023:1935-1 as openSUSE-SLE-15.4-2023-1935 is not security or has no CVEs. patches: SUSE-2023-1935,SUSE-SLE-Micro-5.3-2023-1935,SUSE-SLE-Micro-5.4-2023-1935,SUSE-SLE-Module-Basesystem-15-SP4-2023-1935,openSUSE-Leap-Micro-5.3-2023-1935,openSUSE-SLE-15.4-2023-1935 SKIP SUSE-RU-2023:1936-1 as SUSE-Storage-7.1-2023-1936 is not security or has no CVEs. patches: SUSE-2023-1936,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1936,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1936,SUSE-SLE-Product-RT-15-SP3-2023-1936,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1936,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1936,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1936,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1936,SUSE-SUSE-MicroOS-5.1-2023-1936,SUSE-SUSE-MicroOS-5.2-2023-1936,SUSE-Storage-7.1-2023-1936 SKIP SUSE-RU-2023:1937-1 as openSUSE-SLE-15.4-2023-1937 is not security or has no CVEs. patches: SUSE-2023-1937,SUSE-SLE-Micro-5.3-2023-1937,SUSE-SLE-Micro-5.4-2023-1937,SUSE-SLE-Module-Basesystem-15-SP4-2023-1937,openSUSE-Leap-Micro-5.3-2023-1937,openSUSE-SLE-15.4-2023-1937 SKIP SUSE-RU-2023:1938-1 as openSUSE-SLE-15.4-2023-1938 is not security or has no CVEs. patches: SUSE-2023-1938,SUSE-SLE-Micro-5.3-2023-1938,SUSE-SLE-Micro-5.4-2023-1938,SUSE-SLE-Module-Basesystem-15-SP4-2023-1938,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1938,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1938,SUSE-SLE-Product-RT-15-SP3-2023-1938,SUSE-SLE-Product-WE-15-SP4-2023-1938,openSUSE-Leap-Micro-5.3-2023-1938,openSUSE-SLE-15.4-2023-1938 SKIP SUSE-RU-2023:1939-1 as openSUSE-SLE-15.4-2023-1939 is not security or has no CVEs. patches: SUSE-2023-1939,SUSE-SLE-Micro-5.3-2023-1939,SUSE-SLE-Micro-5.4-2023-1939,SUSE-SLE-Module-Basesystem-15-SP4-2023-1939,openSUSE-Leap-Micro-5.3-2023-1939,openSUSE-SLE-15.4-2023-1939 SKIP SUSE-RU-2023:1945-1 as SUSE-Storage-7.1-2023-1945 is not security or has no CVEs. patches: SUSE-2023-1945,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1945,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1945,SUSE-SLE-Product-RT-15-SP3-2023-1945,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1945,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1945,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1945,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1945,SUSE-SUSE-MicroOS-5.1-2023-1945,SUSE-SUSE-MicroOS-5.2-2023-1945,SUSE-Storage-7.1-2023-1945 SKIP SUSE-RU-2023:1946-1 as openSUSE-SLE-15.4-2023-1946 is not security or has no CVEs. patches: SUSE-2023-1946,SUSE-SLE-Module-Basesystem-15-SP4-2023-1946,openSUSE-SLE-15.4-2023-1946 SKIP SUSE-RU-2023:1952-1 as openSUSE-SLE-15.4-2023-1952 is not security or has no CVEs. patches: SUSE-2023-1952,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1952,openSUSE-SLE-15.4-2023-1952 SKIP SUSE-RU-2023:1954-1 as openSUSE-SLE-15.5-2023-1954 is not security or has no CVEs. patches: SUSE-2023-1954,SUSE-SLE-Micro-5.3-2023-1954,SUSE-SLE-Micro-5.4-2023-1954,SUSE-SLE-Module-Basesystem-15-SP4-2023-1954,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1954,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1954,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1954,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1954,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1954,SUSE-SLE-Product-RT-15-SP3-2023-1954,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1954,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1954,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1954,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1954,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1954,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1954,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1954,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1954,SUSE-SLE-Product-WE-15-SP4-2023-1954,SUSE-SUSE-MicroOS-5.1-2023-1954,SUSE-SUSE-MicroOS-5.2-2023-1954,SUSE-Storage-7-2023-1954,SUSE-Storage-7.1-2023-1954,openSUSE-Leap-Micro-5.3-2023-1954,openSUSE-SLE-15.4-2023-1954,openSUSE-SLE-15.5-2023-1954 SKIP SUSE-RU-2023:1955-1 as openSUSE-SLE-15.4-2023-1955 is not security or has no CVEs. patches: SUSE-2023-1955,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-1955,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1955,SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2023-1955,openSUSE-SLE-15.4-2023-1955 SKIP SUSE-RU-2023:1957-1 as openSUSE-SLE-15.4-2023-1957 is not security or has no CVEs. patches: SUSE-2023-1957,SUSE-SLE-Micro-5.3-2023-1957,SUSE-SLE-Micro-5.4-2023-1957,SUSE-SLE-Module-Basesystem-15-SP4-2023-1957,openSUSE-Leap-Micro-5.3-2023-1957,openSUSE-SLE-15.4-2023-1957 SKIP SUSE-RU-2023:1959-1 as openSUSE-SLE-15.4-2023-1959 is not security or has no CVEs. patches: SUSE-2023-1959,SUSE-SLE-Module-Development-Tools-15-SP4-2023-1959,SUSE-SLE-Product-RT-15-SP3-2023-1959,openSUSE-SLE-15.4-2023-1959 SKIP SUSE-RU-2023:1963-1 as openSUSE-SLE-15.4-2023-1963 is not security or has no CVEs. patches: SUSE-2023-1963,SUSE-SLE-Micro-5.3-2023-1963,SUSE-SLE-Micro-5.4-2023-1963,SUSE-SLE-Module-Basesystem-15-SP4-2023-1963,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-1963,SUSE-SLE-Module-Server-Applications-15-SP4-2023-1963,openSUSE-Leap-Micro-5.3-2023-1963,openSUSE-SLE-15.4-2023-1963 SKIP SUSE-RU-2023:1964-1 as SUSE-SLE-Product-RT-15-SP3-2023-1964 is not security or has no CVEs. patches: SUSE-2023-1964,SUSE-SLE-Product-RT-15-SP3-2023-1964,SUSE-SLE-Product-SLES-15-SP3-ERICSSON-2023-1964 SKIP SUSE-RU-2023:1965-1 as openSUSE-SLE-15.4-2023-1965 is not security or has no CVEs. patches: SUSE-2023-1965,SUSE-SLE-INSTALLER-15-SP4-2023-1965,SUSE-SLE-Product-SLES-15-SP4-2023-1965,openSUSE-SLE-15.4-2023-1965 SKIP SUSE-RU-2023:1969-1 as SUSE-Storage-7.1-2023-1969 is not security or has no CVEs. patches: SUSE-2023-1969,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1969,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1969,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1969,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1969,SUSE-SLE-Product-RT-15-SP3-2023-1969,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1969,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1969,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1969,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1969,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1969,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1969,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1969,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1969,SUSE-SUSE-MicroOS-5.1-2023-1969,SUSE-SUSE-MicroOS-5.2-2023-1969,SUSE-Storage-7-2023-1969,SUSE-Storage-7.1-2023-1969 SKIP SUSE-RU-2023:1986-1 as SUSE-SLE-SERVER-12-SP5-2023-1986 is not security or has no CVEs. patches: SUSE-2023-1986,SUSE-SLE-SERVER-12-SP5-2023-1986 SKIP SUSE-RU-2023:1991-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1991 is not security or has no CVEs. patches: SUSE-2023-1991,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1991,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1991,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1991 SKIP SUSE-RU-2023:2027-1 as openSUSE-SLE-15.4-2023-2027 is not security or has no CVEs. patches: SUSE-2023-2027,SUSE-SLE-Product-HA-15-SP1-2023-2027,SUSE-SLE-Product-HA-15-SP2-2023-2027,SUSE-SLE-Product-HA-15-SP3-2023-2027,SUSE-SLE-Product-HA-15-SP4-2023-2027,openSUSE-SLE-15.4-2023-2027 SKIP SUSE-RU-2023:2028-1 as openSUSE-SLE-15.4-2023-2028 is not security or has no CVEs. patches: SUSE-2023-2028,SUSE-SLE-INSTALLER-15-SP4-2023-2028,SUSE-SLE-Module-Basesystem-15-SP4-2023-2028,openSUSE-SLE-15.4-2023-2028 SKIP SUSE-RU-2023:2034-1 as SUSE-SLE-SERVER-12-SP5-2023-2034 is not security or has no CVEs. patches: SUSE-2023-2034,SUSE-SLE-SDK-12-SP5-2023-2034,SUSE-SLE-SERVER-12-SP5-2023-2034 SKIP SUSE-RU-2023:2039-1 as openSUSE-SLE-15.4-2023-2039 is not security or has no CVEs. patches: SUSE-2023-2039,SUSE-SLE-Micro-5.3-2023-2039,SUSE-SLE-Micro-5.4-2023-2039,SUSE-SLE-Module-Basesystem-15-SP4-2023-2039,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2039,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2039,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2039,SUSE-SLE-Product-RT-15-SP3-2023-2039,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2039,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2039,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2039,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2039,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2039,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2039,SUSE-SUSE-MicroOS-5.2-2023-2039,SUSE-Storage-7-2023-2039,SUSE-Storage-7.1-2023-2039,openSUSE-Leap-Micro-5.3-2023-2039,openSUSE-SLE-15.4-2023-2039 SKIP SUSE-RU-2023:2040-1 as openSUSE-Leap-Micro-5.3-2023-2040 is not security or has no CVEs. patches: SUSE-2023-2040,SUSE-SLE-Micro-5.3-2023-2040,SUSE-SLE-Micro-5.4-2023-2040,SUSE-SLE-Module-Basesystem-15-SP4-2023-2040,openSUSE-Leap-Micro-5.3-2023-2040 SKIP SUSE-RU-2023:2041-1 as SUSE-SLE-SERVER-12-SP5-2023-2041 is not security or has no CVEs. patches: SUSE-2023-2041,SUSE-SLE-SDK-12-SP5-2023-2041,SUSE-SLE-SERVER-12-SP5-2023-2041 SKIP SUSE-RU-2023:2042-1 as openSUSE-SLE-15.4-2023-2042 is not security or has no CVEs. patches: SUSE-2023-2042,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2042,openSUSE-SLE-15.4-2023-2042 SKIP SUSE-RU-2023:2057-1 as SUSE-SLE-SERVER-12-SP5-2023-2057 is not security or has no CVEs. patches: SUSE-2023-2057,SUSE-OpenStack-Cloud-9-2023-2057,SUSE-OpenStack-Cloud-Crowbar-9-2023-2057,SUSE-SLE-Module-Public-Cloud-12-2023-2057,SUSE-SLE-SAP-12-SP4-2023-2057,SUSE-SLE-SERVER-12-SP2-BCL-2023-2057,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2057,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2057,SUSE-SLE-SERVER-12-SP5-2023-2057 SKIP SUSE-RU-2023:2061-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2061 is not security or has no CVEs. patches: SUSE-2023-2061,SUSE-SLE-Module-Public-Cloud-12-2023-2061 SKIP SUSE-RU-2023:2063-1 as openSUSE-SLE-15.4-2023-2063 is not security or has no CVEs. patches: SUSE-2023-2063,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2063,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2063,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2063,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2063,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2063,SUSE-SLE-Product-RT-15-SP3-2023-2063,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2063,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2063,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2063,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2063,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2063,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2063,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2063,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2063,SUSE-Storage-7-2023-2063,SUSE-Storage-7.1-2023-2063,openSUSE-SLE-15.4-2023-2063 SKIP SUSE-RU-2023:2071-1 as openSUSE-SLE-15.4-2023-2071 is not security or has no CVEs. patches: SUSE-2023-2071,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2071,openSUSE-SLE-15.4-2023-2071 SKIP SUSE-RU-2023:2073-1 as SUSE-SLE-SERVER-12-SP5-2023-2073 is not security or has no CVEs. patches: SUSE-2023-2073,SUSE-OpenStack-Cloud-9-2023-2073,SUSE-OpenStack-Cloud-Crowbar-9-2023-2073,SUSE-SLE-SAP-12-SP4-2023-2073,SUSE-SLE-SDK-12-SP5-2023-2073,SUSE-SLE-SERVER-12-SP2-BCL-2023-2073,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2073,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2073,SUSE-SLE-SERVER-12-SP5-2023-2073 SKIP SUSE-RU-2023:2075-1 as openSUSE-SLE-15.4-2023-2075 is not security or has no CVEs. patches: SUSE-2023-2075,SUSE-SLE-Micro-5.3-2023-2075,SUSE-SLE-Micro-5.4-2023-2075,SUSE-SLE-Module-Containers-15-SP4-2023-2075,openSUSE-Leap-Micro-5.3-2023-2075,openSUSE-SLE-15.4-2023-2075 SKIP SUSE-RU-2023:2085-1 as SUSE-Storage-7.1-2023-2085 is not security or has no CVEs. patches: SUSE-2023-2085,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2085,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2085,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2085,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2085,SUSE-SUSE-MicroOS-5.1-2023-2085,SUSE-SUSE-MicroOS-5.2-2023-2085,SUSE-Storage-7.1-2023-2085 SKIP SUSE-RU-2023:2088-1 as openSUSE-SLE-15.4-2023-2088 is not security or has no CVEs. patches: SUSE-2023-2088,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2088,openSUSE-SLE-15.4-2023-2088 SKIP SUSE-RU-2023:2089-1 as openSUSE-SLE-15.4-2023-2089 is not security or has no CVEs. patches: SUSE-2023-2089,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2089,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2089,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2089,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2089,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2089,SUSE-SLE-Product-RT-15-SP3-2023-2089,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2089,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2089,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2089,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2089,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2089,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2089,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2089,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2089,SUSE-Storage-7-2023-2089,SUSE-Storage-7.1-2023-2089,openSUSE-SLE-15.4-2023-2089 SKIP SUSE-RU-2023:2090-1 as SUSE-SLE-SERVER-12-SP5-2023-2090 is not security or has no CVEs. patches: SUSE-2023-2090,SUSE-OpenStack-Cloud-9-2023-2090,SUSE-OpenStack-Cloud-Crowbar-9-2023-2090,SUSE-SLE-SAP-12-SP4-2023-2090,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2090,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2090,SUSE-SLE-SERVER-12-SP5-2023-2090 SKIP SUSE-RU-2023:2099-1 as openSUSE-SLE-15.4-2023-2099 is not security or has no CVEs. patches: SUSE-2023-2099,SUSE-SLE-Module-Basesystem-15-SP4-2023-2099,openSUSE-SLE-15.4-2023-2099 SKIP SUSE-RU-2023:2101-1 as openSUSE-SLE-15.4-2023-2101 is not security or has no CVEs. patches: SUSE-2023-2101,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2101,openSUSE-SLE-15.4-2023-2101 SKIP SUSE-RU-2023:2102-1 as openSUSE-SLE-15.4-2023-2102 is not security or has no CVEs. patches: SUSE-2023-2102,SUSE-SLE-Module-Basesystem-15-SP4-2023-2102,openSUSE-SLE-15.4-2023-2102 SKIP SUSE-RU-2023:2104-1 as openSUSE-SLE-15.4-2023-2104 is not security or has no CVEs. patches: SUSE-2023-2104,SUSE-SLE-Micro-5.3-2023-2104,SUSE-SLE-Micro-5.4-2023-2104,SUSE-SLE-Module-Basesystem-15-SP4-2023-2104,SUSE-SLE-Product-RT-15-SP3-2023-2104,SUSE-SUSE-MicroOS-5.1-2023-2104,SUSE-SUSE-MicroOS-5.2-2023-2104,openSUSE-Leap-Micro-5.3-2023-2104,openSUSE-SLE-15.4-2023-2104 SKIP SUSE-RU-2023:2106-1 as SUSE-Storage-7-2023-2106 is not security or has no CVEs. patches: SUSE-2023-2106,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2106,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2106,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2106,SUSE-Storage-7-2023-2106 SKIP SUSE-RU-2023:2107-1 as openSUSE-SLE-15.4-2023-2107 is not security or has no CVEs. patches: SUSE-2023-2107,SUSE-SLE-Product-HA-15-SP4-2023-2107,openSUSE-SLE-15.4-2023-2107 SKIP SUSE-RU-2023:2114-1 as openSUSE-SLE-15.4-2023-2114 is not security or has no CVEs. patches: SUSE-2023-2114,SUSE-SLE-Module-Python3-15-SP4-2023-2114,openSUSE-SLE-15.4-2023-2114 SKIP SUSE-RU-2023:2116-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2023-2116 is not security or has no CVEs. patches: SUSE-2023-2116,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-2116,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-2116,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-2116,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-2116 SKIP SUSE-RU-2023:2121-1 as openSUSE-SLE-15.4-2023-2121 is not security or has no CVEs. patches: SUSE-2023-2121,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2121,openSUSE-SLE-15.4-2023-2121 SKIP SUSE-RU-2023:2124-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2124 is not security or has no CVEs. patches: SUSE-2023-2124,SUSE-SLE-Module-Public-Cloud-12-2023-2124 SKIP SUSE-RU-2023:2128-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2128 is not security or has no CVEs. patches: SUSE-2023-2128,SUSE-SLE-Module-Public-Cloud-12-2023-2128 SKIP SUSE-RU-2023:2129-1 as openSUSE-SLE-15.4-2023-2129 is not security or has no CVEs. patches: SUSE-2023-2129,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-2129,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-2129,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-2129,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-2129,openSUSE-SLE-15.4-2023-2129 SKIP SUSE-RU-2023:2130-1 as openSUSE-SLE-15.4-2023-2130 is not security or has no CVEs. patches: SUSE-2023-2130,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-2130,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-2130,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-2130,openSUSE-SLE-15.4-2023-2130 SKIP SUSE-RU-2023:2131-1 as openSUSE-SLE-15.4-2023-2131 is not security or has no CVEs. patches: SUSE-2023-2131,SUSE-SLE-Micro-5.3-2023-2131,SUSE-SLE-Micro-5.4-2023-2131,SUSE-SLE-Module-Basesystem-15-SP4-2023-2131,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2131,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2131,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2131,SUSE-SLE-Product-RT-15-SP3-2023-2131,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2131,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2131,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2131,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2131,SUSE-SUSE-MicroOS-5.1-2023-2131,SUSE-SUSE-MicroOS-5.2-2023-2131,SUSE-Storage-7.1-2023-2131,openSUSE-Leap-Micro-5.3-2023-2131,openSUSE-SLE-15.4-2023-2131 SKIP SUSE-RU-2023:2132-1 as openSUSE-SLE-15.4-2023-2132 is not security or has no CVEs. patches: SUSE-2023-2132,SUSE-SLE-Module-Basesystem-15-SP4-2023-2132,SUSE-SLE-Module-HPC-15-SP4-2023-2132,openSUSE-SLE-15.4-2023-2132 SKIP SUSE-RU-2023:2133-1 as openSUSE-SLE-15.4-2023-2133 is not security or has no CVEs. patches: SUSE-2023-2133,SUSE-SLE-Micro-5.3-2023-2133,SUSE-SLE-Micro-5.4-2023-2133,SUSE-SLE-Module-Basesystem-15-SP4-2023-2133,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2133,SUSE-SLE-Product-RT-15-SP3-2023-2133,SUSE-SUSE-MicroOS-5.1-2023-2133,SUSE-SUSE-MicroOS-5.2-2023-2133,openSUSE-Leap-Micro-5.3-2023-2133,openSUSE-SLE-15.4-2023-2133 SKIP SUSE-RU-2023:2145-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2145 is not security or has no CVEs. patches: SUSE-2023-2145,SUSE-SLE-Module-Public-Cloud-12-2023-2145 SKIP SUSE-RU-2023:2149-1 as openSUSE-SLE-15.4-2023-2149 is not security or has no CVEs. patches: SUSE-2023-2149,SUSE-SLE-Module-Basesystem-15-SP4-2023-2149,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2149,openSUSE-SLE-15.4-2023-2149 SKIP SUSE-RU-2023:2155-1 as openSUSE-SLE-15.4-2023-2155 is not security or has no CVEs. patches: SUSE-2023-2155,SUSE-SLE-Module-Basesystem-15-SP4-2023-2155,openSUSE-SLE-15.4-2023-2155 SKIP SUSE-RU-2023:2159-1 as openSUSE-SLE-15.4-2023-2159 is not security or has no CVEs. patches: SUSE-2023-2159,SUSE-SLE-Micro-5.3-2023-2159,SUSE-SLE-Micro-5.4-2023-2159,SUSE-SLE-Module-Basesystem-15-SP4-2023-2159,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2159,SUSE-SLE-Product-RT-15-SP3-2023-2159,SUSE-SUSE-MicroOS-5.1-2023-2159,SUSE-SUSE-MicroOS-5.2-2023-2159,openSUSE-Leap-Micro-5.3-2023-2159,openSUSE-SLE-15.4-2023-2159 SKIP SUSE-RU-2023:2166-1 as openSUSE-SLE-15.4-2023-2166 is not security or has no CVEs. patches: SUSE-2023-2166,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2166,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2166,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2166,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2166,openSUSE-SLE-15.4-2023-2166 SKIP SUSE-RU-2023:2167-1 as SUSE-SLE-Product-HA-15-SP3-2023-2167 is not security or has no CVEs. patches: SUSE-2023-2167,SUSE-SLE-Product-HA-15-SP2-2023-2167,SUSE-SLE-Product-HA-15-SP3-2023-2167 SKIP SUSE-RU-2023:2168-1 as openSUSE-SLE-15.4-2023-2168 is not security or has no CVEs. patches: SUSE-2023-2168,SUSE-SLE-Product-HA-15-SP4-2023-2168,openSUSE-SLE-15.4-2023-2168 SKIP SUSE-RU-2023:2170-1 as SUSE-SLE-SERVER-12-SP5-2023-2170 is not security or has no CVEs. patches: SUSE-2023-2170,SUSE-SLE-SERVER-12-SP5-2023-2170 SKIP SUSE-RU-2023:2188-1 as openSUSE-SLE-15.4-2023-2188 is not security or has no CVEs. patches: SUSE-2023-2188,SUSE-SLE-Module-Basesystem-15-SP4-2023-2188,SUSE-SLE-Product-RT-15-SP3-2023-2188,openSUSE-SLE-15.4-2023-2188 SKIP SUSE-RU-2023:2189-1 as SUSE-SLE-SERVER-12-SP5-2023-2189 is not security or has no CVEs. patches: SUSE-2023-2189,SUSE-SLE-SERVER-12-SP5-2023-2189 SKIP SUSE-RU-2023:2190-1 as openSUSE-SLE-15.4-2023-2190 is not security or has no CVEs. patches: SUSE-2023-2190,SUSE-SLE-Module-Legacy-15-SP4-2023-2190,openSUSE-SLE-15.4-2023-2190 SKIP SUSE-RU-2023:2191-1 as SUSE-SLE-SERVER-12-SP5-2023-2191 is not security or has no CVEs. patches: SUSE-2023-2191,SUSE-SLE-SERVER-12-SP5-2023-2191 SKIP SUSE-RU-2023:2193-1 as openSUSE-SLE-15.4-2023-2193 is not security or has no CVEs. patches: SUSE-2023-2193,SUSE-SLE-Micro-5.3-2023-2193,SUSE-SLE-Micro-5.4-2023-2193,SUSE-SLE-Module-Basesystem-15-SP4-2023-2193,SUSE-SLE-Product-RT-15-SP3-2023-2193,SUSE-SUSE-MicroOS-5.1-2023-2193,SUSE-SUSE-MicroOS-5.2-2023-2193,openSUSE-Leap-Micro-5.3-2023-2193,openSUSE-SLE-15.4-2023-2193 SKIP SUSE-RU-2023:2197-1 as openSUSE-SLE-15.4-2023-2197 is not security or has no CVEs. patches: SUSE-2023-2197,SUSE-SLE-Module-Basesystem-15-SP4-2023-2197,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2197,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2197,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2197,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2197,SUSE-SLE-Product-RT-15-SP3-2023-2197,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2197,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2197,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2197,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2197,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2197,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2197,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2197,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2197,SUSE-Storage-7-2023-2197,SUSE-Storage-7.1-2023-2197,openSUSE-SLE-15.4-2023-2197 SKIP SUSE-RU-2023:2208-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2208 is not security or has no CVEs. patches: SUSE-2023-2208,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2208,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2208,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2208 SKIP SUSE-RU-2023:2209-1 as openSUSE-SLE-15.4-2023-2209 is not security or has no CVEs. patches: SUSE-2023-2209,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2209,openSUSE-SLE-15.4-2023-2209 SKIP SUSE-RU-2023:2209-2 as openSUSE-SLE-15.5-2023-2209 is not security or has no CVEs. patches: SUSE-2023-2209,openSUSE-SLE-15.5-2023-2209 SKIP SUSE-RU-2023:2214-1 as openSUSE-SLE-15.4-2023-2214 is not security or has no CVEs. patches: SUSE-2023-2214,SUSE-SLE-Micro-5.3-2023-2214,SUSE-SLE-Micro-5.4-2023-2214,SUSE-SLE-Module-Containers-15-SP4-2023-2214,openSUSE-Leap-Micro-5.3-2023-2214,openSUSE-SLE-15.4-2023-2214 SKIP SUSE-RU-2023:2216-1 as openSUSE-SLE-15.4-2023-2216 is not security or has no CVEs. patches: SUSE-2023-2216,SUSE-SLE-Micro-5.3-2023-2216,SUSE-SLE-Micro-5.4-2023-2216,SUSE-SLE-Module-Basesystem-15-SP4-2023-2216,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2216,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2216,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2216,SUSE-SLE-Product-RT-15-SP3-2023-2216,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2216,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2216,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2216,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2216,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2216,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2216,SUSE-SUSE-MicroOS-5.1-2023-2216,SUSE-SUSE-MicroOS-5.2-2023-2216,SUSE-Storage-7-2023-2216,SUSE-Storage-7.1-2023-2216,openSUSE-Leap-Micro-5.3-2023-2216,openSUSE-SLE-15.4-2023-2216 SKIP SUSE-RU-2023:2217-1 as openSUSE-SLE-15.4-2023-2217 is not security or has no CVEs. patches: SUSE-2023-2217,SUSE-SLE-Module-Basesystem-15-SP4-2023-2217,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2217,SUSE-SLE-Product-WE-15-SP4-2023-2217,openSUSE-SLE-15.4-2023-2217 SKIP SUSE-RU-2023:2220-1 as SUSE-Storage-7.1-2023-2220 is not security or has no CVEs. patches: SUSE-2023-2220,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2220,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2220,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2220,SUSE-SLE-Product-RT-15-SP3-2023-2220,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2220,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2220,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2220,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2220,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2220,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2220,SUSE-Storage-7-2023-2220,SUSE-Storage-7.1-2023-2220 SKIP SUSE-RU-2023:2235-1 as SUSE-SLE-Micro-5.4-2023-2235 is not security or has no CVEs. patches: SUSE-2023-2235,SUSE-SLE-Micro-5.4-2023-2235 SKIP SUSE-RU-2023:2236-1 as openSUSE-SLE-15.4-2023-2236 is not security or has no CVEs. patches: SUSE-2023-2236,SUSE-SLE-Micro-5.3-2023-2236,SUSE-SLE-Micro-5.4-2023-2236,SUSE-SLE-Module-Basesystem-15-SP4-2023-2236,SUSE-SLE-Module-Basesystem-15-SP5-2023-2236,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2236,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2236,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2236,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2236,SUSE-SLE-Product-RT-15-SP3-2023-2236,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2236,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2236,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2236,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2236,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2236,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2236,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2236,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2236,SUSE-SUSE-MicroOS-5.1-2023-2236,SUSE-SUSE-MicroOS-5.2-2023-2236,SUSE-Storage-7-2023-2236,SUSE-Storage-7.1-2023-2236,openSUSE-Leap-Micro-5.3-2023-2236,openSUSE-SLE-15.4-2023-2236 SKIP SUSE-RU-2023:2237-1 as openSUSE-SLE-15.4-2023-2237 is not security or has no CVEs. patches: SUSE-2023-2237,SUSE-SLE-Micro-5.3-2023-2237,SUSE-SLE-Micro-5.4-2023-2237,SUSE-SLE-Module-Basesystem-15-SP4-2023-2237,SUSE-SLE-Module-Basesystem-15-SP5-2023-2237,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2237,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2237,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2237,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2237,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2237,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2237,SUSE-SLE-Product-RT-15-SP3-2023-2237,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2237,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2237,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2237,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2237,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2237,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2237,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2237,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2237,SUSE-SUSE-MicroOS-5.1-2023-2237,SUSE-SUSE-MicroOS-5.2-2023-2237,SUSE-Storage-7-2023-2237,SUSE-Storage-7.1-2023-2237,openSUSE-Leap-Micro-5.3-2023-2237,openSUSE-SLE-15.4-2023-2237 SKIP SUSE-RU-2023:2239-1 as openSUSE-SLE-15.4-2023-2239 is not security or has no CVEs. patches: SUSE-2023-2239,SUSE-SLE-Module-Basesystem-15-SP4-2023-2239,openSUSE-SLE-15.4-2023-2239 SKIP SUSE-RU-2023:2239-2 as openSUSE-SLE-15.5-2023-2239 is not security or has no CVEs. patches: SUSE-2023-2239,SUSE-SLE-Module-Basesystem-15-SP5-2023-2239,openSUSE-SLE-15.5-2023-2239 SKIP SUSE-RU-2023:2240-1 as openSUSE-SLE-15.4-2023-2240 is not security or has no CVEs. patches: SUSE-2023-2240,SUSE-SLE-Micro-5.3-2023-2240,SUSE-SLE-Micro-5.4-2023-2240,SUSE-SLE-Module-Basesystem-15-SP4-2023-2240,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2240,openSUSE-Leap-Micro-5.3-2023-2240,openSUSE-SLE-15.4-2023-2240 SKIP SUSE-RU-2023:2240-2 as openSUSE-SLE-15.5-2023-2240 is not security or has no CVEs. patches: SUSE-2023-2240,SUSE-SLE-Module-Basesystem-15-SP5-2023-2240,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2240,openSUSE-SLE-15.5-2023-2240 SKIP SUSE-RU-2023:2245-1 as openSUSE-SLE-15.4-2023-2245 is not security or has no CVEs. patches: SUSE-2023-2245,SUSE-SLE-Micro-5.3-2023-2245,SUSE-SLE-Micro-5.4-2023-2245,SUSE-SLE-Module-Basesystem-15-SP4-2023-2245,SUSE-SLE-Module-Basesystem-15-SP5-2023-2245,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2245,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2245,openSUSE-Leap-Micro-5.3-2023-2245,openSUSE-SLE-15.4-2023-2245 SKIP SUSE-RU-2023:2245-2 as openSUSE-SLE-15.5-2023-2245 is not security or has no CVEs. patches: SUSE-2023-2245,openSUSE-SLE-15.5-2023-2245 SKIP SUSE-RU-2023:2246-1 as SUSE-SLE-SERVER-12-SP2-BCL-2023-2246 is not security or has no CVEs. patches: SUSE-2023-2246,SUSE-SLE-SERVER-12-SP2-BCL-2023-2246 SKIP SUSE-RU-2023:2247-1 as SUSE-Storage-7.1-2023-2247 is not security or has no CVEs. patches: SUSE-2023-2247,SUSE-SLE-INSTALLER-15-SP2-2023-2247,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2247,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2247,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2247,SUSE-SLE-Product-RT-15-SP3-2023-2247,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2247,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2247,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2247,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2247,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2247,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2247,SUSE-SUSE-MicroOS-5.1-2023-2247,SUSE-SUSE-MicroOS-5.2-2023-2247,SUSE-Storage-7-2023-2247,SUSE-Storage-7.1-2023-2247 SKIP SUSE-RU-2023:2248-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2248 is not security or has no CVEs. patches: SUSE-2023-2248,SUSE-SLE-INSTALLER-15-SP1-2023-2248,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2248,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2248,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2248 SKIP SUSE-RU-2023:2249-1 as SUSE-SLE-SERVER-12-SP5-2023-2249 is not security or has no CVEs. patches: SUSE-2023-2249,SUSE-OpenStack-Cloud-9-2023-2249,SUSE-OpenStack-Cloud-Crowbar-9-2023-2249,SUSE-SLE-SAP-12-SP4-2023-2249,SUSE-SLE-SDK-12-SP5-2023-2249,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2249,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2249,SUSE-SLE-SERVER-12-SP5-2023-2249 SKIP SUSE-RU-2023:2252-1 as SUSE-SLE-WE-12-SP5-2023-2252 is not security or has no CVEs. patches: SUSE-2023-2252,SUSE-OpenStack-Cloud-9-2023-2252,SUSE-OpenStack-Cloud-Crowbar-9-2023-2252,SUSE-SLE-SAP-12-SP4-2023-2252,SUSE-SLE-SDK-12-SP5-2023-2252,SUSE-SLE-SERVER-12-SP2-BCL-2023-2252,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2252,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2252,SUSE-SLE-SERVER-12-SP5-2023-2252,SUSE-SLE-WE-12-SP5-2023-2252 SKIP SUSE-RU-2023:2260-1 as SUSE-SLE-SERVER-12-SP5-2023-2260 is not security or has no CVEs. patches: SUSE-2023-2260,SUSE-SLE-SDK-12-SP5-2023-2260,SUSE-SLE-SERVER-12-SP5-2023-2260 SKIP SUSE-RU-2023:2262-1 as openSUSE-SLE-15.4-2023-2262 is not security or has no CVEs. patches: SUSE-2023-2262,SUSE-SLE-Micro-5.3-2023-2262,SUSE-SLE-Micro-5.4-2023-2262,SUSE-SLE-Module-Basesystem-15-SP4-2023-2262,SUSE-SLE-Module-Basesystem-15-SP5-2023-2262,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2262,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2262,SUSE-SLE-Product-RT-15-SP3-2023-2262,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2262,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2262,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2262,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2262,SUSE-SUSE-MicroOS-5.1-2023-2262,SUSE-SUSE-MicroOS-5.2-2023-2262,SUSE-Storage-7.1-2023-2262,openSUSE-Leap-Micro-5.3-2023-2262,openSUSE-SLE-15.4-2023-2262 SKIP SUSE-RU-2023:2262-2 as openSUSE-SLE-15.5-2023-2262 is not security or has no CVEs. patches: SUSE-2023-2262,openSUSE-SLE-15.5-2023-2262 SKIP SUSE-RU-2023:2268-1 as openSUSE-SLE-15.4-2023-2268 is not security or has no CVEs. patches: SUSE-2023-2268,openSUSE-SLE-15.4-2023-2268 SKIP SUSE-RU-2023:2268-2 as openSUSE-SLE-15.5-2023-2268 is not security or has no CVEs. patches: SUSE-2023-2268,openSUSE-SLE-15.5-2023-2268 SKIP SUSE-RU-2023:2270-1 as openSUSE-SLE-15.4-2023-2270 is not security or has no CVEs. patches: SUSE-2023-2270,openSUSE-SLE-15.4-2023-2270 SKIP SUSE-RU-2023:2272-1 as openSUSE-SLE-15.4-2023-2272 is not security or has no CVEs. patches: SUSE-2023-2272,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2272,SUSE-SLE-Product-RT-15-SP3-2023-2272,openSUSE-SLE-15.4-2023-2272 SKIP SUSE-RU-2023:2272-2 as openSUSE-SLE-15.5-2023-2272 is not security or has no CVEs. patches: SUSE-2023-2272,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2272,openSUSE-SLE-15.5-2023-2272 SKIP SUSE-RU-2023:2276-1 as openSUSE-SLE-15.4-2023-2276 is not security or has no CVEs. patches: SUSE-2023-2276,SUSE-SLE-Micro-5.3-2023-2276,SUSE-SLE-Micro-5.4-2023-2276,SUSE-SLE-Module-Basesystem-15-SP4-2023-2276,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2276,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2276,openSUSE-Leap-Micro-5.3-2023-2276,openSUSE-SLE-15.4-2023-2276 SKIP SUSE-RU-2023:2277-1 as SUSE-SLE-SDK-12-SP5-2023-2277 is not security or has no CVEs. patches: SUSE-2023-2277,SUSE-SLE-SDK-12-SP5-2023-2277 SKIP SUSE-RU-2023:2278-1 as SUSE-SUSE-MicroOS-5.2-2023-2278 is not security or has no CVEs. patches: SUSE-2023-2278,SUSE-SLE-Product-RT-15-SP3-2023-2278,SUSE-SUSE-MicroOS-5.1-2023-2278,SUSE-SUSE-MicroOS-5.2-2023-2278 SKIP SUSE-RU-2023:2279-1 as openSUSE-SLE-15.4-2023-2279 is not security or has no CVEs. patches: SUSE-2023-2279,SUSE-SLE-Micro-5.3-2023-2279,SUSE-SLE-Micro-5.4-2023-2279,SUSE-SLE-Module-Basesystem-15-SP4-2023-2279,openSUSE-Leap-Micro-5.3-2023-2279,openSUSE-SLE-15.4-2023-2279 SKIP SUSE-RU-2023:2283-1 as openSUSE-SLE-15.4-2023-2283 is not security or has no CVEs. patches: SUSE-2023-2283,SUSE-SLE-Micro-5.3-2023-2283,SUSE-SLE-Micro-5.4-2023-2283,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2283,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2283,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2283,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2283,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-2283,openSUSE-Leap-Micro-5.3-2023-2283,openSUSE-SLE-15.4-2023-2283 SKIP SUSE-RU-2023:2291-1 as SUSE-SUSE-MicroOS-5.2-2023-2291 is not security or has no CVEs. patches: SUSE-2023-2291,SUSE-SUSE-MicroOS-5.2-2023-2291 SKIP SUSE-RU-2023:2293-1 as openSUSE-SLE-15.4-2023-2293 is not security or has no CVEs. patches: SUSE-2023-2293,SUSE-SLE-Module-Basesystem-15-SP4-2023-2293,SUSE-SLE-Module-Basesystem-15-SP5-2023-2293,openSUSE-SLE-15.4-2023-2293 SKIP SUSE-RU-2023:2293-2 as openSUSE-SLE-15.5-2023-2293 is not security or has no CVEs. patches: SUSE-2023-2293,openSUSE-SLE-15.5-2023-2293 SKIP SUSE-RU-2023:2299-1 as openSUSE-SLE-15.4-2023-2299 is not security or has no CVEs. patches: SUSE-2023-2299,SUSE-SLE-Micro-5.3-2023-2299,SUSE-SLE-Micro-5.4-2023-2299,SUSE-SLE-Module-Basesystem-15-SP4-2023-2299,SUSE-SLE-Product-RT-15-SP3-2023-2299,SUSE-SUSE-MicroOS-5.1-2023-2299,SUSE-SUSE-MicroOS-5.2-2023-2299,openSUSE-Leap-Micro-5.3-2023-2299,openSUSE-SLE-15.4-2023-2299 SKIP SUSE-RU-2023:2300-1 as openSUSE-SLE-15.4-2023-2300 is not security or has no CVEs. patches: SUSE-2023-2300,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2300,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2300,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2300,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2300,SUSE-SLE-Product-RT-15-SP3-2023-2300,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2300,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2300,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2300,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2300,SUSE-Storage-7-2023-2300,SUSE-Storage-7.1-2023-2300,openSUSE-SLE-15.4-2023-2300 SKIP SUSE-RU-2023:2301-1 as openSUSE-SLE-15.4-2023-2301 is not security or has no CVEs. patches: SUSE-2023-2301,SUSE-SLE-Module-Basesystem-15-SP4-2023-2301,openSUSE-SLE-15.4-2023-2301 SKIP SUSE-RU-2023:2301-2 as openSUSE-SLE-15.5-2023-2301 is not security or has no CVEs. patches: SUSE-2023-2301,SUSE-SLE-Module-Basesystem-15-SP5-2023-2301,openSUSE-SLE-15.5-2023-2301 SKIP SUSE-RU-2023:2302-1 as SUSE-SLE-SERVER-12-SP5-2023-2302 is not security or has no CVEs. patches: SUSE-2023-2302,SUSE-OpenStack-Cloud-9-2023-2302,SUSE-OpenStack-Cloud-Crowbar-9-2023-2302,SUSE-SLE-SAP-12-SP4-2023-2302,SUSE-SLE-SERVER-12-SP2-BCL-2023-2302,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2302,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2302,SUSE-SLE-SERVER-12-SP5-2023-2302 SKIP SUSE-RU-2023:2303-1 as SUSE-SLE-SERVER-12-SP5-2023-2303 is not security or has no CVEs. patches: SUSE-2023-2303,SUSE-SLE-SERVER-12-SP5-2023-2303 SKIP SUSE-RU-2023:2305-1 as SUSE-SLE-Micro-5.4-2023-2305 is not security or has no CVEs. patches: SUSE-2023-2305,SUSE-SLE-Micro-5.4-2023-2305 SKIP SUSE-RU-2023:2306-1 as openSUSE-SLE-15.4-2023-2306 is not security or has no CVEs. patches: SUSE-2023-2306,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2306,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2306,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2306,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2306,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2306,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2306,SUSE-SLE-Product-RT-15-SP3-2023-2306,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2306,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2306,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2306,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2306,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2306,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2306,SUSE-Storage-7-2023-2306,SUSE-Storage-7.1-2023-2306,openSUSE-SLE-15.4-2023-2306 SKIP SUSE-RU-2023:2306-2 as openSUSE-SLE-15.5-2023-2306 is not security or has no CVEs. patches: SUSE-2023-2306,openSUSE-SLE-15.5-2023-2306 SKIP SUSE-RU-2023:2307-1 as openSUSE-SLE-15.4-2023-2307 is not security or has no CVEs. patches: SUSE-2023-2307,SUSE-SLE-Micro-5.3-2023-2307,SUSE-SLE-Micro-5.4-2023-2307,SUSE-SLE-Module-Basesystem-15-SP4-2023-2307,SUSE-SLE-Module-Basesystem-15-SP5-2023-2307,openSUSE-Leap-Micro-5.3-2023-2307,openSUSE-SLE-15.4-2023-2307 SKIP SUSE-RU-2023:2307-2 as openSUSE-SLE-15.5-2023-2307 is not security or has no CVEs. patches: SUSE-2023-2307,openSUSE-SLE-15.5-2023-2307 SKIP SUSE-RU-2023:2309-1 as SUSE-SLE-SERVER-12-SP4-LTSS-2023-2309 is not security or has no CVEs. patches: SUSE-2023-2309,SUSE-OpenStack-Cloud-9-2023-2309,SUSE-OpenStack-Cloud-Crowbar-9-2023-2309,SUSE-SLE-SAP-12-SP4-2023-2309,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2309,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2309 SKIP SUSE-RU-2023:2310-1 as SUSE-SLE-SERVER-12-SP5-2023-2310 is not security or has no CVEs. patches: SUSE-2023-2310,SUSE-SLE-SERVER-12-SP5-2023-2310 SKIP SUSE-RU-2023:2311-1 as openSUSE-SLE-15.4-2023-2311 is not security or has no CVEs. patches: SUSE-2023-2311,SUSE-SLE-Micro-5.3-2023-2311,SUSE-SLE-Micro-5.4-2023-2311,SUSE-SLE-Module-Basesystem-15-SP4-2023-2311,openSUSE-SLE-15.4-2023-2311 SKIP SUSE-RU-2023:2316-1 as SUSE-Storage-7.1-2023-2316 is not security or has no CVEs. patches: SUSE-2023-2316,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2316,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2316,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2316,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2316,SUSE-Storage-7.1-2023-2316 SKIP SUSE-RU-2023:2317-1 as openSUSE-SLE-15.4-2023-2317 is not security or has no CVEs. patches: SUSE-2023-2317,SUSE-SLE-Micro-5.3-2023-2317,SUSE-SLE-Micro-5.4-2023-2317,SUSE-SLE-Module-Basesystem-15-SP4-2023-2317,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2317,openSUSE-Leap-Micro-5.3-2023-2317,openSUSE-SLE-15.4-2023-2317 SKIP SUSE-RU-2023:2333-1 as openSUSE-SLE-15.4-2023-2333 is not security or has no CVEs. patches: SUSE-2023-2333,SUSE-SLE-Micro-5.3-2023-2333,SUSE-SLE-Micro-5.4-2023-2333,SUSE-SLE-Module-Basesystem-15-SP4-2023-2333,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2333,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2333,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2333,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2333,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2333,SUSE-SLE-Product-RT-15-SP3-2023-2333,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2333,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2333,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2333,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2333,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2333,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2333,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2333,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2333,SUSE-SUSE-MicroOS-5.1-2023-2333,SUSE-SUSE-MicroOS-5.2-2023-2333,SUSE-Storage-7-2023-2333,SUSE-Storage-7.1-2023-2333,openSUSE-Leap-Micro-5.3-2023-2333,openSUSE-SLE-15.4-2023-2333 SKIP SUSE-RU-2023:2335-1 as openSUSE-SLE-15.4-2023-2335 is not security or has no CVEs. patches: SUSE-2023-2335,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2335,openSUSE-SLE-15.4-2023-2335 SKIP SUSE-RU-2023:2336-1 as openSUSE-SLE-15.4-2023-2336 is not security or has no CVEs. patches: SUSE-2023-2336,SUSE-SLE-Module-Basesystem-15-SP4-2023-2336,openSUSE-SLE-15.4-2023-2336 SKIP SUSE-RU-2023:2336-2 as openSUSE-SLE-15.5-2023-2336 is not security or has no CVEs. patches: SUSE-2023-2336,SUSE-SLE-Module-Basesystem-15-SP5-2023-2336,openSUSE-SLE-15.5-2023-2336 SKIP SUSE-RU-2023:2337-1 as SUSE-SLE-SERVER-12-SP5-2023-2337 is not security or has no CVEs. patches: SUSE-2023-2337,SUSE-OpenStack-Cloud-9-2023-2337,SUSE-OpenStack-Cloud-Crowbar-9-2023-2337,SUSE-SLE-SAP-12-SP4-2023-2337,SUSE-SLE-SDK-12-SP5-2023-2337,SUSE-SLE-SERVER-12-SP2-BCL-2023-2337,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2337,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2337,SUSE-SLE-SERVER-12-SP5-2023-2337 SKIP SUSE-RU-2023:2338-1 as SUSE-SLE-SERVER-12-SP5-2023-2338 is not security or has no CVEs. patches: SUSE-2023-2338,SUSE-SLE-SDK-12-SP5-2023-2338,SUSE-SLE-SERVER-12-SP5-2023-2338 SKIP SUSE-RU-2023:2339-1 as SUSE-SLE-SERVER-12-SP5-2023-2339 is not security or has no CVEs. patches: SUSE-2023-2339,SUSE-OpenStack-Cloud-9-2023-2339,SUSE-OpenStack-Cloud-Crowbar-9-2023-2339,SUSE-SLE-SAP-12-SP4-2023-2339,SUSE-SLE-SERVER-12-SP2-BCL-2023-2339,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2339,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2339,SUSE-SLE-SERVER-12-SP5-2023-2339 SKIP SUSE-RU-2023:2340-1 as openSUSE-SLE-15.4-2023-2340 is not security or has no CVEs. patches: SUSE-2023-2340,SUSE-SLE-Module-Basesystem-15-SP4-2023-2340,SUSE-SLE-Module-Basesystem-15-SP5-2023-2340,openSUSE-SLE-15.4-2023-2340 SKIP SUSE-RU-2023:2341-1 as openSUSE-SLE-15.4-2023-2341 is not security or has no CVEs. patches: SUSE-2023-2341,SUSE-SLE-Micro-5.3-2023-2341,SUSE-SLE-Micro-5.4-2023-2341,SUSE-SLE-Module-Basesystem-15-SP4-2023-2341,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2341,openSUSE-Leap-Micro-5.3-2023-2341,openSUSE-SLE-15.4-2023-2341 SKIP SUSE-RU-2023:2341-2 as openSUSE-SLE-15.5-2023-2341 is not security or has no CVEs. patches: SUSE-2023-2341,SUSE-SLE-Module-Basesystem-15-SP5-2023-2341,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2341,openSUSE-SLE-15.5-2023-2341 SKIP SUSE-RU-2023:2352-1 as openSUSE-SLE-15.4-2023-2352 is not security or has no CVEs. patches: SUSE-2023-2352,SUSE-SLE-Module-Containers-15-SP4-2023-2352,openSUSE-SLE-15.4-2023-2352 SKIP SUSE-RU-2023:2353-1 as SUSE-SLE-SERVER-12-SP5-2023-2353 is not security or has no CVEs. patches: SUSE-2023-2353,SUSE-SLE-SDK-12-SP5-2023-2353,SUSE-SLE-SERVER-12-SP5-2023-2353 SKIP SUSE-RU-2023:2354-1 as openSUSE-SLE-15.4-2023-2354 is not security or has no CVEs. patches: SUSE-2023-2354,SUSE-SLE-INSTALLER-15-SP4-2023-2354,SUSE-SLE-Module-Basesystem-15-SP4-2023-2354,openSUSE-SLE-15.4-2023-2354 SKIP SUSE-RU-2023:2355-1 as openSUSE-SLE-15.4-2023-2355 is not security or has no CVEs. patches: SUSE-2023-2355,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2355,SUSE-SLE-Product-RT-15-SP3-2023-2355,openSUSE-SLE-15.4-2023-2355 SKIP SUSE-RU-2023:2355-2 as openSUSE-SLE-15.5-2023-2355 is not security or has no CVEs. patches: SUSE-2023-2355,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2355,openSUSE-SLE-15.5-2023-2355 SKIP SUSE-RU-2023:2355-3 as SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2355 is not security or has no CVEs. patches: SUSE-2023-2355,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2355,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2355,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2355,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2355 SKIP SUSE-RU-2023:2361-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2361 is not security or has no CVEs. patches: SUSE-2023-2361,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2361,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2361,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2361 SKIP SUSE-RU-2023:2362-1 as SUSE-SLE-SERVER-12-SP5-2023-2362 is not security or has no CVEs. patches: SUSE-2023-2362,SUSE-SLE-SERVER-12-SP5-2023-2362 SKIP SUSE-RU-2023:2363-1 as openSUSE-SLE-15.4-2023-2363 is not security or has no CVEs. patches: SUSE-2023-2363,SUSE-SLE-Micro-5.3-2023-2363,SUSE-SLE-Micro-5.4-2023-2363,SUSE-SLE-Module-Basesystem-15-SP4-2023-2363,openSUSE-Leap-Micro-5.3-2023-2363,openSUSE-SLE-15.4-2023-2363 SKIP SUSE-RU-2023:2364-1 as SUSE-SLE-WE-12-SP5-2023-2364 is not security or has no CVEs. patches: SUSE-2023-2364,SUSE-SLE-SDK-12-SP5-2023-2364,SUSE-SLE-SERVER-12-SP5-2023-2364,SUSE-SLE-WE-12-SP5-2023-2364 SKIP SUSE-RU-2023:2365-1 as SUSE-SUSE-MicroOS-5.2-2023-2365 is not security or has no CVEs. patches: SUSE-2023-2365,SUSE-SLE-Product-RT-15-SP3-2023-2365,SUSE-SUSE-MicroOS-5.1-2023-2365,SUSE-SUSE-MicroOS-5.2-2023-2365 SKIP SUSE-RU-2023:2365-2 as SUSE-Storage-7.1-2023-2365 is not security or has no CVEs. patches: SUSE-2023-2365,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2365,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2365,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2365,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2365,SUSE-Storage-7.1-2023-2365 SKIP SUSE-RU-2023:2365-3 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2365 is not security or has no CVEs. patches: SUSE-2023-2365,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2365,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2365 SKIP SUSE-RU-2023:2366-1 as openSUSE-SLE-15.4-2023-2366 is not security or has no CVEs. patches: SUSE-2023-2366,SUSE-SLE-Micro-5.3-2023-2366,SUSE-SLE-Micro-5.4-2023-2366,SUSE-SLE-Module-Basesystem-15-SP4-2023-2366,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2366,openSUSE-Leap-Micro-5.3-2023-2366,openSUSE-SLE-15.4-2023-2366 SKIP SUSE-RU-2023:2380-1 as openSUSE-SLE-15.4-2023-2380 is not security or has no CVEs. patches: SUSE-2023-2380,SUSE-SLE-INSTALLER-15-SP4-2023-2380,openSUSE-SLE-15.4-2023-2380 SKIP SUSE-RU-2023:2381-1 as openSUSE-SLE-15.5-2023-2381 is not security or has no CVEs. patches: SUSE-2023-2381,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2381,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2381,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2381,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2381,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2381,SUSE-SLE-Product-RT-15-SP3-2023-2381,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2381,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2381,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2381,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2381,SUSE-Storage-7-2023-2381,SUSE-Storage-7.1-2023-2381,openSUSE-SLE-15.4-2023-2381,openSUSE-SLE-15.5-2023-2381 SKIP SUSE-RU-2023:2382-1 as SUSE-SLE-Module-Live-Patching-15-SP5-2023-2382 is not security or has no CVEs. patches: SUSE-2023-2382,SUSE-SLE-Module-Live-Patching-15-SP5-2023-2382 SKIP SUSE-RU-2023:2383-1 as openSUSE-SLE-15.5-2023-2383 is not security or has no CVEs. patches: SUSE-2023-2383,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2383,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2383,SUSE-SLE-Product-RT-15-SP3-2023-2383,openSUSE-SLE-15.4-2023-2383,openSUSE-SLE-15.5-2023-2383 SKIP SUSE-RU-2023:2430 as openSUSE-SLE-15.5-2023-2430 is not security or has no CVEs. patches: SUSE-SLE-Micro-5.3-2023-2430,SUSE-SLE-Micro-5.4-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-2430,openSUSE-SLE-15.4-2023-2430,openSUSE-SLE-15.5-2023-2430 SKIP SUSE-RU-2023:2430-1 as openSUSE-SLE-15.5-2023-2430 is not security or has no CVEs. patches: SUSE-2023-2430,SUSE-SLE-Micro-5.3-2023-2430,SUSE-SLE-Micro-5.4-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2430,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-2430,openSUSE-SLE-15.4-2023-2430,openSUSE-SLE-15.5-2023-2430 SKIP SUSE-RU-2023:2432 as openSUSE-SLE-15.5-2023-2432 is not security or has no CVEs. patches: openSUSE-SLE-15.4-2023-2432,openSUSE-SLE-15.5-2023-2432 SKIP SUSE-RU-2023:2432-1 as openSUSE-SLE-15.5-2023-2432 is not security or has no CVEs. patches: SUSE-2023-2432,openSUSE-SLE-15.4-2023-2432,openSUSE-SLE-15.5-2023-2432 SKIP SUSE-RU-2023:2433 as openSUSE-SLE-15.5-2023-2433 is not security or has no CVEs. patches: openSUSE-SLE-15.4-2023-2433,openSUSE-SLE-15.5-2023-2433 SKIP SUSE-RU-2023:2433-1 as openSUSE-SLE-15.5-2023-2433 is not security or has no CVEs. patches: SUSE-2023-2433,openSUSE-SLE-15.4-2023-2433,openSUSE-SLE-15.5-2023-2433 SKIP SUSE-RU-2023:2435 as openSUSE-SLE-15.4-2023-2435 is not security or has no CVEs. patches: SUSE-SLE-Module-Development-Tools-15-SP4-2023-2435,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2435,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2435,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2435,SUSE-SLE-Product-RT-15-SP3-2023-2435,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2435,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2435,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2435,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2435,SUSE-Storage-7-2023-2435,SUSE-Storage-7.1-2023-2435,openSUSE-SLE-15.4-2023-2435 SKIP SUSE-RU-2023:2435-1 as openSUSE-SLE-15.4-2023-2435 is not security or has no CVEs. patches: SUSE-2023-2435,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2435,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2435,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2435,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2435,SUSE-SLE-Product-RT-15-SP3-2023-2435,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2435,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2435,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2435,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2435,SUSE-Storage-7-2023-2435,SUSE-Storage-7.1-2023-2435,openSUSE-SLE-15.4-2023-2435 SKIP SUSE-RU-2023:2437 as openSUSE-SLE-15.4-2023-2437 is not security or has no CVEs. patches: SUSE-SLE-Module-Basesystem-15-SP4-2023-2437,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2437,openSUSE-SLE-15.4-2023-2437 SKIP SUSE-RU-2023:2437-1 as openSUSE-SLE-15.4-2023-2437 is not security or has no CVEs. patches: SUSE-2023-2437,SUSE-SLE-Module-Basesystem-15-SP4-2023-2437,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2437,openSUSE-SLE-15.4-2023-2437 SKIP SUSE-RU-2023:2437-2 as openSUSE-SLE-15.5-2023-2437 is not security or has no CVEs. patches: SUSE-2023-2437,SUSE-SLE-Module-Basesystem-15-SP5-2023-2437,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2437,openSUSE-SLE-15.5-2023-2437 SKIP SUSE-RU-2023:2438 as openSUSE-SLE-15.4-2023-2438 is not security or has no CVEs. patches: SUSE-SLE-Micro-5.3-2023-2438,SUSE-SLE-Micro-5.4-2023-2438,SUSE-SLE-Module-Basesystem-15-SP4-2023-2438,openSUSE-Leap-Micro-5.3-2023-2438,openSUSE-SLE-15.4-2023-2438 SKIP SUSE-RU-2023:2438-1 as openSUSE-SLE-15.4-2023-2438 is not security or has no CVEs. patches: SUSE-2023-2438,SUSE-SLE-Micro-5.3-2023-2438,SUSE-SLE-Micro-5.4-2023-2438,SUSE-SLE-Module-Basesystem-15-SP4-2023-2438,openSUSE-Leap-Micro-5.3-2023-2438,openSUSE-SLE-15.4-2023-2438 SKIP SUSE-RU-2023:2444-1 as openSUSE-SLE-15.4-2023-2444 is not security or has no CVEs. patches: SUSE-2023-2444,SUSE-SLE-Product-HA-15-SP4-2023-2444,openSUSE-SLE-15.4-2023-2444 SKIP SUSE-RU-2023:2451-1 as SUSE-SLE-SERVER-12-SP5-2023-2451 is not security or has no CVEs. patches: SUSE-2023-2451,SUSE-OpenStack-Cloud-9-2023-2451,SUSE-OpenStack-Cloud-Crowbar-9-2023-2451,SUSE-SLE-SAP-12-SP4-2023-2451,SUSE-SLE-SERVER-12-SP2-BCL-2023-2451,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2451,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2451,SUSE-SLE-SERVER-12-SP5-2023-2451 SKIP SUSE-RU-2023:2452-1 as openSUSE-SLE-15.5-2023-2452 is not security or has no CVEs. patches: SUSE-2023-2452,SUSE-SLE-Module-Basesystem-15-SP5-2023-2452,openSUSE-SLE-15.5-2023-2452 SKIP SUSE-RU-2023:2472-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2472 is not security or has no CVEs. patches: SUSE-2023-2472,SUSE-SLE-INSTALLER-15-SP1-2023-2472,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2472,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2472,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2472 SKIP SUSE-RU-2023:2480-1 as SUSE-SLE-SERVER-12-SP5-2023-2480 is not security or has no CVEs. patches: SUSE-2023-2480,SUSE-SLE-SERVER-12-SP5-2023-2480 SKIP SUSE-RU-2023:2481-1 as openSUSE-SLE-15.5-2023-2481 is not security or has no CVEs. patches: SUSE-2023-2481,SUSE-SLE-Module-Basesystem-15-SP5-2023-2481,openSUSE-SLE-15.5-2023-2481 SKIP SUSE-RU-2023:2482-1 as openSUSE-SLE-15.4-2023-2482 is not security or has no CVEs. patches: SUSE-2023-2482,SUSE-SLE-Micro-5.3-2023-2482,SUSE-SLE-Micro-5.4-2023-2482,SUSE-SLE-Module-Basesystem-15-SP4-2023-2482,SUSE-SLE-Module-Basesystem-15-SP5-2023-2482,SUSE-SLE-Product-RT-15-SP3-2023-2482,openSUSE-Leap-Micro-5.3-2023-2482,openSUSE-SLE-15.4-2023-2482 SKIP SUSE-RU-2023:2482-2 as openSUSE-SLE-15.5-2023-2482 is not security or has no CVEs. patches: SUSE-2023-2482,openSUSE-SLE-15.5-2023-2482 SKIP SUSE-RU-2023:2488-1 as SUSE-Storage-7.1-2023-2488 is not security or has no CVEs. patches: SUSE-2023-2488,SUSE-Storage-7.1-2023-2488 SKIP SUSE-RU-2023:2494-1 as openSUSE-SLE-15.4-2023-2494 is not security or has no CVEs. patches: SUSE-2023-2494,SUSE-SLE-INSTALLER-15-SP4-2023-2494,SUSE-SLE-Module-Basesystem-15-SP4-2023-2494,openSUSE-SLE-15.4-2023-2494 SKIP SUSE-RU-2023:2495-1 as openSUSE-SLE-15.5-2023-2495 is not security or has no CVEs. patches: SUSE-2023-2495,SUSE-SLE-Micro-5.3-2023-2495,SUSE-SLE-Micro-5.4-2023-2495,SUSE-SLE-Module-Basesystem-15-SP4-2023-2495,SUSE-SLE-Module-Basesystem-15-SP5-2023-2495,openSUSE-Leap-Micro-5.3-2023-2495,openSUSE-SLE-15.4-2023-2495,openSUSE-SLE-15.5-2023-2495 SKIP SUSE-RU-2023:2496-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2496 is not security or has no CVEs. patches: SUSE-2023-2496,SUSE-SLE-INSTALLER-15-SP1-2023-2496,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2496,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2496,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2496 SKIP SUSE-RU-2023:2497-1 as SUSE-Storage-7.1-2023-2497 is not security or has no CVEs. patches: SUSE-2023-2497,SUSE-SLE-INSTALLER-15-SP2-2023-2497,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2497,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2497,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2497,SUSE-SLE-Product-RT-15-SP3-2023-2497,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2497,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2497,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2497,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2497,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2497,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2497,SUSE-SUSE-MicroOS-5.1-2023-2497,SUSE-SUSE-MicroOS-5.2-2023-2497,SUSE-Storage-7-2023-2497,SUSE-Storage-7.1-2023-2497 SKIP SUSE-RU-2023:2498-1 as SUSE-SLE-Product-RT-15-SP3-2023-2498 is not security or has no CVEs. patches: SUSE-2023-2498,SUSE-SLE-Product-RT-15-SP3-2023-2498 SKIP SUSE-RU-2023:2510-1 as openSUSE-SLE-15.4-2023-2510 is not security or has no CVEs. patches: SUSE-2023-2510,SUSE-SLE-Micro-5.3-2023-2510,SUSE-SLE-Micro-5.4-2023-2510,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2510,SUSE-SLE-Product-HA-15-SP4-2023-2510,SUSE-SLE-Product-HA-15-SP5-2023-2510,openSUSE-Leap-Micro-5.3-2023-2510,openSUSE-SLE-15.4-2023-2510 SKIP SUSE-RU-2023:2510-2 as openSUSE-SLE-15.5-2023-2510 is not security or has no CVEs. patches: SUSE-2023-2510,openSUSE-SLE-15.5-2023-2510 SKIP SUSE-RU-2023:2511-1 as openSUSE-SLE-15.5-2023-2511 is not security or has no CVEs. patches: SUSE-2023-2511,SUSE-SLE-Module-Basesystem-15-SP5-2023-2511,openSUSE-SLE-15.5-2023-2511 SKIP SUSE-RU-2023:2512-1 as SUSE-SLE-SERVER-12-SP5-2023-2512 is not security or has no CVEs. patches: SUSE-2023-2512,SUSE-SLE-SERVER-12-SP5-2023-2512 SKIP SUSE-RU-2023:2514-1 as SUSE-SUSE-MicroOS-5.1-2023-2514 is not security or has no CVEs. patches: SUSE-2023-2514,SUSE-SUSE-MicroOS-5.1-2023-2514 SKIP SUSE-RU-2023:2519-1 as openSUSE-SLE-15.5-2023-2519 is not security or has no CVEs. patches: SUSE-2023-2519,SUSE-SLE-Micro-5.3-2023-2519,SUSE-SLE-Micro-5.4-2023-2519,SUSE-SLE-Module-Basesystem-15-SP4-2023-2519,SUSE-SLE-Module-Basesystem-15-SP5-2023-2519,SUSE-SLE-Product-RT-15-SP3-2023-2519,SUSE-SUSE-MicroOS-5.1-2023-2519,SUSE-SUSE-MicroOS-5.2-2023-2519,openSUSE-Leap-Micro-5.3-2023-2519,openSUSE-SLE-15.4-2023-2519,openSUSE-SLE-15.5-2023-2519 SKIP SUSE-RU-2023:2521-1 as SUSE-SLE-Module-Live-Patching-15-SP4-2023-2521 is not security or has no CVEs. patches: SUSE-2023-2521,SUSE-SLE-Module-Live-Patching-15-SP4-2023-2521 SKIP SUSE-RU-2023:2524-1 as openSUSE-SLE-15.4-2023-2524 is not security or has no CVEs. patches: SUSE-2023-2524,SUSE-SLE-Module-Live-Patching-15-SP4-2023-2524,openSUSE-SLE-15.4-2023-2524 SKIP SUSE-RU-2023:2527-1 as SUSE-SLE-Micro-5.4-2023-2527 is not security or has no CVEs. patches: SUSE-2023-2527,SUSE-SLE-Micro-5.4-2023-2527 SKIP SUSE-RU-2023:2528-1 as openSUSE-SLE-15.4-2023-2528 is not security or has no CVEs. patches: SUSE-2023-2528,SUSE-SLE-Module-Basesystem-15-SP4-2023-2528,openSUSE-SLE-15.4-2023-2528 SKIP SUSE-RU-2023:2547-1 as openSUSE-SLE-15.5-2023-2547 is not security or has no CVEs. patches: SUSE-2023-2547,SUSE-SLE-Micro-5.3-2023-2547,SUSE-SLE-Micro-5.4-2023-2547,SUSE-SLE-Module-Basesystem-15-SP4-2023-2547,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2547,openSUSE-Leap-Micro-5.3-2023-2547,openSUSE-SLE-15.4-2023-2547,openSUSE-SLE-15.5-2023-2547 SKIP SUSE-RU-2023:2548-1 as SUSE-Storage-7.1-2023-2548 is not security or has no CVEs. patches: SUSE-2023-2548,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2548,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2548,SUSE-SLE-Product-RT-15-SP3-2023-2548,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2548,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2548,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2548,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2548,SUSE-SUSE-MicroOS-5.1-2023-2548,SUSE-SUSE-MicroOS-5.2-2023-2548,SUSE-Storage-7.1-2023-2548 SKIP SUSE-RU-2023:2549-1 as openSUSE-SLE-15.5-2023-2549 is not security or has no CVEs. patches: SUSE-2023-2549,SUSE-SLE-Module-Basesystem-15-SP5-2023-2549,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2549,openSUSE-SLE-15.5-2023-2549 SKIP SUSE-RU-2023:2550-1 as openSUSE-SLE-15.5-2023-2550 is not security or has no CVEs. patches: SUSE-2023-2550,SUSE-SLE-INSTALLER-15-SP4-2023-2550,SUSE-SLE-INSTALLER-15-SP5-2023-2550,SUSE-SLE-Micro-5.3-2023-2550,SUSE-SLE-Micro-5.4-2023-2550,SUSE-SLE-Module-Basesystem-15-SP4-2023-2550,SUSE-SLE-Module-Basesystem-15-SP5-2023-2550,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2550,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2550,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2550,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2550,openSUSE-Leap-Micro-5.3-2023-2550,openSUSE-SLE-15.4-2023-2550,openSUSE-SLE-15.5-2023-2550 SKIP SUSE-RU-2023:2553-1 as SUSE-SLE-SERVER-12-SP5-2023-2553 is not security or has no CVEs. patches: SUSE-2023-2553,SUSE-OpenStack-Cloud-9-2023-2553,SUSE-OpenStack-Cloud-Crowbar-9-2023-2553,SUSE-SLE-SAP-12-SP4-2023-2553,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2553,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2553,SUSE-SLE-SERVER-12-SP5-2023-2553 SKIP SUSE-RU-2023:2554-1 as openSUSE-SLE-15.5-2023-2554 is not security or has no CVEs. patches: SUSE-2023-2554,SUSE-SLE-Module-Basesystem-15-SP5-2023-2554,openSUSE-SLE-15.5-2023-2554 SKIP SUSE-RU-2023:2555-1 as SUSE-SLE-Module-SAP-Applications-15-SP5-2023-2555 is not security or has no CVEs. patches: SUSE-2023-2555,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-2555 SKIP SUSE-RU-2023:2556-1 as SUSE-SLE-Micro-5.4-2023-2556 is not security or has no CVEs. patches: SUSE-2023-2556,SUSE-SLE-Micro-5.4-2023-2556 SKIP SUSE-RU-2023:2557-1 as SUSE-SLE-Module-Basesystem-15-SP5-2023-2557 is not security or has no CVEs. patches: SUSE-2023-2557,SUSE-SLE-Module-Basesystem-15-SP5-2023-2557 SKIP SUSE-RU-2023:2558-1 as openSUSE-SLE-15.5-2023-2558 is not security or has no CVEs. patches: SUSE-2023-2558,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2558,openSUSE-SLE-15.5-2023-2558 SKIP SUSE-RU-2023:2559-1 as openSUSE-SLE-15.5-2023-2559 is not security or has no CVEs. patches: SUSE-2023-2559,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2559,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2559,openSUSE-SLE-15.4-2023-2559,openSUSE-SLE-15.5-2023-2559 SKIP SUSE-RU-2023:2560-1 as openSUSE-SLE-15.5-2023-2560 is not security or has no CVEs. patches: SUSE-2023-2560,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2560,openSUSE-SLE-15.4-2023-2560,openSUSE-SLE-15.5-2023-2560 SKIP SUSE-RU-2023:2564-1 as openSUSE-Leap-Micro-5.3-2023-2564 is not security or has no CVEs. patches: SUSE-2023-2564,SUSE-SLE-Micro-5.3-2023-2564,openSUSE-Leap-Micro-5.3-2023-2564 SKIP SUSE-RU-2023:2565-1 as SUSE-SUSE-MicroOS-5.2-2023-2565 is not security or has no CVEs. patches: SUSE-2023-2565,SUSE-SUSE-MicroOS-5.2-2023-2565 ERROR: notice SUSE-RU-2023:2567-1 has no valid patches out of: SUSE-2023-2567,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-2567 ERROR: notice SUSE-RU-2023:2568-1 has no valid patches out of: SUSE-2023-2568,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-2568 SKIP SUSE-RU-2023:2573-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2573 is not security or has no CVEs. patches: SUSE-2023-2573,SUSE-SLE-Manager-Tools-15-2023-2573,SUSE-SLE-Manager-Tools-For-Micro-5-2023-2573,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2573,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2573 SKIP SUSE-RU-2023:2583-1 as SUSE-EL-9-CLIENT-TOOLS-2023-2583 is not security or has no CVEs. patches: SUSE-2023-2583,SUSE-EL-9-CLIENT-TOOLS-2023-2583 SKIP SUSE-RU-2023:2597-1 as openSUSE-SLE-15.5-2023-2597 is not security or has no CVEs. patches: SUSE-2023-2597,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-2597,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-2597,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-2597,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-2597,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-2597,openSUSE-SLE-15.4-2023-2597,openSUSE-SLE-15.5-2023-2597 SKIP SUSE-RU-2023:2615-1 as openSUSE-SLE-15.5-2023-2615 is not security or has no CVEs. patches: SUSE-2023-2615,SUSE-SLE-Module-Basesystem-15-SP5-2023-2615,openSUSE-SLE-15.5-2023-2615 SKIP SUSE-RU-2023:2625-1 as openSUSE-SLE-15.5-2023-2625 is not security or has no CVEs. patches: SUSE-2023-2625,SUSE-SLE-INSTALLER-15-SP1-2023-2625,SUSE-SLE-INSTALLER-15-SP2-2023-2625,SUSE-SLE-INSTALLER-15-SP3-2023-2625,SUSE-SLE-INSTALLER-15-SP4-2023-2625,SUSE-SLE-Micro-5.3-2023-2625,SUSE-SLE-Micro-5.4-2023-2625,SUSE-SLE-Module-Basesystem-15-SP4-2023-2625,SUSE-SLE-Module-Basesystem-15-SP5-2023-2625,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2625,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2625,SUSE-SLE-Module-Legacy-15-SP4-2023-2625,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2625,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2625,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2625,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2625,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2625,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2625,SUSE-SLE-Product-RT-15-SP3-2023-2625,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2625,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2625,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2625,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2625,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2625,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2625,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2625,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2625,SUSE-SUSE-MicroOS-5.1-2023-2625,SUSE-SUSE-MicroOS-5.2-2023-2625,SUSE-Storage-7-2023-2625,SUSE-Storage-7.1-2023-2625,openSUSE-Leap-Micro-5.3-2023-2625,openSUSE-SLE-15.4-2023-2625,openSUSE-SLE-15.5-2023-2625 SKIP SUSE-RU-2023:2626-1 as openSUSE-SLE-15.5-2023-2626 is not security or has no CVEs. patches: SUSE-2023-2626,openSUSE-SLE-15.4-2023-2626,openSUSE-SLE-15.5-2023-2626 SKIP SUSE-RU-2023:2627-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2627 is not security or has no CVEs. patches: SUSE-2023-2627,SUSE-SLE-Module-Public-Cloud-12-2023-2627 SKIP SUSE-RU-2023:2629-1 as openSUSE-SLE-15.4-2023-2629 is not security or has no CVEs. patches: SUSE-2023-2629,openSUSE-SLE-15.4-2023-2629 SKIP SUSE-RU-2023:2631-1 as SUSE-SLE-SERVER-12-SP5-2023-2631 is not security or has no CVEs. patches: SUSE-2023-2631,SUSE-SLE-SERVER-12-SP5-2023-2631 SKIP SUSE-RU-2023:2632-1 as openSUSE-Leap-Micro-5.3-2023-2632 is not security or has no CVEs. patches: SUSE-2023-2632,SUSE-SLE-Micro-5.3-2023-2632,SUSE-SLE-Micro-5.4-2023-2632,SUSE-SLE-Module-Basesystem-15-SP4-2023-2632,openSUSE-Leap-Micro-5.3-2023-2632 SKIP SUSE-RU-2023:2644-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2644 is not security or has no CVEs. patches: SUSE-2023-2644,SUSE-SLE-INSTALLER-15-SP1-2023-2644,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2644,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2644,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2644 SKIP SUSE-RU-2023:2645-1 as openSUSE-SLE-15.5-2023-2645 is not security or has no CVEs. patches: SUSE-2023-2645,SUSE-SLE-Micro-5.3-2023-2645,SUSE-SLE-Micro-5.4-2023-2645,SUSE-SLE-Module-Basesystem-15-SP4-2023-2645,SUSE-SLE-Module-Basesystem-15-SP5-2023-2645,SUSE-SLE-Product-RT-15-SP3-2023-2645,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2645,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2645,SUSE-SUSE-MicroOS-5.1-2023-2645,SUSE-SUSE-MicroOS-5.2-2023-2645,openSUSE-Leap-Micro-5.3-2023-2645,openSUSE-SLE-15.4-2023-2645,openSUSE-SLE-15.5-2023-2645 SKIP SUSE-RU-2023:2649-1 as openSUSE-SLE-15.5-2023-2649 is not security or has no CVEs. patches: SUSE-2023-2649,SUSE-SLE-Manager-Tools-15-2023-2649,SUSE-SLE-Micro-5.3-2023-2649,SUSE-SLE-Micro-5.4-2023-2649,SUSE-SLE-Module-Basesystem-15-SP4-2023-2649,SUSE-SLE-Module-Basesystem-15-SP5-2023-2649,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-2649,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2649,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2649,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2649,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2649,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2649,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2649,SUSE-SLE-Product-RT-15-SP3-2023-2649,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2649,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2649,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2649,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2649,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2649,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2649,SUSE-SUSE-MicroOS-5.2-2023-2649,SUSE-Storage-7-2023-2649,SUSE-Storage-7.1-2023-2649,openSUSE-Leap-Micro-5.3-2023-2649,openSUSE-SLE-15.4-2023-2649,openSUSE-SLE-15.5-2023-2649 SKIP SUSE-RU-2023:2657-1 as openSUSE-SLE-15.4-2023-2657 is not security or has no CVEs. patches: SUSE-2023-2657,SUSE-SLE-Micro-5.3-2023-2657,SUSE-SLE-Micro-5.4-2023-2657,SUSE-SLE-Module-Basesystem-15-SP4-2023-2657,openSUSE-Leap-Micro-5.3-2023-2657,openSUSE-SLE-15.4-2023-2657 SKIP SUSE-RU-2023:2658-1 as openSUSE-SLE-15.5-2023-2658 is not security or has no CVEs. patches: SUSE-2023-2658,SUSE-SLE-Micro-5.3-2023-2658,SUSE-SLE-Micro-5.4-2023-2658,SUSE-SLE-Module-Containers-15-SP4-2023-2658,SUSE-SLE-Module-Containers-15-SP5-2023-2658,SUSE-SUSE-MicroOS-5.1-2023-2658,SUSE-SUSE-MicroOS-5.2-2023-2658,SUSE-Storage-7-2023-2658,SUSE-Storage-7.1-2023-2658,openSUSE-Leap-Micro-5.3-2023-2658,openSUSE-SLE-15.4-2023-2658,openSUSE-SLE-15.5-2023-2658 SKIP SUSE-RU-2023:2658-2 as SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2658 is not security or has no CVEs. patches: SUSE-2023-2658,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2658,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2658,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2658,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2658,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2658,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2658,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2658,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2658,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2658,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2658 SKIP SUSE-RU-2023:2661-1 as SUSE-SLE-SERVER-12-SP5-2023-2661 is not security or has no CVEs. patches: SUSE-2023-2661,SUSE-OpenStack-Cloud-9-2023-2661,SUSE-OpenStack-Cloud-Crowbar-9-2023-2661,SUSE-SLE-Module-Toolchain-12-2023-2661,SUSE-SLE-SAP-12-SP4-2023-2661,SUSE-SLE-SERVER-12-SP2-BCL-2023-2661,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2661,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2661,SUSE-SLE-SERVER-12-SP5-2023-2661 SKIP SUSE-RU-2023:2671-1 as openSUSE-SLE-15.5-2023-2671 is not security or has no CVEs. patches: SUSE-2023-2671,openSUSE-SLE-15.5-2023-2671 SKIP SUSE-RU-2023:2705-1 as SUSE-SLE-Live-Patching-12-SP5-2023-2705 is not security or has no CVEs. patches: SUSE-2023-2705,SUSE-SLE-Live-Patching-12-2023-2705,SUSE-SLE-Live-Patching-12-SP4-2023-2705,SUSE-SLE-Live-Patching-12-SP5-2023-2705 SKIP SUSE-RU-2023:2715-1 as openSUSE-SLE-15.4-2023-2715 is not security or has no CVEs. patches: SUSE-2023-2715,SUSE-SLE-INSTALLER-15-SP4-2023-2715,SUSE-SLE-Module-Basesystem-15-SP4-2023-2715,openSUSE-SLE-15.4-2023-2715 SKIP SUSE-RU-2023:2739-1 as openSUSE-SLE-15.5-2023-2739 is not security or has no CVEs. patches: SUSE-2023-2739,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2739,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2739,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2739,SUSE-SLE-Module-Live-Patching-15-SP4-2023-2739,SUSE-SLE-Module-Live-Patching-15-SP5-2023-2739,openSUSE-SLE-15.4-2023-2739,openSUSE-SLE-15.5-2023-2739 SKIP SUSE-RU-2023:2740-1 as openSUSE-SLE-15.5-2023-2740 is not security or has no CVEs. patches: SUSE-2023-2740,SUSE-SLE-Module-Basesystem-15-SP5-2023-2740,openSUSE-SLE-15.5-2023-2740 SKIP SUSE-RU-2023:2742-1 as openSUSE-SLE-15.5-2023-2742 is not security or has no CVEs. patches: SUSE-2023-2742,SUSE-SLE-INSTALLER-15-SP2-2023-2742,SUSE-SLE-INSTALLER-15-SP3-2023-2742,SUSE-SLE-Micro-5.3-2023-2742,SUSE-SLE-Micro-5.4-2023-2742,SUSE-SLE-Module-Basesystem-15-SP4-2023-2742,SUSE-SLE-Module-Basesystem-15-SP5-2023-2742,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2742,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2742,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2742,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2742,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2742,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2742,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2742,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-2742,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2742,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2742,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2742,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2742,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2742,SUSE-SLE-Product-RT-15-SP3-2023-2742,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2742,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2742,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2742,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2742,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2742,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2742,SUSE-SUSE-MicroOS-5.1-2023-2742,SUSE-SUSE-MicroOS-5.2-2023-2742,SUSE-Storage-7-2023-2742,SUSE-Storage-7.1-2023-2742,openSUSE-Leap-Micro-5.3-2023-2742,openSUSE-SLE-15.4-2023-2742,openSUSE-SLE-15.5-2023-2742 SKIP SUSE-RU-2023:2747-1 as openSUSE-SLE-15.5-2023-2747 is not security or has no CVEs. patches: SUSE-2023-2747,SUSE-SLE-Module-Basesystem-15-SP5-2023-2747,openSUSE-SLE-15.5-2023-2747 SKIP SUSE-RU-2023:2748-1 as openSUSE-SLE-15.5-2023-2748 is not security or has no CVEs. patches: SUSE-2023-2748,SUSE-SLE-Module-Live-Patching-15-SP4-2023-2748,SUSE-SLE-Module-Live-Patching-15-SP5-2023-2748,openSUSE-SLE-15.4-2023-2748,openSUSE-SLE-15.5-2023-2748 SKIP SUSE-RU-2023:2761-1 as openSUSE-SLE-15.5-2023-2761 is not security or has no CVEs. patches: SUSE-2023-2761,SUSE-SLE-Micro-5.3-2023-2761,SUSE-SLE-Micro-5.4-2023-2761,SUSE-SLE-Module-Basesystem-15-SP4-2023-2761,SUSE-SLE-Module-Basesystem-15-SP5-2023-2761,SUSE-SLE-Product-RT-15-SP3-2023-2761,SUSE-SUSE-MicroOS-5.1-2023-2761,SUSE-SUSE-MicroOS-5.2-2023-2761,openSUSE-Leap-Micro-5.3-2023-2761,openSUSE-SLE-15.4-2023-2761,openSUSE-SLE-15.5-2023-2761 SKIP SUSE-RU-2023:2767-1 as openSUSE-SLE-15.4-2023-2767 is not security or has no CVEs. patches: SUSE-2023-2767,SUSE-SLE-Micro-5.3-2023-2767,SUSE-SLE-Micro-5.4-2023-2767,SUSE-SLE-Module-Basesystem-15-SP4-2023-2767,openSUSE-Leap-Micro-5.3-2023-2767,openSUSE-SLE-15.4-2023-2767 SKIP SUSE-RU-2023:2771-1 as SUSE-SLE-SERVER-12-SP5-2023-2771 is not security or has no CVEs. patches: SUSE-2023-2771,SUSE-OpenStack-Cloud-9-2023-2771,SUSE-OpenStack-Cloud-Crowbar-9-2023-2771,SUSE-SLE-SAP-12-SP4-2023-2771,SUSE-SLE-SDK-12-SP5-2023-2771,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2771,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2771,SUSE-SLE-SERVER-12-SP5-2023-2771 SKIP SUSE-RU-2023:2772-1 as openSUSE-SLE-15.5-2023-2772 is not security or has no CVEs. patches: SUSE-2023-2772,SUSE-SLE-INSTALLER-15-SP4-2023-2772,SUSE-SLE-INSTALLER-15-SP5-2023-2772,SUSE-SLE-Micro-5.3-2023-2772,SUSE-SLE-Micro-5.4-2023-2772,SUSE-SLE-Module-Basesystem-15-SP4-2023-2772,SUSE-SLE-Module-Basesystem-15-SP5-2023-2772,openSUSE-Leap-Micro-5.3-2023-2772,openSUSE-SLE-15.4-2023-2772,openSUSE-SLE-15.5-2023-2772 SKIP SUSE-RU-2023:2774-1 as openSUSE-SLE-15.5-2023-2774 is not security or has no CVEs. patches: SUSE-2023-2774,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2774,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2774,openSUSE-SLE-15.4-2023-2774,openSUSE-SLE-15.5-2023-2774 SKIP SUSE-RU-2023:2775-1 as SUSE-SLE-SERVER-12-SP5-2023-2775 is not security or has no CVEs. patches: SUSE-2023-2775,SUSE-SLE-SERVER-12-SP5-2023-2775 SKIP SUSE-RU-2023:2776-1 as SUSE-SUSE-MicroOS-5.2-2023-2776 is not security or has no CVEs. patches: SUSE-2023-2776,SUSE-SLE-Product-RT-15-SP3-2023-2776,SUSE-SUSE-MicroOS-5.1-2023-2776,SUSE-SUSE-MicroOS-5.2-2023-2776 SKIP SUSE-RU-2023:2779-1 as openSUSE-SLE-15.4-2023-2779 is not security or has no CVEs. patches: SUSE-2023-2779,SUSE-SLE-INSTALLER-15-SP4-2023-2779,SUSE-SLE-Module-Basesystem-15-SP4-2023-2779,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2779,openSUSE-SLE-15.4-2023-2779 SKIP SUSE-RU-2023:2785-1 as SUSE-SLE-SERVER-12-SP2-BCL-2023-2785 is not security or has no CVEs. patches: SUSE-2023-2785,SUSE-SLE-SERVER-12-SP2-BCL-2023-2785 SKIP SUSE-RU-2023:2786-1 as openSUSE-SLE-15.4-2023-2786 is not security or has no CVEs. patches: SUSE-2023-2786,SUSE-SLE-Micro-5.4-2023-2786,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2786,openSUSE-SLE-15.4-2023-2786 SKIP SUSE-RU-2023:2788-1 as openSUSE-SLE-15.5-2023-2788 is not security or has no CVEs. patches: SUSE-2023-2788,SUSE-SLE-Micro-5.3-2023-2788,SUSE-SLE-Micro-5.4-2023-2788,SUSE-SLE-Module-Basesystem-15-SP4-2023-2788,SUSE-SLE-Module-Basesystem-15-SP5-2023-2788,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2788,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2788,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2788,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2788,SUSE-SLE-Product-RT-15-SP3-2023-2788,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2788,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2788,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2788,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2788,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2788,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2788,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2788,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2788,SUSE-SUSE-MicroOS-5.1-2023-2788,SUSE-SUSE-MicroOS-5.2-2023-2788,SUSE-Storage-7-2023-2788,SUSE-Storage-7.1-2023-2788,openSUSE-Leap-Micro-5.3-2023-2788,openSUSE-SLE-15.4-2023-2788,openSUSE-SLE-15.5-2023-2788 SKIP SUSE-RU-2023:2790-1 as SUSE-SLE-SERVER-12-SP5-2023-2790 is not security or has no CVEs. patches: SUSE-2023-2790,SUSE-OpenStack-Cloud-9-2023-2790,SUSE-OpenStack-Cloud-Crowbar-9-2023-2790,SUSE-SLE-SAP-12-SP4-2023-2790,SUSE-SLE-SDK-12-SP5-2023-2790,SUSE-SLE-SERVER-12-SP2-BCL-2023-2790,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2790,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2790,SUSE-SLE-SERVER-12-SP5-2023-2790 SKIP SUSE-RU-2023:2792-1 as openSUSE-SLE-15.5-2023-2792 is not security or has no CVEs. patches: SUSE-2023-2792,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2792,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2792,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2792,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2792,SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2023-2792,openSUSE-SLE-15.4-2023-2792,openSUSE-SLE-15.5-2023-2792 SKIP SUSE-RU-2023:2795-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2795 is not security or has no CVEs. patches: SUSE-2023-2795,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2795 SKIP SUSE-RU-2023:2796-1 as SUSE-SLE-Module-Legacy-15-SP1-2023-2796 is not security or has no CVEs. patches: SUSE-2023-2796,SUSE-SLE-Module-Containers-15-SP1-2023-2796,SUSE-SLE-Module-Legacy-15-SP1-2023-2796 SKIP SUSE-RU-2023:2800-1 as openSUSE-SLE-15.4-2023-2800 is not security or has no CVEs. patches: SUSE-2023-2800,SUSE-SLE-Micro-5.3-2023-2800,SUSE-SLE-Micro-5.4-2023-2800,SUSE-SLE-Module-Basesystem-15-SP4-2023-2800,openSUSE-Leap-Micro-5.3-2023-2800,openSUSE-SLE-15.4-2023-2800 SKIP SUSE-RU-2023:2802-1 as SUSE-SLE-SERVER-12-SP5-2023-2802 is not security or has no CVEs. patches: SUSE-2023-2802,SUSE-SLE-SERVER-12-SP5-2023-2802 SKIP SUSE-RU-2023:2811-1 as openSUSE-SLE-15.5-2023-2811 is not security or has no CVEs. patches: SUSE-2023-2811,SUSE-SLE-Micro-5.3-2023-2811,SUSE-SLE-Micro-5.4-2023-2811,SUSE-SLE-Module-Basesystem-15-SP4-2023-2811,SUSE-SLE-Module-Basesystem-15-SP5-2023-2811,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2811,openSUSE-Leap-Micro-5.3-2023-2811,openSUSE-SLE-15.4-2023-2811,openSUSE-SLE-15.5-2023-2811 SKIP SUSE-RU-2023:2811-2 as SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2811 is not security or has no CVEs. patches: SUSE-2023-2811,SUSE-SLE-Micro-5.5-2023-2811,SUSE-SLE-Module-Basesystem-15-SP5-2023-2811,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2811 SKIP SUSE-RU-2023:2814-1 as openSUSE-SLE-15.5-2023-2814 is not security or has no CVEs. patches: SUSE-2023-2814,SUSE-SLE-Micro-5.3-2023-2814,SUSE-SLE-Micro-5.4-2023-2814,SUSE-SLE-Module-Basesystem-15-SP4-2023-2814,SUSE-SLE-Module-Basesystem-15-SP5-2023-2814,openSUSE-Leap-Micro-5.3-2023-2814,openSUSE-SLE-15.4-2023-2814,openSUSE-SLE-15.5-2023-2814 SKIP SUSE-RU-2023:2817-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2817 is not security or has no CVEs. patches: SUSE-2023-2817,SUSE-SLE-Product-RT-15-SP3-2023-2817,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2817,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2817 SKIP SUSE-RU-2023:2818-1 as openSUSE-SLE-15.5-2023-2818 is not security or has no CVEs. patches: SUSE-2023-2818,SUSE-SLE-Product-SLED-15-SP5-2023-2818,openSUSE-SLE-15.5-2023-2818 SKIP SUSE-RU-2023:2832-1 as openSUSE-SLE-15.5-2023-2832 is not security or has no CVEs. patches: SUSE-2023-2832,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2832,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2832,openSUSE-SLE-15.4-2023-2832,openSUSE-SLE-15.5-2023-2832 SKIP SUSE-RU-2023:2837-1 as openSUSE-SLE-15.5-2023-2837 is not security or has no CVEs. patches: SUSE-2023-2837,SUSE-SLE-Module-RT-15-SP5-2023-2837,openSUSE-SLE-15.5-2023-2837 SKIP SUSE-RU-2023:2840-1 as openSUSE-SLE-15.5-2023-2840 is not security or has no CVEs. patches: SUSE-2023-2840,openSUSE-SLE-15.4-2023-2840,openSUSE-SLE-15.5-2023-2840 SKIP SUSE-RU-2023:2847-1 as openSUSE-SLE-15.5-2023-2847 is not security or has no CVEs. patches: SUSE-2023-2847,SUSE-SLE-Micro-5.3-2023-2847,SUSE-SLE-Micro-5.4-2023-2847,SUSE-SLE-Module-Basesystem-15-SP4-2023-2847,SUSE-SLE-Module-Basesystem-15-SP5-2023-2847,openSUSE-Leap-Micro-5.3-2023-2847,openSUSE-SLE-15.4-2023-2847,openSUSE-SLE-15.5-2023-2847 SKIP SUSE-RU-2023:2854-1 as openSUSE-SLE-15.4-2023-2854 is not security or has no CVEs. patches: SUSE-2023-2854,SUSE-SLE-Module-Server-Applications-15-SP4-2023-2854,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2854,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2854,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2854,SUSE-SLE-Product-RT-15-SP3-2023-2854,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2854,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2854,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2854,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2854,SUSE-SUSE-MicroOS-5.1-2023-2854,SUSE-SUSE-MicroOS-5.2-2023-2854,SUSE-Storage-7.1-2023-2854,openSUSE-SLE-15.4-2023-2854 SKIP SUSE-RU-2023:2855-1 as openSUSE-SLE-15.5-2023-2855 is not security or has no CVEs. patches: SUSE-2023-2855,SUSE-SLE-Micro-5.3-2023-2855,SUSE-SLE-Micro-5.4-2023-2855,SUSE-SLE-Module-Basesystem-15-SP4-2023-2855,SUSE-SLE-Module-Basesystem-15-SP5-2023-2855,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2855,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2855,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2855,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2855,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2855,SUSE-SLE-Product-RT-15-SP3-2023-2855,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2855,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2855,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2855,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2855,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2855,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2855,SUSE-SUSE-MicroOS-5.1-2023-2855,SUSE-SUSE-MicroOS-5.2-2023-2855,SUSE-Storage-7-2023-2855,SUSE-Storage-7.1-2023-2855,openSUSE-Leap-Micro-5.3-2023-2855,openSUSE-SLE-15.4-2023-2855,openSUSE-SLE-15.5-2023-2855 SKIP SUSE-RU-2023:2856-1 as openSUSE-SLE-15.5-2023-2856 is not security or has no CVEs. patches: SUSE-2023-2856,SUSE-SLE-Module-Basesystem-15-SP4-2023-2856,SUSE-SLE-Module-Basesystem-15-SP5-2023-2856,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2856,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2856,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2856,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2856,SUSE-SLE-Product-RT-15-SP3-2023-2856,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2856,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2856,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2856,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2856,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2856,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2856,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2856,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2856,SUSE-Storage-7-2023-2856,SUSE-Storage-7.1-2023-2856,openSUSE-SLE-15.4-2023-2856,openSUSE-SLE-15.5-2023-2856 SKIP SUSE-RU-2023:2857-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2857 is not security or has no CVEs. patches: SUSE-2023-2857,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2857,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2857,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2857 SKIP SUSE-RU-2023:2858-1 as openSUSE-SLE-15.5-2023-2858 is not security or has no CVEs. patches: SUSE-2023-2858,SUSE-SLE-Module-Basesystem-15-SP4-2023-2858,SUSE-SLE-Module-Basesystem-15-SP5-2023-2858,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2858,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2858,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2858,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2858,SUSE-SLE-Product-RT-15-SP3-2023-2858,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2858,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2858,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2858,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2858,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2858,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2858,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2858,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2858,SUSE-Storage-7-2023-2858,SUSE-Storage-7.1-2023-2858,openSUSE-SLE-15.4-2023-2858,openSUSE-SLE-15.5-2023-2858 SKIP SUSE-RU-2023:2864-1 as SUSE-SLE-SERVER-12-SP5-2023-2864 is not security or has no CVEs. patches: SUSE-2023-2864,SUSE-OpenStack-Cloud-9-2023-2864,SUSE-OpenStack-Cloud-Crowbar-9-2023-2864,SUSE-SLE-SAP-12-SP4-2023-2864,SUSE-SLE-SERVER-12-SP2-BCL-2023-2864,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2864,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2864,SUSE-SLE-SERVER-12-SP5-2023-2864 SKIP SUSE-RU-2023:2867-1 as SUSE-SLE-SERVER-12-SP5-2023-2867 is not security or has no CVEs. patches: SUSE-2023-2867,SUSE-SLE-SERVER-12-SP5-2023-2867 SKIP SUSE-RU-2023:2872-1 as openSUSE-SLE-15.5-2023-2872 is not security or has no CVEs. patches: SUSE-2023-2872,SUSE-SLE-Module-Basesystem-15-SP5-2023-2872,openSUSE-SLE-15.5-2023-2872 SKIP SUSE-RU-2023:2873-1 as openSUSE-SLE-15.4-2023-2873 is not security or has no CVEs. patches: SUSE-2023-2873,SUSE-SLE-INSTALLER-15-SP4-2023-2873,SUSE-SLE-Module-Basesystem-15-SP4-2023-2873,openSUSE-SLE-15.4-2023-2873 SKIP SUSE-RU-2023:2874-1 as openSUSE-SLE-15.5-2023-2874 is not security or has no CVEs. patches: SUSE-2023-2874,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2874,openSUSE-SLE-15.5-2023-2874 SKIP SUSE-RU-2023:2875-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2875 is not security or has no CVEs. patches: SUSE-2023-2875,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2875,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2875,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2875 SKIP SUSE-RU-2023:2885-1 as openSUSE-SLE-15.5-2023-2885 is not security or has no CVEs. patches: SUSE-2023-2885,SUSE-SLE-Micro-5.3-2023-2885,SUSE-SLE-Micro-5.4-2023-2885,SUSE-SLE-Module-Basesystem-15-SP4-2023-2885,SUSE-SLE-Module-Basesystem-15-SP5-2023-2885,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2885,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2885,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2885,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2885,SUSE-SLE-Product-RT-15-SP3-2023-2885,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2885,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2885,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2885,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2885,SUSE-SUSE-MicroOS-5.1-2023-2885,SUSE-SUSE-MicroOS-5.2-2023-2885,SUSE-Storage-7.1-2023-2885,openSUSE-Leap-Micro-5.3-2023-2885,openSUSE-SLE-15.4-2023-2885,openSUSE-SLE-15.5-2023-2885 SKIP SUSE-RU-2023:2899-1 as openSUSE-SLE-15.5-2023-2899 is not security or has no CVEs. patches: SUSE-2023-2899,SUSE-SLE-Product-HA-15-SP5-2023-2899,openSUSE-SLE-15.5-2023-2899 SKIP SUSE-RU-2023:2900-1 as openSUSE-SLE-15.5-2023-2900 is not security or has no CVEs. patches: SUSE-2023-2900,SUSE-SLE-Module-Basesystem-15-SP4-2023-2900,SUSE-SLE-Module-Basesystem-15-SP5-2023-2900,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2900,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2900,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2900,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2900,SUSE-SLE-Product-RT-15-SP3-2023-2900,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2900,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2900,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2900,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2900,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2900,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2900,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2900,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2900,SUSE-Storage-7-2023-2900,SUSE-Storage-7.1-2023-2900,openSUSE-SLE-15.4-2023-2900,openSUSE-SLE-15.5-2023-2900 SKIP SUSE-RU-2023:2901-1 as openSUSE-SLE-15.5-2023-2901 is not security or has no CVEs. patches: SUSE-2023-2901,SUSE-SLE-Module-Basesystem-15-SP5-2023-2901,SUSE-SLE-Product-HA-15-SP5-2023-2901,openSUSE-SLE-15.5-2023-2901 SKIP SUSE-RU-2023:2902-1 as openSUSE-SLE-15.5-2023-2902 is not security or has no CVEs. patches: SUSE-2023-2902,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2902,openSUSE-SLE-15.5-2023-2902 SKIP SUSE-RU-2023:2903-1 as openSUSE-SLE-15.4-2023-2903 is not security or has no CVEs. patches: SUSE-2023-2903,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2903,openSUSE-SLE-15.4-2023-2903 SKIP SUSE-RU-2023:2904-1 as openSUSE-SLE-15.4-2023-2904 is not security or has no CVEs. patches: SUSE-2023-2904,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2904,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2904,SUSE-SLE-Product-WE-15-SP4-2023-2904,SUSE-SLE-Product-WE-15-SP5-2023-2904,openSUSE-SLE-15.4-2023-2904 SKIP SUSE-RU-2023:2905-1 as openSUSE-SLE-15.5-2023-2905 is not security or has no CVEs. patches: SUSE-2023-2905,SUSE-SLE-Module-Basesystem-15-SP4-2023-2905,SUSE-SLE-Module-Basesystem-15-SP5-2023-2905,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2905,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2905,SUSE-SLE-Product-RT-15-SP3-2023-2905,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2905,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2905,SUSE-Storage-7.1-2023-2905,openSUSE-SLE-15.4-2023-2905,openSUSE-SLE-15.5-2023-2905 SKIP SUSE-RU-2023:2908-1 as SUSE-SLE-Product-HPC-15-SP5-2023-2908 is not security or has no CVEs. patches: SUSE-2023-2908,SUSE-SLE-Module-HPC-15-SP5-2023-2908,SUSE-SLE-Product-HPC-15-SP5-2023-2908 SKIP SUSE-RU-2023:2909-1 as SUSE-Storage-7.1-2023-2909 is not security or has no CVEs. patches: SUSE-2023-2909,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-2909,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2909,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2909,SUSE-SLE-Product-RT-15-SP3-2023-2909,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2909,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2909,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2909,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2909,SUSE-SUSE-MicroOS-5.2-2023-2909,SUSE-Storage-7.1-2023-2909 SKIP SUSE-RU-2023:2910-1 as openSUSE-SLE-15.5-2023-2910 is not security or has no CVEs. patches: SUSE-2023-2910,SUSE-SLE-Module-Basesystem-15-SP5-2023-2910,SUSE-SLE-Module-Server-Applications-15-SP5-2023-2910,openSUSE-SLE-15.5-2023-2910 SKIP SUSE-RU-2023:2911-1 as openSUSE-SLE-15.5-2023-2911 is not security or has no CVEs. patches: SUSE-2023-2911,SUSE-SLE-INSTALLER-15-SP5-2023-2911,openSUSE-SLE-15.5-2023-2911 SKIP SUSE-RU-2023:2912-1 as openSUSE-SLE-15.4-2023-2912 is not security or has no CVEs. patches: SUSE-2023-2912,SUSE-SLE-Micro-5.3-2023-2912,SUSE-SLE-Micro-5.4-2023-2912,SUSE-SLE-Module-Basesystem-15-SP4-2023-2912,openSUSE-Leap-Micro-5.3-2023-2912,openSUSE-SLE-15.4-2023-2912 SKIP SUSE-RU-2023:2914-1 as openSUSE-SLE-15.4-2023-2914 is not security or has no CVEs. patches: SUSE-2023-2914,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2914,openSUSE-SLE-15.4-2023-2914 SKIP SUSE-RU-2023:2918-1 as openSUSE-SLE-15.5-2023-2918 is not security or has no CVEs. patches: SUSE-2023-2918,SUSE-SLE-Micro-5.3-2023-2918,SUSE-SLE-Micro-5.4-2023-2918,SUSE-SLE-Module-Basesystem-15-SP4-2023-2918,SUSE-SLE-Module-Basesystem-15-SP5-2023-2918,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2918,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2918,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2918,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2918,SUSE-SLE-Product-RT-15-SP3-2023-2918,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2918,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2918,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2918,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2918,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2918,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2918,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2918,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2918,SUSE-SUSE-MicroOS-5.1-2023-2918,SUSE-SUSE-MicroOS-5.2-2023-2918,SUSE-Storage-7-2023-2918,SUSE-Storage-7.1-2023-2918,openSUSE-Leap-Micro-5.3-2023-2918,openSUSE-SLE-15.4-2023-2918,openSUSE-SLE-15.5-2023-2918 SKIP SUSE-RU-2023:2919-1 as openSUSE-SLE-15.5-2023-2919 is not security or has no CVEs. patches: SUSE-2023-2919,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2919,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2919,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2919,SUSE-SLE-Module-Live-Patching-15-SP4-2023-2919,SUSE-SLE-Module-Live-Patching-15-SP5-2023-2919,openSUSE-SLE-15.4-2023-2919,openSUSE-SLE-15.5-2023-2919 SKIP SUSE-RU-2023:2920-1 as SUSE-SLE-Live-Patching-12-SP5-2023-2920 is not security or has no CVEs. patches: SUSE-2023-2920,SUSE-SLE-Live-Patching-12-2023-2920,SUSE-SLE-Live-Patching-12-SP4-2023-2920,SUSE-SLE-Live-Patching-12-SP5-2023-2920 SKIP SUSE-RU-2023:2921-1 as openSUSE-SLE-15.5-2023-2921 is not security or has no CVEs. patches: SUSE-2023-2921,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2921,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2921,SUSE-SLE-Product-RT-15-SP3-2023-2921,openSUSE-SLE-15.4-2023-2921,openSUSE-SLE-15.5-2023-2921 SKIP SUSE-RU-2023:2922-1 as openSUSE-SLE-15.5-2023-2922 is not security or has no CVEs. patches: SUSE-2023-2922,SUSE-SLE-Micro-5.3-2023-2922,SUSE-SLE-Micro-5.4-2023-2922,SUSE-SLE-Module-Basesystem-15-SP4-2023-2922,openSUSE-Leap-Micro-5.3-2023-2922,openSUSE-SLE-15.4-2023-2922,openSUSE-SLE-15.5-2023-2922 SKIP SUSE-RU-2023:2922-2 as SUSE-SLE-Module-Basesystem-15-SP5-2023-2922 is not security or has no CVEs. patches: SUSE-2023-2922,SUSE-SLE-Module-Basesystem-15-SP5-2023-2922 SKIP SUSE-RU-2023:2955-1 as SUSE-Storage-7-2023-2955 is not security or has no CVEs. patches: SUSE-2023-2955,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2955,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2955,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2955,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2955,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2955,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2955,SUSE-Storage-7-2023-2955 SKIP SUSE-RU-2023:2963-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2963 is not security or has no CVEs. patches: SUSE-2023-2963,SUSE-SLE-Module-Public-Cloud-12-2023-2963 SKIP SUSE-RU-2023:2968-1 as openSUSE-SLE-15.5-2023-2968 is not security or has no CVEs. patches: SUSE-2023-2968,SUSE-SLE-Module-Basesystem-15-SP5-2023-2968,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2968,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2968,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2968,openSUSE-SLE-15.5-2023-2968 SKIP SUSE-RU-2023:2976-1 as openSUSE-SLE-15.5-2023-2976 is not security or has no CVEs. patches: SUSE-2023-2976,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2976,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2976,openSUSE-SLE-15.4-2023-2976,openSUSE-SLE-15.5-2023-2976 SKIP SUSE-RU-2023:2977-1 as openSUSE-SLE-15.4-2023-2977 is not security or has no CVEs. patches: SUSE-2023-2977,SUSE-SLE-Micro-5.3-2023-2977,SUSE-SLE-Micro-5.4-2023-2977,SUSE-SLE-Module-Basesystem-15-SP4-2023-2977,openSUSE-Leap-Micro-5.3-2023-2977,openSUSE-Leap-Micro-5.4-2023-2977,openSUSE-SLE-15.4-2023-2977 SKIP SUSE-RU-2023:2978-1 as openSUSE-SLE-15.5-2023-2978 is not security or has no CVEs. patches: SUSE-2023-2978,SUSE-SLE-Module-Development-Tools-15-SP4-2023-2978,SUSE-SLE-Module-Development-Tools-15-SP5-2023-2978,openSUSE-SLE-15.4-2023-2978,openSUSE-SLE-15.5-2023-2978 SKIP SUSE-RU-2023:2983-1 as SUSE-SLE-Module-Public-Cloud-12-2023-2983 is not security or has no CVEs. patches: SUSE-2023-2983,SUSE-SLE-Module-Public-Cloud-12-2023-2983 SKIP SUSE-RU-2023:2984-1 as openSUSE-SLE-15.5-2023-2984 is not security or has no CVEs. patches: SUSE-2023-2984,SUSE-SLE-Manager-Tools-For-Micro-5-2023-2984,SUSE-SLE-Module-Basesystem-15-SP4-2023-2984,SUSE-SLE-Module-Basesystem-15-SP5-2023-2984,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2984,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2984,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2984,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2984,SUSE-SLE-Product-RT-15-SP3-2023-2984,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2984,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2984,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2984,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2984,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2984,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2984,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2984,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2984,SUSE-Storage-7-2023-2984,SUSE-Storage-7.1-2023-2984,openSUSE-SLE-15.4-2023-2984,openSUSE-SLE-15.5-2023-2984 SKIP SUSE-RU-2023:2985-1 as openSUSE-SLE-15.5-2023-2985 is not security or has no CVEs. patches: SUSE-2023-2985,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2985,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2985,openSUSE-SLE-15.4-2023-2985,openSUSE-SLE-15.5-2023-2985 SKIP SUSE-RU-2023:2992-1 as openSUSE-SLE-15.5-2023-2992 is not security or has no CVEs. patches: SUSE-2023-2992,openSUSE-SLE-15.4-2023-2992,openSUSE-SLE-15.5-2023-2992 SKIP SUSE-RU-2023:2993-1 as SUSE-SLE-Product-RT-15-SP5-2023-2993 is not security or has no CVEs. patches: SUSE-2023-2993,SUSE-SLE-Module-RT-15-SP5-2023-2993,SUSE-SLE-Product-RT-15-SP5-2023-2993 SKIP SUSE-RU-2023:2994-1 as openSUSE-SLE-15.4-2023-2994 is not security or has no CVEs. patches: SUSE-2023-2994,SUSE-SLE-Micro-5.3-2023-2994,SUSE-SLE-Micro-5.4-2023-2994,SUSE-SLE-Module-Basesystem-15-SP4-2023-2994,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2994,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2994,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2994,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2994,SUSE-SLE-Product-RT-15-SP3-2023-2994,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2994,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2994,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2994,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2994,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2994,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2994,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2994,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2994,SUSE-SUSE-MicroOS-5.1-2023-2994,SUSE-SUSE-MicroOS-5.2-2023-2994,SUSE-Storage-7-2023-2994,SUSE-Storage-7.1-2023-2994,openSUSE-Leap-Micro-5.3-2023-2994,openSUSE-Leap-Micro-5.4-2023-2994,openSUSE-SLE-15.4-2023-2994 SKIP SUSE-RU-2023:2995-1 as openSUSE-Leap-Micro-5.3-2023-2995 is not security or has no CVEs. patches: SUSE-2023-2995,SUSE-SLE-Micro-5.3-2023-2995,openSUSE-Leap-Micro-5.3-2023-2995 SKIP SUSE-RU-2023:2996-1 as openSUSE-SLE-15.5-2023-2996 is not security or has no CVEs. patches: SUSE-2023-2996,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2996,SUSE-SLE-Product-WE-15-SP5-2023-2996,openSUSE-SLE-15.5-2023-2996 SKIP SUSE-RU-2023:2997-1 as SUSE-SLE-WE-12-SP5-2023-2997 is not security or has no CVEs. patches: SUSE-2023-2997,SUSE-SLE-SDK-12-SP5-2023-2997,SUSE-SLE-SERVER-12-SP5-2023-2997,SUSE-SLE-WE-12-SP5-2023-2997 SKIP SUSE-RU-2023:2998-1 as openSUSE-SLE-15.5-2023-2998 is not security or has no CVEs. patches: SUSE-2023-2998,SUSE-SLE-Micro-5.3-2023-2998,SUSE-SLE-Micro-5.4-2023-2998,SUSE-SLE-Module-Basesystem-15-SP4-2023-2998,SUSE-SLE-Module-Basesystem-15-SP5-2023-2998,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2998,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2998,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2998,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2998,SUSE-SLE-Product-RT-15-SP3-2023-2998,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2998,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2998,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2998,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2998,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2998,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2998,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2998,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2998,SUSE-SUSE-MicroOS-5.1-2023-2998,SUSE-SUSE-MicroOS-5.2-2023-2998,SUSE-Storage-7-2023-2998,SUSE-Storage-7.1-2023-2998,openSUSE-Leap-Micro-5.3-2023-2998,openSUSE-Leap-Micro-5.4-2023-2998,openSUSE-SLE-15.4-2023-2998,openSUSE-SLE-15.5-2023-2998 SKIP SUSE-RU-2023:2999-1 as openSUSE-SLE-15.5-2023-2999 is not security or has no CVEs. patches: SUSE-2023-2999,SUSE-SLE-Module-Basesystem-15-SP5-2023-2999,openSUSE-SLE-15.5-2023-2999 SKIP SUSE-RU-2023:3000-1 as openSUSE-SLE-15.4-2023-3000 is not security or has no CVEs. patches: SUSE-2023-3000,SUSE-SLE-INSTALLER-15-SP4-2023-3000,openSUSE-SLE-15.4-2023-3000 SKIP SUSE-RU-2023:3003-1 as openSUSE-Leap-Micro-5.4-2023-3003 is not security or has no CVEs. patches: SUSE-2023-3003,SUSE-SLE-Micro-5.4-2023-3003,openSUSE-Leap-Micro-5.4-2023-3003 SKIP SUSE-RU-2023:3004-1 as openSUSE-SLE-15.5-2023-3004 is not security or has no CVEs. patches: SUSE-2023-3004,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3004,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3004,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3004,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3004,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3004,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3004,SUSE-SLE-Product-RT-15-SP3-2023-3004,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3004,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3004,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3004,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3004,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3004,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3004,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3004,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3004,SUSE-Storage-7-2023-3004,SUSE-Storage-7.1-2023-3004,openSUSE-SLE-15.4-2023-3004,openSUSE-SLE-15.5-2023-3004 SKIP SUSE-RU-2023:3005-1 as SUSE-SLE-SERVER-12-SP2-BCL-2023-3005 is not security or has no CVEs. patches: SUSE-2023-3005,SUSE-SLE-SERVER-12-SP2-BCL-2023-3005 SKIP SUSE-RU-2023:3007-1 as openSUSE-SLE-15.5-2023-3007 is not security or has no CVEs. patches: SUSE-2023-3007,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3007,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3007,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3007,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3007,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3007,openSUSE-SLE-15.5-2023-3007 SKIP SUSE-RU-2023:3008-1 as SUSE-SLE-SERVER-12-SP5-2023-3008 is not security or has no CVEs. patches: SUSE-2023-3008,SUSE-SLE-Module-Public-Cloud-12-2023-3008,SUSE-SLE-SERVER-12-SP5-2023-3008 SKIP SUSE-RU-2023:3009-1 as SUSE-SLE-HA-12-SP5-2023-3009 is not security or has no CVEs. patches: SUSE-2023-3009,SUSE-SLE-HA-12-SP5-2023-3009 SKIP SUSE-RU-2023:3014-1 as SUSE-SLE-SERVER-12-SP5-2023-3014 is not security or has no CVEs. patches: SUSE-2023-3014,SUSE-SLE-Module-Public-Cloud-12-2023-3014,SUSE-SLE-SERVER-12-SP2-BCL-2023-3014,SUSE-SLE-SERVER-12-SP5-2023-3014 SKIP SUSE-RU-2023:3024-1 as openSUSE-SLE-15.5-2023-3024 is not security or has no CVEs. patches: SUSE-2023-3024,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3024,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3024,openSUSE-SLE-15.5-2023-3024 SKIP SUSE-RU-2023:3025-1 as openSUSE-SLE-15.5-2023-3025 is not security or has no CVEs. patches: SUSE-2023-3025,SUSE-SLE-Module-Basesystem-15-SP4-2023-3025,SUSE-SLE-Module-Basesystem-15-SP5-2023-3025,SUSE-SLE-Product-RT-15-SP3-2023-3025,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3025,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3025,openSUSE-SLE-15.4-2023-3025,openSUSE-SLE-15.5-2023-3025 SKIP SUSE-RU-2023:3026-1 as SUSE-SLE-SERVER-12-SP5-2023-3026 is not security or has no CVEs. patches: SUSE-2023-3026,SUSE-SLE-SERVER-12-SP5-2023-3026 SKIP SUSE-RU-2023:3027-1 as openSUSE-SLE-15.5-2023-3027 is not security or has no CVEs. patches: SUSE-2023-3027,SUSE-SLE-Module-Basesystem-15-SP4-2023-3027,SUSE-SLE-Module-Basesystem-15-SP5-2023-3027,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3027,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3027,SUSE-SLE-Product-RT-15-SP3-2023-3027,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3027,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3027,openSUSE-SLE-15.4-2023-3027,openSUSE-SLE-15.5-2023-3027 SKIP SUSE-RU-2023:3028-1 as SUSE-SLE-Module-Development-Tools-15-SP5-2023-3028 is not security or has no CVEs. patches: SUSE-2023-3028,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3028 SKIP SUSE-RU-2023:3042-1 as SUSE-SLE-SERVER-12-SP5-2023-3042 is not security or has no CVEs. patches: SUSE-2023-3042,SUSE-OpenStack-Cloud-9-2023-3042,SUSE-OpenStack-Cloud-Crowbar-9-2023-3042,SUSE-SLE-SAP-12-SP4-2023-3042,SUSE-SLE-SDK-12-SP5-2023-3042,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-3042,SUSE-SLE-SERVER-12-SP4-LTSS-2023-3042,SUSE-SLE-SERVER-12-SP5-2023-3042 SKIP SUSE-RU-2023:3065-1 as SUSE-SLE-INSTALLER-15-SP5-2023-3065 is not security or has no CVEs. patches: SUSE-2023-3065,SUSE-SLE-INSTALLER-15-SP5-2023-3065 SKIP SUSE-RU-2023:3068-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3068 is not security or has no CVEs. patches: SUSE-2023-3068,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3068,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3068,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3068 SKIP SUSE-RU-2023:3086-1 as SUSE-Storage-7.1-2023-3086 is not security or has no CVEs. patches: SUSE-2023-3086,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3086,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3086,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3086,SUSE-SLE-Product-RT-15-SP3-2023-3086,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3086,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3086,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3086,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3086,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3086,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3086,SUSE-Storage-7-2023-3086,SUSE-Storage-7.1-2023-3086 SKIP SUSE-RU-2023:3087-1 as openSUSE-SLE-15.5-2023-3087 is not security or has no CVEs. patches: SUSE-2023-3087,SUSE-SLE-Module-Basesystem-15-SP4-2023-3087,SUSE-SLE-Module-Basesystem-15-SP5-2023-3087,openSUSE-SLE-15.4-2023-3087,openSUSE-SLE-15.5-2023-3087 SKIP SUSE-RU-2023:3088-1 as openSUSE-SLE-15.5-2023-3088 is not security or has no CVEs. patches: SUSE-2023-3088,SUSE-SLE-Module-Basesystem-15-SP5-2023-3088,openSUSE-SLE-15.5-2023-3088 SKIP SUSE-RU-2023:3092-1 as openSUSE-SLE-15.5-2023-3092 is not security or has no CVEs. patches: SUSE-2023-3092,SUSE-SLE-Module-Containers-15-SP4-2023-3092,SUSE-SLE-Module-Containers-15-SP5-2023-3092,openSUSE-SLE-15.4-2023-3092,openSUSE-SLE-15.5-2023-3092 SKIP SUSE-RU-2023:3098-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3098 is not security or has no CVEs. patches: SUSE-2023-3098,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3098,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3098,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3098,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3098 SKIP SUSE-RU-2023:3099-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3099 is not security or has no CVEs. patches: SUSE-2023-3099,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3099,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3099,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3099,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3099 SKIP SUSE-RU-2023:3100-1 as SUSE-Storage-7.1-2023-3100 is not security or has no CVEs. patches: SUSE-2023-3100,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3100,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3100,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3100,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3100,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3100,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3100,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3100,SUSE-Storage-7.1-2023-3100 SKIP SUSE-RU-2023:3101-1 as openSUSE-SLE-15.4-2023-3101 is not security or has no CVEs. patches: SUSE-2023-3101,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3101,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3101,openSUSE-SLE-15.4-2023-3101 SKIP SUSE-RU-2023:3102-1 as openSUSE-SLE-15.5-2023-3102 is not security or has no CVEs. patches: SUSE-2023-3102,SUSE-SLE-Module-Basesystem-15-SP5-2023-3102,openSUSE-SLE-15.5-2023-3102 SKIP SUSE-RU-2023:3103-1 as openSUSE-SLE-15.5-2023-3103 is not security or has no CVEs. patches: SUSE-2023-3103,SUSE-SLE-Module-Basesystem-15-SP5-2023-3103,openSUSE-SLE-15.5-2023-3103 SKIP SUSE-RU-2023:3117-1 as openSUSE-SLE-15.5-2023-3117 is not security or has no CVEs. patches: SUSE-2023-3117,SUSE-SLE-Module-Basesystem-15-SP5-2023-3117,openSUSE-SLE-15.5-2023-3117 SKIP SUSE-RU-2023:3118-1 as openSUSE-SLE-15.4-2023-3118 is not security or has no CVEs. patches: SUSE-2023-3118,SUSE-SLE-Micro-5.3-2023-3118,SUSE-SLE-Micro-5.4-2023-3118,SUSE-SLE-Module-Basesystem-15-SP4-2023-3118,openSUSE-Leap-Micro-5.3-2023-3118,openSUSE-Leap-Micro-5.4-2023-3118,openSUSE-SLE-15.4-2023-3118 ERROR: notice SUSE-RU-2023:3124-1 has no valid patches out of: SUSE-2023-3124,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-3124 SKIP SUSE-RU-2023:3130-1 as SUSE-EL-9-CLIENT-TOOLS-2023-3130 is not security or has no CVEs. patches: SUSE-2023-3130,SUSE-EL-9-CLIENT-TOOLS-2023-3130 SKIP SUSE-RU-2023:3147-1 as SUSE-Storage-7.1-2023-3147 is not security or has no CVEs. patches: SUSE-2023-3147,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3147,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3147,SUSE-SLE-Product-RT-15-SP3-2023-3147,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3147,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3147,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3147,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3147,SUSE-SUSE-MicroOS-5.1-2023-3147,SUSE-SUSE-MicroOS-5.2-2023-3147,SUSE-Storage-7.1-2023-3147 SKIP SUSE-RU-2023:3148-1 as openSUSE-SLE-15.5-2023-3148 is not security or has no CVEs. patches: SUSE-2023-3148,SUSE-SLE-Micro-5.3-2023-3148,SUSE-SLE-Micro-5.4-2023-3148,SUSE-SLE-Module-Basesystem-15-SP4-2023-3148,SUSE-SLE-Module-Basesystem-15-SP5-2023-3148,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3148,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3148,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3148,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3148,openSUSE-Leap-Micro-5.3-2023-3148,openSUSE-Leap-Micro-5.4-2023-3148,openSUSE-SLE-15.4-2023-3148,openSUSE-SLE-15.5-2023-3148 SKIP SUSE-RU-2023:3149-1 as SUSE-SLE-SERVER-12-SP5-2023-3149 is not security or has no CVEs. patches: SUSE-2023-3149,SUSE-OpenStack-Cloud-9-2023-3149,SUSE-OpenStack-Cloud-Crowbar-9-2023-3149,SUSE-SLE-SAP-12-SP4-2023-3149,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-3149,SUSE-SLE-SERVER-12-SP4-LTSS-2023-3149,SUSE-SLE-SERVER-12-SP5-2023-3149 SKIP SUSE-RU-2023:3150-1 as openSUSE-SLE-15.4-2023-3150 is not security or has no CVEs. patches: SUSE-2023-3150,SUSE-SLE-Module-Basesystem-15-SP4-2023-3150,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3150,openSUSE-SLE-15.4-2023-3150 SKIP SUSE-RU-2023:3151-1 as openSUSE-SLE-15.5-2023-3151 is not security or has no CVEs. patches: SUSE-2023-3151,SUSE-SLE-Module-Basesystem-15-SP5-2023-3151,openSUSE-SLE-15.5-2023-3151 SKIP SUSE-RU-2023:3152-1 as openSUSE-SLE-15.4-2023-3152 is not security or has no CVEs. patches: SUSE-2023-3152,SUSE-SLE-INSTALLER-15-SP4-2023-3152,SUSE-SLE-Module-Basesystem-15-SP4-2023-3152,openSUSE-SLE-15.4-2023-3152 SKIP SUSE-RU-2023:3154-1 as SUSE-SLE-Product-HA-15-SP2-2023-3154 is not security or has no CVEs. patches: SUSE-2023-3154,SUSE-SLE-Product-HA-15-SP2-2023-3154 SKIP SUSE-RU-2023:3155-1 as SUSE-SLE-SDK-12-SP5-2023-3155 is not security or has no CVEs. patches: SUSE-2023-3155,SUSE-SLE-HA-12-SP5-2023-3155,SUSE-SLE-SDK-12-SP5-2023-3155 SKIP SUSE-RU-2023:3156-1 as SUSE-SLE-Product-HA-15-SP1-2023-3156 is not security or has no CVEs. patches: SUSE-2023-3156,SUSE-SLE-Product-HA-15-SP1-2023-3156 SKIP SUSE-RU-2023:3157-1 as SUSE-SLE-Product-HA-15-SP3-2023-3157 is not security or has no CVEs. patches: SUSE-2023-3157,SUSE-SLE-Product-HA-15-SP3-2023-3157 SKIP SUSE-RU-2023:3158-1 as openSUSE-SLE-15.4-2023-3158 is not security or has no CVEs. patches: SUSE-2023-3158,SUSE-SLE-Product-HA-15-SP4-2023-3158,openSUSE-SLE-15.4-2023-3158 SKIP SUSE-RU-2023:3159-1 as openSUSE-SLE-15.5-2023-3159 is not security or has no CVEs. patches: SUSE-2023-3159,SUSE-SLE-Product-HA-15-SP5-2023-3159,openSUSE-SLE-15.5-2023-3159 SKIP SUSE-RU-2023:3166-1 as SUSE-SLE-Micro-5.3-2023-3166 is not security or has no CVEs. patches: SUSE-2023-3166,SUSE-SLE-Micro-5.3-2023-3166 SKIP SUSE-RU-2023:3169-1 as openSUSE-SLE-15.4-2023-3169 is not security or has no CVEs. patches: SUSE-2023-3169,SUSE-SLE-Micro-5.3-2023-3169,SUSE-SLE-Micro-5.4-2023-3169,SUSE-SLE-Module-Basesystem-15-SP4-2023-3169,openSUSE-Leap-Micro-5.3-2023-3169,openSUSE-Leap-Micro-5.4-2023-3169,openSUSE-SLE-15.4-2023-3169 SKIP SUSE-RU-2023:3170-1 as openSUSE-SLE-15.5-2023-3170 is not security or has no CVEs. patches: SUSE-2023-3170,SUSE-SLE-Micro-5.3-2023-3170,SUSE-SLE-Micro-5.4-2023-3170,SUSE-SLE-Module-Basesystem-15-SP4-2023-3170,SUSE-SLE-Module-Basesystem-15-SP5-2023-3170,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3170,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3170,openSUSE-Leap-Micro-5.3-2023-3170,openSUSE-Leap-Micro-5.4-2023-3170,openSUSE-SLE-15.4-2023-3170,openSUSE-SLE-15.5-2023-3170 SKIP SUSE-RU-2023:3173-1 as SUSE-Storage-7.1-2023-3173 is not security or has no CVEs. patches: SUSE-2023-3173,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3173,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3173,SUSE-SLE-Product-RT-15-SP3-2023-3173,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3173,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3173,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3173,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3173,SUSE-SUSE-MicroOS-5.1-2023-3173,SUSE-SUSE-MicroOS-5.2-2023-3173,SUSE-Storage-7.1-2023-3173 SKIP SUSE-RU-2023:3175-1 as SUSE-SLE-SERVER-12-SP5-2023-3175 is not security or has no CVEs. patches: SUSE-2023-3175,SUSE-SLE-SDK-12-SP5-2023-3175,SUSE-SLE-SERVER-12-SP5-2023-3175 SKIP SUSE-RU-2023:3178-1 as openSUSE-SLE-15.5-2023-3178 is not security or has no CVEs. patches: SUSE-2023-3178,SUSE-SLE-Module-Basesystem-15-SP5-2023-3178,openSUSE-SLE-15.5-2023-3178 SKIP SUSE-RU-2023:3191-1 as SUSE-Storage-7-2023-3191 is not security or has no CVEs. patches: SUSE-2023-3191,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3191,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3191,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3191,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3191,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3191,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3191,SUSE-Storage-7-2023-3191 SKIP SUSE-RU-2023:3192-1 as openSUSE-SLE-15.5-2023-3192 is not security or has no CVEs. patches: SUSE-2023-3192,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3192,openSUSE-SLE-15.5-2023-3192 SKIP SUSE-RU-2023:3193-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3193 is not security or has no CVEs. patches: SUSE-2023-3193,SUSE-SLE-Module-Public-Cloud-12-2023-3193 SKIP SUSE-RU-2023:3194-1 as openSUSE-SLE-15.4-2023-3194 is not security or has no CVEs. patches: SUSE-2023-3194,SUSE-SLE-Product-HA-15-SP4-2023-3194,openSUSE-SLE-15.4-2023-3194 SKIP SUSE-RU-2023:3195-1 as openSUSE-SLE-15.5-2023-3195 is not security or has no CVEs. patches: SUSE-2023-3195,SUSE-SLE-Product-HA-15-SP5-2023-3195,openSUSE-SLE-15.5-2023-3195 SKIP SUSE-RU-2023:3196-1 as openSUSE-SLE-15.5-2023-3196 is not security or has no CVEs. patches: SUSE-2023-3196,SUSE-SLE-Module-Basesystem-15-SP4-2023-3196,SUSE-SLE-Module-Basesystem-15-SP5-2023-3196,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3196,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3196,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3196,SUSE-SLE-Product-RT-15-SP3-2023-3196,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3196,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3196,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3196,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3196,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3196,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3196,SUSE-Storage-7-2023-3196,SUSE-Storage-7.1-2023-3196,openSUSE-SLE-15.4-2023-3196,openSUSE-SLE-15.5-2023-3196 SKIP SUSE-RU-2023:3197-1 as openSUSE-SLE-15.5-2023-3197 is not security or has no CVEs. patches: SUSE-2023-3197,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3197,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3197,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3197,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3197,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3197,openSUSE-SLE-15.4-2023-3197,openSUSE-SLE-15.5-2023-3197 SKIP SUSE-RU-2023:3198-1 as SUSE-SLE-SERVER-12-SP5-2023-3198 is not security or has no CVEs. patches: SUSE-2023-3198,SUSE-SLE-SERVER-12-SP5-2023-3198 SKIP SUSE-RU-2023:3199-1 as openSUSE-SLE-15.4-2023-3199 is not security or has no CVEs. patches: SUSE-2023-3199,SUSE-SLE-Micro-5.3-2023-3199,SUSE-SLE-Micro-5.4-2023-3199,SUSE-SLE-Module-Basesystem-15-SP4-2023-3199,openSUSE-Leap-Micro-5.3-2023-3199,openSUSE-Leap-Micro-5.4-2023-3199,openSUSE-SLE-15.4-2023-3199 SKIP SUSE-RU-2023:3200-1 as openSUSE-SLE-15.5-2023-3200 is not security or has no CVEs. patches: SUSE-2023-3200,SUSE-SLE-Module-Basesystem-15-SP5-2023-3200,openSUSE-SLE-15.5-2023-3200 SKIP SUSE-RU-2023:3201-1 as openSUSE-SLE-15.5-2023-3201 is not security or has no CVEs. patches: SUSE-2023-3201,SUSE-SLE-Module-Basesystem-15-SP5-2023-3201,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3201,openSUSE-SLE-15.5-2023-3201 SKIP SUSE-RU-2023:3203-1 as openSUSE-SLE-15.5-2023-3203 is not security or has no CVEs. patches: SUSE-2023-3203,SUSE-SLE-Module-Basesystem-15-SP5-2023-3203,openSUSE-SLE-15.5-2023-3203 SKIP SUSE-RU-2023:3204-1 as openSUSE-SLE-15.5-2023-3204 is not security or has no CVEs. patches: SUSE-2023-3204,SUSE-SLE-Module-Basesystem-15-SP4-2023-3204,SUSE-SLE-Module-Basesystem-15-SP5-2023-3204,openSUSE-SLE-15.4-2023-3204,openSUSE-SLE-15.5-2023-3204 SKIP SUSE-RU-2023:3205-1 as openSUSE-SLE-15.4-2023-3205 is not security or has no CVEs. patches: SUSE-2023-3205,SUSE-SLE-INSTALLER-15-SP4-2023-3205,SUSE-SLE-Module-Basesystem-15-SP4-2023-3205,openSUSE-SLE-15.4-2023-3205 SKIP SUSE-RU-2023:3211-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3211 is not security or has no CVEs. patches: SUSE-2023-3211,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3211,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3211 SKIP SUSE-RU-2023:3212-1 as SUSE-Storage-7.1-2023-3212 is not security or has no CVEs. patches: SUSE-2023-3212,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3212,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3212,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3212,SUSE-SLE-Product-RT-15-SP3-2023-3212,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3212,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3212,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3212,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3212,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3212,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3212,SUSE-Storage-7-2023-3212,SUSE-Storage-7.1-2023-3212 SKIP SUSE-RU-2023:3214-1 as openSUSE-SLE-15.4-2023-3214 is not security or has no CVEs. patches: SUSE-2023-3214,SUSE-SLE-Micro-5.3-2023-3214,SUSE-SLE-Micro-5.4-2023-3214,SUSE-SLE-Module-Basesystem-15-SP4-2023-3214,openSUSE-Leap-Micro-5.3-2023-3214,openSUSE-Leap-Micro-5.4-2023-3214,openSUSE-SLE-15.4-2023-3214 SKIP SUSE-RU-2023:3215-1 as openSUSE-SLE-15.5-2023-3215 is not security or has no CVEs. patches: SUSE-2023-3215,SUSE-SLE-Module-Basesystem-15-SP5-2023-3215,openSUSE-SLE-15.5-2023-3215 SKIP SUSE-RU-2023:3216-1 as SUSE-SLE-SAP-12-SP5-2023-3216 is not security or has no CVEs. patches: SUSE-2023-3216,SUSE-SLE-SAP-12-SP4-2023-3216,SUSE-SLE-SAP-12-SP5-2023-3216 SKIP SUSE-RU-2023:3217-1 as openSUSE-SLE-15.5-2023-3217 is not security or has no CVEs. patches: SUSE-2023-3217,SUSE-SLE-Micro-5.3-2023-3217,SUSE-SLE-Micro-5.4-2023-3217,SUSE-SLE-Module-Basesystem-15-SP4-2023-3217,SUSE-SLE-Module-Basesystem-15-SP5-2023-3217,openSUSE-Leap-Micro-5.3-2023-3217,openSUSE-Leap-Micro-5.4-2023-3217,openSUSE-SLE-15.4-2023-3217,openSUSE-SLE-15.5-2023-3217 SKIP SUSE-RU-2023:3218-1 as SUSE-Storage-7.1-2023-3218 is not security or has no CVEs. patches: SUSE-2023-3218,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3218,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3218,SUSE-SLE-Product-RT-15-SP3-2023-3218,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3218,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3218,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3218,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3218,SUSE-SUSE-MicroOS-5.1-2023-3218,SUSE-SUSE-MicroOS-5.2-2023-3218,SUSE-Storage-7.1-2023-3218 SKIP SUSE-RU-2023:3227-1 as openSUSE-SLE-15.4-2023-3227 is not security or has no CVEs. patches: SUSE-2023-3227,SUSE-SLE-INSTALLER-15-SP4-2023-3227,SUSE-SLE-Module-Basesystem-15-SP4-2023-3227,openSUSE-SLE-15.4-2023-3227 SKIP SUSE-RU-2023:3231-1 as openSUSE-SLE-15.5-2023-3231 is not security or has no CVEs. patches: SUSE-2023-3231,SUSE-SLE-Module-Basesystem-15-SP4-2023-3231,SUSE-SLE-Module-Basesystem-15-SP5-2023-3231,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3231,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3231,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3231,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3231,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3231,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3231,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3231,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3231,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3231,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3231,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3231,SUSE-Storage-7.1-2023-3231,openSUSE-SLE-15.4-2023-3231,openSUSE-SLE-15.5-2023-3231 SKIP SUSE-RU-2023:3253-1 as openSUSE-SLE-15.5-2023-3253 is not security or has no CVEs. patches: SUSE-2023-3253,SUSE-SLE-Module-Basesystem-15-SP5-2023-3253,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3253,openSUSE-SLE-15.5-2023-3253 SKIP SUSE-RU-2023:3258-1 as openSUSE-SLE-15.5-2023-3258 is not security or has no CVEs. patches: SUSE-2023-3258,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-3258,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-3258,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3258,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3258,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3258,openSUSE-SLE-15.5-2023-3258 SKIP SUSE-RU-2023:3258-2 as SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3258 is not security or has no CVEs. patches: SUSE-2023-3258,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3258 SKIP SUSE-RU-2023:3261-1 as openSUSE-SLE-15.5-2023-3261 is not security or has no CVEs. patches: SUSE-2023-3261,SUSE-SLE-Micro-5.3-2023-3261,SUSE-SLE-Micro-5.4-2023-3261,SUSE-SLE-Module-Basesystem-15-SP4-2023-3261,SUSE-SLE-Module-Basesystem-15-SP5-2023-3261,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3261,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3261,SUSE-SUSE-MicroOS-5.1-2023-3261,SUSE-SUSE-MicroOS-5.2-2023-3261,openSUSE-Leap-Micro-5.3-2023-3261,openSUSE-Leap-Micro-5.4-2023-3261,openSUSE-SLE-15.4-2023-3261,openSUSE-SLE-15.5-2023-3261 SKIP SUSE-RU-2023:3270-1 as openSUSE-SLE-15.4-2023-3270 is not security or has no CVEs. patches: SUSE-2023-3270,SUSE-SLE-Micro-5.3-2023-3270,SUSE-SLE-Micro-5.4-2023-3270,SUSE-SLE-Module-Basesystem-15-SP4-2023-3270,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3270,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3270,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3270,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3270,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3270,SUSE-SLE-Product-RT-15-SP3-2023-3270,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3270,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3270,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3270,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3270,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3270,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3270,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3270,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3270,SUSE-SUSE-MicroOS-5.1-2023-3270,SUSE-SUSE-MicroOS-5.2-2023-3270,SUSE-Storage-7.1-2023-3270,openSUSE-Leap-Micro-5.3-2023-3270,openSUSE-Leap-Micro-5.4-2023-3270,openSUSE-SLE-15.4-2023-3270 SKIP SUSE-RU-2023:3273-1 as openSUSE-SLE-15.5-2023-3273 is not security or has no CVEs. patches: SUSE-2023-3273,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3273,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3273,openSUSE-SLE-15.4-2023-3273,openSUSE-SLE-15.5-2023-3273 SKIP SUSE-RU-2023:3274-1 as openSUSE-SLE-15.5-2023-3274 is not security or has no CVEs. patches: SUSE-2023-3274,SUSE-SLE-Module-Basesystem-15-SP4-2023-3274,SUSE-SLE-Module-Basesystem-15-SP5-2023-3274,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3274,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3274,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3274,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3274,SUSE-SLE-Product-RT-15-SP3-2023-3274,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3274,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3274,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3274,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3274,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3274,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3274,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3274,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3274,SUSE-Storage-7.1-2023-3274,openSUSE-SLE-15.4-2023-3274,openSUSE-SLE-15.5-2023-3274 SKIP SUSE-RU-2023:3275-1 as openSUSE-SLE-15.4-2023-3275 is not security or has no CVEs. patches: SUSE-2023-3275,SUSE-SLE-Micro-5.3-2023-3275,SUSE-SLE-Micro-5.4-2023-3275,SUSE-SLE-Module-Basesystem-15-SP4-2023-3275,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3275,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3275,openSUSE-Leap-Micro-5.3-2023-3275,openSUSE-Leap-Micro-5.4-2023-3275,openSUSE-SLE-15.4-2023-3275 SKIP SUSE-RU-2023:3276-1 as openSUSE-SLE-15.5-2023-3276 is not security or has no CVEs. patches: SUSE-2023-3276,SUSE-SLE-Module-Basesystem-15-SP5-2023-3276,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3276,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3276,openSUSE-SLE-15.5-2023-3276 SKIP SUSE-RU-2023:3277-1 as openSUSE-SLE-15.5-2023-3277 is not security or has no CVEs. patches: SUSE-2023-3277,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3277,openSUSE-SLE-15.5-2023-3277 SKIP SUSE-RU-2023:3278-1 as SUSE-Storage-7.1-2023-3278 is not security or has no CVEs. patches: SUSE-2023-3278,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3278,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3278,SUSE-SLE-Product-RT-15-SP3-2023-3278,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3278,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3278,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3278,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3278,SUSE-Storage-7.1-2023-3278 SKIP SUSE-RU-2023:3279-1 as openSUSE-SLE-15.4-2023-3279 is not security or has no CVEs. patches: SUSE-2023-3279,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3279,openSUSE-SLE-15.4-2023-3279 SKIP SUSE-RU-2023:3280-1 as openSUSE-SLE-15.5-2023-3280 is not security or has no CVEs. patches: SUSE-2023-3280,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-3280,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-3280,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3280,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3280,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3280,openSUSE-SLE-15.4-2023-3280,openSUSE-SLE-15.5-2023-3280 SKIP SUSE-RU-2023:3281-1 as SUSE-SLE-SERVER-12-SP5-2023-3281 is not security or has no CVEs. patches: SUSE-2023-3281,SUSE-OpenStack-Cloud-9-2023-3281,SUSE-OpenStack-Cloud-Crowbar-9-2023-3281,SUSE-SLE-SAP-12-SP4-2023-3281,SUSE-SLE-SERVER-12-SP2-BCL-2023-3281,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-3281,SUSE-SLE-SERVER-12-SP4-LTSS-2023-3281,SUSE-SLE-SERVER-12-SP5-2023-3281 SKIP SUSE-RU-2023:3282-1 as openSUSE-SLE-15.5-2023-3282 is not security or has no CVEs. patches: SUSE-2023-3282,SUSE-SLE-Micro-5.3-2023-3282,SUSE-SLE-Micro-5.4-2023-3282,SUSE-SLE-Module-Basesystem-15-SP4-2023-3282,SUSE-SLE-Module-Basesystem-15-SP5-2023-3282,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3282,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3282,SUSE-SLE-Product-RT-15-SP3-2023-3282,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3282,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3282,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3282,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3282,SUSE-SUSE-MicroOS-5.1-2023-3282,SUSE-SUSE-MicroOS-5.2-2023-3282,SUSE-Storage-7.1-2023-3282,openSUSE-Leap-Micro-5.3-2023-3282,openSUSE-Leap-Micro-5.4-2023-3282,openSUSE-SLE-15.4-2023-3282,openSUSE-SLE-15.5-2023-3282 SKIP SUSE-RU-2023:3284-1 as SUSE-Storage-7.1-2023-3284 is not security or has no CVEs. patches: SUSE-2023-3284,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3284,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3284,SUSE-SLE-Product-RT-15-SP3-2023-3284,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3284,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3284,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3284,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3284,SUSE-SUSE-MicroOS-5.1-2023-3284,SUSE-SUSE-MicroOS-5.2-2023-3284,SUSE-Storage-7.1-2023-3284 SKIP SUSE-RU-2023:3285-1 as openSUSE-SLE-15.5-2023-3285 is not security or has no CVEs. patches: SUSE-2023-3285,SUSE-SLE-Micro-5.3-2023-3285,SUSE-SLE-Module-Basesystem-15-SP4-2023-3285,SUSE-SLE-Module-Basesystem-15-SP5-2023-3285,openSUSE-Leap-Micro-5.3-2023-3285,openSUSE-SLE-15.4-2023-3285,openSUSE-SLE-15.5-2023-3285 SKIP SUSE-RU-2023:3286-1 as openSUSE-SLE-15.4-2023-3286 is not security or has no CVEs. patches: SUSE-2023-3286,SUSE-SLE-Micro-5.3-2023-3286,SUSE-SLE-Micro-5.4-2023-3286,SUSE-SLE-Module-Basesystem-15-SP4-2023-3286,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3286,openSUSE-Leap-Micro-5.3-2023-3286,openSUSE-Leap-Micro-5.4-2023-3286,openSUSE-SLE-15.4-2023-3286 SKIP SUSE-RU-2023:3288-1 as openSUSE-SLE-15.4-2023-3288 is not security or has no CVEs. patches: SUSE-2023-3288,SUSE-SLE-Micro-5.3-2023-3288,SUSE-SLE-Micro-5.4-2023-3288,SUSE-SLE-Module-Basesystem-15-SP4-2023-3288,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3288,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3288,SUSE-SUSE-MicroOS-5.1-2023-3288,SUSE-SUSE-MicroOS-5.2-2023-3288,openSUSE-Leap-Micro-5.3-2023-3288,openSUSE-Leap-Micro-5.4-2023-3288,openSUSE-SLE-15.4-2023-3288 SKIP SUSE-RU-2023:3294-1 as SUSE-Storage-7.1-2023-3294 is not security or has no CVEs. patches: SUSE-2023-3294,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3294,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3294,SUSE-SLE-Product-RT-15-SP3-2023-3294,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3294,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3294,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3294,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3294,SUSE-SUSE-MicroOS-5.1-2023-3294,SUSE-SUSE-MicroOS-5.2-2023-3294,SUSE-Storage-7.1-2023-3294 SKIP SUSE-RU-2023:3295-1 as SUSE-SLE-SERVER-12-SP5-2023-3295 is not security or has no CVEs. patches: SUSE-2023-3295,SUSE-SLE-SDK-12-SP5-2023-3295,SUSE-SLE-SERVER-12-SP5-2023-3295 SKIP SUSE-RU-2023:3296-1 as openSUSE-SLE-15.5-2023-3296 is not security or has no CVEs. patches: SUSE-2023-3296,openSUSE-SLE-15.4-2023-3296,openSUSE-SLE-15.5-2023-3296 SKIP SUSE-RU-2023:3297-1 as openSUSE-SLE-15.4-2023-3297 is not security or has no CVEs. patches: SUSE-2023-3297,SUSE-SLE-Product-HA-15-SP4-2023-3297,openSUSE-SLE-15.4-2023-3297 SKIP SUSE-RU-2023:3299-1 as openSUSE-SLE-15.5-2023-3299 is not security or has no CVEs. patches: SUSE-2023-3299,SUSE-SLE-Module-Containers-15-SP4-2023-3299,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3299,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3299,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3299,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3299,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3299,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3299,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3299,SUSE-Storage-7-2023-3299,SUSE-Storage-7.1-2023-3299,openSUSE-SLE-15.4-2023-3299,openSUSE-SLE-15.5-2023-3299 SKIP SUSE-RU-2023:3312-1 as openSUSE-SLE-15.5-2023-3312 is not security or has no CVEs. patches: SUSE-2023-3312,SUSE-SLE-Manager-Tools-For-Micro-5-2023-3312,SUSE-SLE-Module-Basesystem-15-SP4-2023-3312,SUSE-SLE-Module-Basesystem-15-SP5-2023-3312,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3312,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3312,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3312,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3312,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3312,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3312,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3312,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3312,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3312,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3312,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3312,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3312,SUSE-Storage-7.1-2023-3312,openSUSE-SLE-15.4-2023-3312,openSUSE-SLE-15.5-2023-3312 SKIP SUSE-RU-2023:3314-1 as openSUSE-SLE-15.5-2023-3314 is not security or has no CVEs. patches: SUSE-2023-3314,SUSE-SLE-Module-Basesystem-15-SP4-2023-3314,SUSE-SLE-Module-Basesystem-15-SP5-2023-3314,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3314,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3314,SUSE-SLE-Product-RT-15-SP3-2023-3314,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3314,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3314,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3314,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3314,SUSE-Storage-7.1-2023-3314,openSUSE-SLE-15.4-2023-3314,openSUSE-SLE-15.5-2023-3314 SKIP SUSE-RU-2023:3315-1 as SUSE-Storage-7.1-2023-3315 is not security or has no CVEs. patches: SUSE-2023-3315,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3315,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3315,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3315,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3315,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3315,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3315,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3315,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3315,SUSE-Storage-7.1-2023-3315 SKIP SUSE-RU-2023:3323-1 as openSUSE-SLE-15.5-2023-3323 is not security or has no CVEs. patches: SUSE-2023-3323,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3323,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3323,openSUSE-SLE-15.4-2023-3323,openSUSE-SLE-15.5-2023-3323 SKIP SUSE-RU-2023:3326-1 as openSUSE-SLE-15.4-2023-3326 is not security or has no CVEs. patches: SUSE-2023-3326,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3326,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3326,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3326,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3326,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3326,SUSE-SLE-Product-RT-15-SP3-2023-3326,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3326,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3326,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3326,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3326,SUSE-Storage-7-2023-3326,SUSE-Storage-7.1-2023-3326,openSUSE-SLE-15.4-2023-3326 SKIP SUSE-RU-2023:3330-1 as openSUSE-SLE-15.5-2023-3330 is not security or has no CVEs. patches: SUSE-2023-3330,SUSE-SLE-Micro-5.3-2023-3330,SUSE-SLE-Micro-5.4-2023-3330,SUSE-SLE-Module-Basesystem-15-SP4-2023-3330,SUSE-SLE-Module-Basesystem-15-SP5-2023-3330,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3330,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3330,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3330,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3330,SUSE-SLE-Product-RT-15-SP3-2023-3330,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3330,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3330,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3330,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3330,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3330,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3330,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3330,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3330,SUSE-SUSE-MicroOS-5.1-2023-3330,SUSE-SUSE-MicroOS-5.2-2023-3330,SUSE-Storage-7-2023-3330,SUSE-Storage-7.1-2023-3330,openSUSE-Leap-Micro-5.3-2023-3330,openSUSE-Leap-Micro-5.4-2023-3330,openSUSE-SLE-15.4-2023-3330,openSUSE-SLE-15.5-2023-3330 SKIP SUSE-RU-2023:3331-1 as openSUSE-SLE-15.5-2023-3331 is not security or has no CVEs. patches: SUSE-2023-3331,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-3331,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3331,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3331,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3331,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-3331,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3331,openSUSE-SLE-15.4-2023-3331,openSUSE-SLE-15.5-2023-3331 SKIP SUSE-RU-2023:3334-1 as openSUSE-Leap-Micro-5.3-2023-3334 is not security or has no CVEs. patches: SUSE-2023-3334,SUSE-SLE-Micro-5.3-2023-3334,openSUSE-Leap-Micro-5.3-2023-3334 SKIP SUSE-RU-2023:3335-1 as openSUSE-SLE-15.5-2023-3335 is not security or has no CVEs. patches: SUSE-2023-3335,SUSE-SLE-Module-Basesystem-15-SP4-2023-3335,SUSE-SLE-Module-Basesystem-15-SP5-2023-3335,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3335,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3335,openSUSE-SLE-15.4-2023-3335,openSUSE-SLE-15.5-2023-3335 SKIP SUSE-RU-2023:3336-1 as openSUSE-SLE-15.5-2023-3336 is not security or has no CVEs. patches: SUSE-2023-3336,SUSE-SLE-Module-Basesystem-15-SP4-2023-3336,SUSE-SLE-Module-Basesystem-15-SP5-2023-3336,openSUSE-SLE-15.4-2023-3336,openSUSE-SLE-15.5-2023-3336 SKIP SUSE-RU-2023:3337-1 as openSUSE-SLE-15.5-2023-3337 is not security or has no CVEs. patches: SUSE-2023-3337,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3337,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-3337,openSUSE-SLE-15.5-2023-3337 SKIP SUSE-RU-2023:3340-1 as openSUSE-SLE-15.5-2023-3340 is not security or has no CVEs. patches: SUSE-2023-3340,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3340,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3340,openSUSE-SLE-15.4-2023-3340,openSUSE-SLE-15.5-2023-3340 SKIP SUSE-RU-2023:3351-1 as openSUSE-SLE-15.5-2023-3351 is not security or has no CVEs. patches: SUSE-2023-3351,SUSE-SLE-Module-Basesystem-15-SP4-2023-3351,SUSE-SLE-Module-Basesystem-15-SP5-2023-3351,openSUSE-SLE-15.4-2023-3351,openSUSE-SLE-15.5-2023-3351 SKIP SUSE-RU-2023:3352-1 as openSUSE-SLE-15.4-2023-3352 is not security or has no CVEs. patches: SUSE-2023-3352,SUSE-SLE-Module-Basesystem-15-SP4-2023-3352,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3352,SUSE-SLE-Product-WE-15-SP4-2023-3352,openSUSE-SLE-15.4-2023-3352 SKIP SUSE-RU-2023:3354-1 as openSUSE-SLE-15.5-2023-3354 is not security or has no CVEs. patches: SUSE-2023-3354,SUSE-SLE-Module-Basesystem-15-SP5-2023-3354,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3354,SUSE-SLE-Product-WE-15-SP5-2023-3354,openSUSE-SLE-15.5-2023-3354 SKIP SUSE-RU-2023:3364-1 as SUSE-SLE-SERVER-12-SP5-2023-3364 is not security or has no CVEs. patches: SUSE-2023-3364,SUSE-SLE-SDK-12-SP5-2023-3364,SUSE-SLE-SERVER-12-SP5-2023-3364 SKIP SUSE-RU-2023:3367-1 as SUSE-SLE-SDK-12-SP5-2023-3367 is not security or has no CVEs. patches: SUSE-2023-3367,SUSE-SLE-SDK-12-SP5-2023-3367 SKIP SUSE-RU-2023:3371-1 as openSUSE-SLE-15.5-2023-3371 is not security or has no CVEs. patches: SUSE-2023-3371,SUSE-SLE-Module-Basesystem-15-SP4-2023-3371,SUSE-SLE-Module-Basesystem-15-SP5-2023-3371,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3371,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3371,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3371,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3371,SUSE-SLE-Product-RT-15-SP3-2023-3371,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3371,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3371,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3371,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3371,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3371,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3371,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3371,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3371,SUSE-Storage-7.1-2023-3371,openSUSE-SLE-15.4-2023-3371,openSUSE-SLE-15.5-2023-3371 SKIP SUSE-RU-2023:3372-1 as openSUSE-SLE-15.5-2023-3372 is not security or has no CVEs. patches: SUSE-2023-3372,SUSE-SLE-Module-Basesystem-15-SP4-2023-3372,SUSE-SLE-Module-Basesystem-15-SP5-2023-3372,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3372,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3372,openSUSE-SLE-15.4-2023-3372,openSUSE-SLE-15.5-2023-3372 SKIP SUSE-RU-2023:3373-1 as SUSE-Storage-7.1-2023-3373 is not security or has no CVEs. patches: SUSE-2023-3373,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3373,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3373,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3373,SUSE-SLE-Product-RT-15-SP3-2023-3373,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3373,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3373,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3373,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3373,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3373,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3373,SUSE-Storage-7.1-2023-3373 SKIP SUSE-RU-2023:3386-1 as openSUSE-SLE-15.5-2023-3386 is not security or has no CVEs. patches: SUSE-2023-3386,SUSE-SLE-Module-Basesystem-15-SP4-2023-3386,SUSE-SLE-Module-Basesystem-15-SP5-2023-3386,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3386,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3386,openSUSE-SLE-15.4-2023-3386,openSUSE-SLE-15.5-2023-3386 SKIP SUSE-RU-2023:3387-1 as openSUSE-SLE-15.5-2023-3387 is not security or has no CVEs. patches: SUSE-2023-3387,SUSE-SLE-Micro-5.3-2023-3387,SUSE-SLE-Micro-5.4-2023-3387,SUSE-SLE-Module-Basesystem-15-SP4-2023-3387,SUSE-SLE-Module-Basesystem-15-SP5-2023-3387,openSUSE-Leap-Micro-5.3-2023-3387,openSUSE-Leap-Micro-5.4-2023-3387,openSUSE-SLE-15.4-2023-3387,openSUSE-SLE-15.5-2023-3387 SKIP SUSE-RU-2023:3388-1 as openSUSE-SLE-15.5-2023-3388 is not security or has no CVEs. patches: SUSE-2023-3388,SUSE-SLE-Module-Basesystem-15-SP4-2023-3388,SUSE-SLE-Module-Basesystem-15-SP5-2023-3388,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3388,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3388,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3388,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3388,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3388,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3388,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3388,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3388,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3388,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3388,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3388,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3388,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3388,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3388,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3388,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3388,SUSE-Storage-7.1-2023-3388,openSUSE-SLE-15.4-2023-3388,openSUSE-SLE-15.5-2023-3388 SKIP SUSE-RU-2023:3393-1 as openSUSE-SLE-15.5-2023-3393 is not security or has no CVEs. patches: SUSE-2023-3393,SUSE-SLE-Module-Basesystem-15-SP5-2023-3393,openSUSE-SLE-15.5-2023-3393 SKIP SUSE-RU-2023:3396-1 as openSUSE-SLE-15.5-2023-3396 is not security or has no CVEs. patches: SUSE-2023-3396,SUSE-SLE-Module-Basesystem-15-SP5-2023-3396,openSUSE-SLE-15.5-2023-3396 SKIP SUSE-RU-2023:3403-1 as openSUSE-SLE-15.4-2023-3403 is not security or has no CVEs. patches: SUSE-2023-3403,SUSE-SLE-Micro-5.3-2023-3403,SUSE-SLE-Micro-5.4-2023-3403,SUSE-SLE-Module-Basesystem-15-SP4-2023-3403,openSUSE-Leap-Micro-5.3-2023-3403,openSUSE-Leap-Micro-5.4-2023-3403,openSUSE-SLE-15.4-2023-3403 SKIP SUSE-RU-2023:3404-1 as SUSE-SLE-SERVER-12-SP5-2023-3404 is not security or has no CVEs. patches: SUSE-2023-3404,SUSE-SLE-SERVER-12-SP5-2023-3404 SKIP SUSE-RU-2023:3410-1 as openSUSE-SLE-15.5-2023-3410 is not security or has no CVEs. patches: SUSE-2023-3410,SUSE-SLE-Micro-5.3-2023-3410,SUSE-SLE-Micro-5.4-2023-3410,SUSE-SLE-Module-Basesystem-15-SP4-2023-3410,SUSE-SLE-Module-Basesystem-15-SP5-2023-3410,openSUSE-Leap-Micro-5.3-2023-3410,openSUSE-Leap-Micro-5.4-2023-3410,openSUSE-SLE-15.4-2023-3410,openSUSE-SLE-15.5-2023-3410 SKIP SUSE-RU-2023:3411-1 as openSUSE-SLE-15.5-2023-3411 is not security or has no CVEs. patches: SUSE-2023-3411,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3411,openSUSE-SLE-15.5-2023-3411 SKIP SUSE-RU-2023:3412-1 as openSUSE-SLE-15.4-2023-3412 is not security or has no CVEs. patches: SUSE-2023-3412,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3412,openSUSE-SLE-15.4-2023-3412 SKIP SUSE-RU-2023:3414-1 as SUSE-SLE-SERVER-12-SP5-2023-3414 is not security or has no CVEs. patches: SUSE-2023-3414,SUSE-SLE-SERVER-12-SP5-2023-3414 SKIP SUSE-RU-2023:3415-1 as SUSE-SLE-SERVER-12-SP5-2023-3415 is not security or has no CVEs. patches: SUSE-2023-3415,SUSE-SLE-SERVER-12-SP2-BCL-2023-3415,SUSE-SLE-SERVER-12-SP5-2023-3415 SKIP SUSE-RU-2023:3416-1 as openSUSE-SLE-15.4-2023-3416 is not security or has no CVEs. patches: SUSE-2023-3416,SUSE-SLE-Micro-5.3-2023-3416,SUSE-SLE-Micro-5.4-2023-3416,SUSE-SLE-Module-Basesystem-15-SP4-2023-3416,openSUSE-Leap-Micro-5.3-2023-3416,openSUSE-Leap-Micro-5.4-2023-3416,openSUSE-SLE-15.4-2023-3416 SKIP SUSE-RU-2023:3417-1 as openSUSE-SLE-15.5-2023-3417 is not security or has no CVEs. patches: SUSE-2023-3417,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3417,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3417,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3417,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3417,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3417,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3417,SUSE-Storage-7.1-2023-3417,openSUSE-SLE-15.4-2023-3417,openSUSE-SLE-15.5-2023-3417 SKIP SUSE-RU-2023:3418-1 as openSUSE-SLE-15.5-2023-3418 is not security or has no CVEs. patches: SUSE-2023-3418,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3418,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3418,openSUSE-SLE-15.4-2023-3418,openSUSE-SLE-15.5-2023-3418 SKIP SUSE-RU-2023:3422-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3422 is not security or has no CVEs. patches: SUSE-2023-3422,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3422,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3422,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3422,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3422,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3422,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3422 SKIP SUSE-RU-2023:3423-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2023-3423 is not security or has no CVEs. patches: SUSE-2023-3423,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-3423 SKIP SUSE-RU-2023:3424-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3424 is not security or has no CVEs. patches: SUSE-2023-3424,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3424 SKIP SUSE-RU-2023:3425-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3425 is not security or has no CVEs. patches: SUSE-2023-3425,SUSE-SLE-Module-Public-Cloud-12-2023-3425 SKIP SUSE-RU-2023:3426-1 as openSUSE-SLE-15.4-2023-3426 is not security or has no CVEs. patches: SUSE-2023-3426,SUSE-SLE-Product-HA-15-SP4-2023-3426,openSUSE-SLE-15.4-2023-3426 ERROR: notice SUSE-RU-2023:3428-1 has no valid patches out of: SUSE-2023-3428,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3428,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-3428 ERROR: notice SUSE-RU-2023:3428-2 has no valid patches out of: SUSE-2023-3428,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3428,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-3428 SKIP SUSE-RU-2023:3429-1 as openSUSE-SLE-15.5-2023-3429 is not security or has no CVEs. patches: SUSE-2023-3429,SUSE-SLE-Module-Basesystem-15-SP5-2023-3429,openSUSE-SLE-15.5-2023-3429 SKIP SUSE-RU-2023:3430-1 as openSUSE-SLE-15.4-2023-3430 is not security or has no CVEs. patches: SUSE-2023-3430,SUSE-SLE-Module-Basesystem-15-SP4-2023-3430,openSUSE-SLE-15.4-2023-3430 SKIP SUSE-RU-2023:3436-1 as openSUSE-SLE-15.5-2023-3436 is not security or has no CVEs. patches: SUSE-2023-3436,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3436,openSUSE-SLE-15.5-2023-3436 SKIP SUSE-RU-2023:3437-1 as openSUSE-SLE-15.5-2023-3437 is not security or has no CVEs. patches: SUSE-2023-3437,SUSE-SLE-Module-Basesystem-15-SP5-2023-3437,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3437,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3437,openSUSE-SLE-15.5-2023-3437 SKIP SUSE-RU-2023:3448-1 as SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3448 is not security or has no CVEs. patches: SUSE-2023-3448,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3448,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3448,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3448 SKIP SUSE-RU-2023:3449-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3449 is not security or has no CVEs. patches: SUSE-2023-3449,SUSE-SLE-Module-Public-Cloud-12-2023-3449 SKIP SUSE-RU-2023:3450-1 as openSUSE-SLE-15.5-2023-3450 is not security or has no CVEs. patches: SUSE-2023-3450,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3450,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3450,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3450,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3450,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3450,openSUSE-SLE-15.5-2023-3450 SKIP SUSE-RU-2023:3451-1 as openSUSE-SLE-15.5-2023-3451 is not security or has no CVEs. patches: SUSE-2023-3451,SUSE-SLE-Micro-5.3-2023-3451,SUSE-SLE-Micro-5.4-2023-3451,SUSE-SLE-Module-Basesystem-15-SP4-2023-3451,SUSE-SLE-Module-Basesystem-15-SP5-2023-3451,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3451,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3451,openSUSE-Leap-Micro-5.3-2023-3451,openSUSE-Leap-Micro-5.4-2023-3451,openSUSE-SLE-15.4-2023-3451,openSUSE-SLE-15.5-2023-3451 SKIP SUSE-RU-2023:3452-1 as openSUSE-SLE-15.5-2023-3452 is not security or has no CVEs. patches: SUSE-2023-3452,SUSE-SLE-Micro-5.3-2023-3452,SUSE-SLE-Micro-5.4-2023-3452,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3452,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3452,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3452,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3452,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3452,openSUSE-SLE-15.4-2023-3452,openSUSE-SLE-15.5-2023-3452 SKIP SUSE-RU-2023:3453-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3453 is not security or has no CVEs. patches: SUSE-2023-3453,SUSE-SLE-Module-Public-Cloud-12-2023-3453 SKIP SUSE-RU-2023:3457-1 as openSUSE-SLE-15.5-2023-3457 is not security or has no CVEs. patches: SUSE-2023-3457,SUSE-SLE-Module-Basesystem-15-SP4-2023-3457,SUSE-SLE-Module-Basesystem-15-SP5-2023-3457,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3457,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3457,openSUSE-SLE-15.4-2023-3457,openSUSE-SLE-15.5-2023-3457 SKIP SUSE-RU-2023:3459-1 as openSUSE-SLE-15.5-2023-3459 is not security or has no CVEs. patches: SUSE-2023-3459,SUSE-SLE-Manager-Tools-For-Micro-5-2023-3459,SUSE-SLE-Module-Basesystem-15-SP4-2023-3459,SUSE-SLE-Module-Basesystem-15-SP5-2023-3459,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3459,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3459,openSUSE-SLE-15.4-2023-3459,openSUSE-SLE-15.5-2023-3459 SKIP SUSE-RU-2023:3459-2 as SUSE-Storage-7.1-2023-3459 is not security or has no CVEs. patches: SUSE-2023-3459,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3459,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3459,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3459,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3459,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3459,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3459,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3459,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3459,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3459,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3459,SUSE-Storage-7.1-2023-3459 SKIP SUSE-RU-2023:3460-1 as openSUSE-SLE-15.5-2023-3460 is not security or has no CVEs. patches: SUSE-2023-3460,SUSE-SLE-Module-Basesystem-15-SP5-2023-3460,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3460,openSUSE-SLE-15.5-2023-3460 SKIP SUSE-RU-2023:3464-1 as openSUSE-SLE-15.5-2023-3464 is not security or has no CVEs. patches: SUSE-2023-3464,SUSE-SLE-Module-Basesystem-15-SP4-2023-3464,SUSE-SLE-Module-Basesystem-15-SP5-2023-3464,openSUSE-SLE-15.4-2023-3464,openSUSE-SLE-15.5-2023-3464 SKIP SUSE-RU-2023:3465-1 as openSUSE-SLE-15.5-2023-3465 is not security or has no CVEs. patches: SUSE-2023-3465,SUSE-SLE-Module-Basesystem-15-SP5-2023-3465,SUSE-SLE-Product-HA-15-SP5-2023-3465,openSUSE-SLE-15.5-2023-3465 SKIP SUSE-RU-2023:3466-1 as openSUSE-SLE-15.5-2023-3466 is not security or has no CVEs. patches: SUSE-2023-3466,SUSE-SLE-Micro-5.3-2023-3466,SUSE-SLE-Micro-5.4-2023-3466,SUSE-SLE-Module-Basesystem-15-SP4-2023-3466,SUSE-SLE-Module-Basesystem-15-SP5-2023-3466,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3466,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3466,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3466,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3466,SUSE-SUSE-MicroOS-5.1-2023-3466,SUSE-SUSE-MicroOS-5.2-2023-3466,openSUSE-Leap-Micro-5.3-2023-3466,openSUSE-Leap-Micro-5.4-2023-3466,openSUSE-SLE-15.4-2023-3466,openSUSE-SLE-15.5-2023-3466 SKIP SUSE-RU-2023:3467-1 as SUSE-Storage-7.1-2023-3467 is not security or has no CVEs. patches: SUSE-2023-3467,SUSE-SLE-Product-HA-15-SP3-2023-3467,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3467,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3467,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3467,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3467,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3467,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3467,SUSE-SUSE-MicroOS-5.2-2023-3467,SUSE-Storage-7.1-2023-3467 SKIP SUSE-RU-2023:3468-1 as openSUSE-SLE-15.5-2023-3468 is not security or has no CVEs. patches: SUSE-2023-3468,SUSE-SLE-Micro-5.3-2023-3468,SUSE-SLE-Micro-5.4-2023-3468,SUSE-SLE-Module-Basesystem-15-SP4-2023-3468,SUSE-SLE-Module-Basesystem-15-SP5-2023-3468,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3468,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3468,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3468,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3468,SUSE-SLE-Module-HPC-15-SP4-2023-3468,SUSE-SLE-Module-HPC-15-SP5-2023-3468,SUSE-SLE-Module-Legacy-15-SP4-2023-3468,SUSE-SLE-Module-Legacy-15-SP5-2023-3468,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3468,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3468,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3468,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3468,openSUSE-Leap-Micro-5.3-2023-3468,openSUSE-Leap-Micro-5.4-2023-3468,openSUSE-SLE-15.4-2023-3468,openSUSE-SLE-15.5-2023-3468 SKIP SUSE-RU-2023:3470-1 as openSUSE-SLE-15.5-2023-3470 is not security or has no CVEs. patches: SUSE-2023-3470,SUSE-SLE-Micro-5.3-2023-3470,SUSE-SLE-Micro-5.4-2023-3470,SUSE-SLE-Module-Basesystem-15-SP4-2023-3470,SUSE-SLE-Module-Basesystem-15-SP5-2023-3470,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3470,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3470,SUSE-SUSE-MicroOS-5.1-2023-3470,SUSE-SUSE-MicroOS-5.2-2023-3470,openSUSE-Leap-Micro-5.3-2023-3470,openSUSE-Leap-Micro-5.4-2023-3470,openSUSE-SLE-15.4-2023-3470,openSUSE-SLE-15.5-2023-3470 SKIP SUSE-RU-2023:3473-1 as SUSE-SLE-Live-Patching-12-SP5-2023-3473 is not security or has no CVEs. patches: SUSE-2023-3473,SUSE-SLE-Live-Patching-12-2023-3473,SUSE-SLE-Live-Patching-12-SP4-2023-3473,SUSE-SLE-Live-Patching-12-SP5-2023-3473 SKIP SUSE-RU-2023:3476-1 as openSUSE-SLE-15.4-2023-3476 is not security or has no CVEs. patches: SUSE-2023-3476,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3476,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3476,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3476,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3476,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3476,SUSE-SLE-Product-RT-15-SP3-2023-3476,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3476,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3476,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3476,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3476,SUSE-Storage-7-2023-3476,SUSE-Storage-7.1-2023-3476,openSUSE-SLE-15.4-2023-3476 SKIP SUSE-RU-2023:3476-2 as openSUSE-SLE-15.5-2023-3476 is not security or has no CVEs. patches: SUSE-2023-3476,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3476,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3476,openSUSE-SLE-15.5-2023-3476 SKIP SUSE-RU-2023:3477-1 as openSUSE-SLE-15.5-2023-3477 is not security or has no CVEs. patches: SUSE-2023-3477,SUSE-SLE-Micro-5.3-2023-3477,SUSE-SLE-Micro-5.4-2023-3477,SUSE-SLE-Module-Basesystem-15-SP4-2023-3477,SUSE-SLE-Module-Basesystem-15-SP5-2023-3477,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3477,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3477,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3477,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3477,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3477,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3477,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3477,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3477,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3477,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3477,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3477,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3477,SUSE-SUSE-MicroOS-5.1-2023-3477,SUSE-SUSE-MicroOS-5.2-2023-3477,SUSE-Storage-7.1-2023-3477,openSUSE-Leap-Micro-5.3-2023-3477,openSUSE-Leap-Micro-5.4-2023-3477,openSUSE-SLE-15.4-2023-3477,openSUSE-SLE-15.5-2023-3477 SKIP SUSE-RU-2023:3478-1 as openSUSE-SLE-15.5-2023-3478 is not security or has no CVEs. patches: SUSE-2023-3478,SUSE-SLE-Module-Basesystem-15-SP5-2023-3478,openSUSE-SLE-15.5-2023-3478 SKIP SUSE-RU-2023:3479-1 as openSUSE-SLE-15.4-2023-3479 is not security or has no CVEs. patches: SUSE-2023-3479,SUSE-SLE-Module-Basesystem-15-SP4-2023-3479,openSUSE-SLE-15.4-2023-3479 SKIP SUSE-RU-2023:3480-1 as openSUSE-SLE-15.5-2023-3480 is not security or has no CVEs. patches: SUSE-2023-3480,SUSE-SLE-Module-Basesystem-15-SP4-2023-3480,SUSE-SLE-Module-Basesystem-15-SP5-2023-3480,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3480,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3480,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3480,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3480,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3480,openSUSE-SLE-15.4-2023-3480,openSUSE-SLE-15.5-2023-3480 SKIP SUSE-RU-2023:3481-1 as openSUSE-SLE-15.5-2023-3481 is not security or has no CVEs. patches: SUSE-2023-3481,SUSE-SLE-Module-Basesystem-15-SP5-2023-3481,openSUSE-SLE-15.5-2023-3481 SKIP SUSE-RU-2023:3483-1 as SUSE-SLE-WE-12-SP5-2023-3483 is not security or has no CVEs. patches: SUSE-2023-3483,SUSE-SLE-SDK-12-SP5-2023-3483,SUSE-SLE-SERVER-12-SP5-2023-3483,SUSE-SLE-WE-12-SP5-2023-3483 SKIP SUSE-RU-2023:3485-1 as openSUSE-SLE-15.5-2023-3485 is not security or has no CVEs. patches: SUSE-2023-3485,SUSE-SLE-Module-Basesystem-15-SP5-2023-3485,SUSE-SLE-Product-HA-15-SP5-2023-3485,openSUSE-SLE-15.5-2023-3485 SKIP SUSE-RU-2023:3486-1 as openSUSE-SLE-15.4-2023-3486 is not security or has no CVEs. patches: SUSE-2023-3486,SUSE-SLE-Micro-5.3-2023-3486,SUSE-SLE-Micro-5.4-2023-3486,SUSE-SLE-Module-Basesystem-15-SP4-2023-3486,SUSE-SLE-Product-HA-15-SP4-2023-3486,openSUSE-Leap-Micro-5.3-2023-3486,openSUSE-Leap-Micro-5.4-2023-3486,openSUSE-SLE-15.4-2023-3486 SKIP SUSE-RU-2023:3487-1 as SUSE-SUSE-MicroOS-5.2-2023-3487 is not security or has no CVEs. patches: SUSE-2023-3487,SUSE-SLE-Product-HA-15-SP2-2023-3487,SUSE-SLE-Product-HA-15-SP3-2023-3487,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3487,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3487,SUSE-SUSE-MicroOS-5.1-2023-3487,SUSE-SUSE-MicroOS-5.2-2023-3487 SKIP SUSE-RU-2023:3488-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3488 is not security or has no CVEs. patches: SUSE-2023-3488,SUSE-SLE-Module-Public-Cloud-12-2023-3488 SKIP SUSE-RU-2023:3489-1 as SUSE-OpenStack-Cloud-Crowbar-8-2023-3489 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2023-3489,SUSE-2023-3489,SUSE-OpenStack-Cloud-8-2023-3489,SUSE-OpenStack-Cloud-Crowbar-8-2023-3489 SKIP SUSE-RU-2023:3491-1 as openSUSE-SLE-15.5-2023-3491 is not security or has no CVEs. patches: SUSE-2023-3491,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3491,openSUSE-SLE-15.5-2023-3491 SKIP SUSE-RU-2023:3492-1 as SUSE-SLE-Product-HA-15-SP3-2023-3492 is not security or has no CVEs. patches: SUSE-2023-3492,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3492,SUSE-SLE-Product-HA-15-SP3-2023-3492 SKIP SUSE-RU-2023:3500-1 as openSUSE-SLE-15.5-2023-3500 is not security or has no CVEs. patches: SUSE-2023-3500,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3500,SUSE-SLE-Module-RT-15-SP5-2023-3500,openSUSE-SLE-15.5-2023-3500 SKIP SUSE-RU-2023:3502-1 as openSUSE-SLE-15.5-2023-3502 is not security or has no CVEs. patches: SUSE-2023-3502,SUSE-SLE-Module-Live-Patching-15-SP1-2023-3502,SUSE-SLE-Module-Live-Patching-15-SP2-2023-3502,SUSE-SLE-Module-Live-Patching-15-SP3-2023-3502,SUSE-SLE-Module-Live-Patching-15-SP4-2023-3502,SUSE-SLE-Module-Live-Patching-15-SP5-2023-3502,openSUSE-SLE-15.4-2023-3502,openSUSE-SLE-15.5-2023-3502 SKIP SUSE-RU-2023:3503-1 as openSUSE-SLE-15.5-2023-3503 is not security or has no CVEs. patches: SUSE-2023-3503,SUSE-SLE-Module-Transactional-Server-15-SP4-2023-3503,SUSE-SLE-Module-Transactional-Server-15-SP5-2023-3503,openSUSE-SLE-15.4-2023-3503,openSUSE-SLE-15.5-2023-3503 SKIP SUSE-RU-2023:3509-1 as openSUSE-SLE-15.5-2023-3509 is not security or has no CVEs. patches: SUSE-2023-3509,SUSE-SLE-Module-Basesystem-15-SP4-2023-3509,SUSE-SLE-Module-Basesystem-15-SP5-2023-3509,openSUSE-SLE-15.4-2023-3509,openSUSE-SLE-15.5-2023-3509 SKIP SUSE-RU-2023:3510-1 as openSUSE-SLE-15.5-2023-3510 is not security or has no CVEs. patches: SUSE-2023-3510,openSUSE-SLE-15.5-2023-3510 SKIP SUSE-RU-2023:3512-1 as SUSE-OpenStack-Cloud-Crowbar-9-2023-3512 is not security or has no CVEs. patches: SUSE-2023-3512,SUSE-OpenStack-Cloud-9-2023-3512,SUSE-OpenStack-Cloud-Crowbar-9-2023-3512 SKIP SUSE-RU-2023:3513-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3513 is not security or has no CVEs. patches: SUSE-2023-3513,SUSE-SLE-INSTALLER-15-SP1-2023-3513,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3513,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3513,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3513 SKIP SUSE-RU-2023:3514-1 as openSUSE-SLE-15.5-2023-3514 is not security or has no CVEs. patches: SUSE-2023-3514,SUSE-SLE-INSTALLER-15-SP4-2023-3514,SUSE-SLE-INSTALLER-15-SP5-2023-3514,SUSE-SLE-Micro-5.3-2023-3514,SUSE-SLE-Micro-5.4-2023-3514,SUSE-SLE-Module-Basesystem-15-SP4-2023-3514,SUSE-SLE-Module-Basesystem-15-SP5-2023-3514,openSUSE-SLE-15.4-2023-3514,openSUSE-SLE-15.5-2023-3514 SKIP SUSE-RU-2023:3515-1 as SUSE-Storage-7.1-2023-3515 is not security or has no CVEs. patches: SUSE-2023-3515,SUSE-SLE-INSTALLER-15-SP2-2023-3515,SUSE-SLE-INSTALLER-15-SP3-2023-3515,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3515,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3515,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3515,SUSE-SLE-Product-RT-15-SP3-2023-3515,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3515,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3515,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3515,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3515,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3515,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3515,SUSE-SUSE-MicroOS-5.1-2023-3515,SUSE-SUSE-MicroOS-5.2-2023-3515,SUSE-Storage-7.1-2023-3515 SKIP SUSE-RU-2023:3521-1 as openSUSE-SLE-15.5-2023-3521 is not security or has no CVEs. patches: SUSE-2023-3521,SUSE-SLE-Micro-5.3-2023-3521,SUSE-SLE-Micro-5.4-2023-3521,SUSE-SLE-Module-Basesystem-15-SP4-2023-3521,SUSE-SLE-Module-Basesystem-15-SP5-2023-3521,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3521,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3521,SUSE-SUSE-MicroOS-5.1-2023-3521,SUSE-SUSE-MicroOS-5.2-2023-3521,openSUSE-SLE-15.4-2023-3521,openSUSE-SLE-15.5-2023-3521 SKIP SUSE-RU-2023:3523-1 as openSUSE-SLE-15.4-2023-3523 is not security or has no CVEs. patches: SUSE-2023-3523,SUSE-SLE-Module-Basesystem-15-SP4-2023-3523,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3523,openSUSE-SLE-15.4-2023-3523 SKIP SUSE-RU-2023:3524-1 as openSUSE-SLE-15.5-2023-3524 is not security or has no CVEs. patches: SUSE-2023-3524,SUSE-SLE-Module-Basesystem-15-SP5-2023-3524,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3524,openSUSE-SLE-15.5-2023-3524 SKIP SUSE-RU-2023:3530-1 as openSUSE-SLE-15.5-2023-3530 is not security or has no CVEs. patches: SUSE-2023-3530,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-3530,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-3530,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3530,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3530,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3530,openSUSE-SLE-15.4-2023-3530,openSUSE-SLE-15.5-2023-3530 SKIP SUSE-RU-2023:3538-1 as openSUSE-SLE-15.4-2023-3538 is not security or has no CVEs. patches: SUSE-2023-3538,SUSE-SLE-Micro-5.3-2023-3538,SUSE-SLE-Micro-5.4-2023-3538,SUSE-SLE-Module-Basesystem-15-SP4-2023-3538,openSUSE-SLE-15.4-2023-3538 SKIP SUSE-RU-2023:3540-1 as SUSE-SUSE-MicroOS-5.2-2023-3540 is not security or has no CVEs. patches: SUSE-2023-3540,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3540,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3540,SUSE-SUSE-MicroOS-5.1-2023-3540,SUSE-SUSE-MicroOS-5.2-2023-3540 SKIP SUSE-RU-2023:3542-1 as openSUSE-SLE-15.4-2023-3542 is not security or has no CVEs. patches: SUSE-2023-3542,SUSE-SLE-Micro-5.3-2023-3542,SUSE-SLE-Micro-5.4-2023-3542,SUSE-SLE-Module-Basesystem-15-SP4-2023-3542,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3542,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3542,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3542,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3542,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3542,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3542,SUSE-SUSE-MicroOS-5.1-2023-3542,SUSE-SUSE-MicroOS-5.2-2023-3542,SUSE-Storage-7.1-2023-3542,openSUSE-SLE-15.4-2023-3542 SKIP SUSE-RU-2023:3543-1 as openSUSE-SLE-15.5-2023-3543 is not security or has no CVEs. patches: SUSE-2023-3543,SUSE-SLE-Module-Basesystem-15-SP4-2023-3543,SUSE-SLE-Module-Basesystem-15-SP5-2023-3543,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3543,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3543,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3543,SUSE-SLE-Product-RT-15-SP3-2023-3543,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3543,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3543,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3543,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3543,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3543,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3543,SUSE-Storage-7.1-2023-3543,openSUSE-SLE-15.4-2023-3543,openSUSE-SLE-15.5-2023-3543 SKIP SUSE-RU-2023:3544-1 as openSUSE-SLE-15.5-2023-3544 is not security or has no CVEs. patches: SUSE-2023-3544,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3544,openSUSE-SLE-15.5-2023-3544 SKIP SUSE-RU-2023:3545-1 as SUSE-SLE-SAP-12-SP5-2023-3545 is not security or has no CVEs. patches: SUSE-2023-3545,SUSE-SLE-SAP-12-SP5-2023-3545 SKIP SUSE-RU-2023:3546-1 as SUSE-Storage-7.1-2023-3546 is not security or has no CVEs. patches: SUSE-2023-3546,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3546,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3546,SUSE-SLE-Product-RT-15-SP3-2023-3546,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3546,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3546,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3546,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3546,SUSE-SUSE-MicroOS-5.1-2023-3546,SUSE-SUSE-MicroOS-5.2-2023-3546,SUSE-Storage-7.1-2023-3546 SKIP SUSE-RU-2023:3551-1 as openSUSE-SLE-15.5-2023-3551 is not security or has no CVEs. patches: SUSE-2023-3551,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3551,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3551,openSUSE-SLE-15.4-2023-3551,openSUSE-SLE-15.5-2023-3551 SKIP SUSE-RU-2023:3552-1 as SUSE-SLE-SERVER-12-SP5-2023-3552 is not security or has no CVEs. patches: SUSE-2023-3552,SUSE-SLE-SERVER-12-SP5-2023-3552 SKIP SUSE-RU-2023:3553-1 as openSUSE-SLE-15.5-2023-3553 is not security or has no CVEs. patches: SUSE-2023-3553,SUSE-SLE-Micro-5.3-2023-3553,SUSE-SLE-Micro-5.4-2023-3553,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3553,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3553,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3553,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3553,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3553,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3553,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3553,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3553,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3553,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3553,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3553,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3553,SUSE-SUSE-MicroOS-5.1-2023-3553,SUSE-SUSE-MicroOS-5.2-2023-3553,SUSE-Storage-7-2023-3553,SUSE-Storage-7.1-2023-3553,openSUSE-SLE-15.4-2023-3553,openSUSE-SLE-15.5-2023-3553 SKIP SUSE-RU-2023:3558-1 as SUSE-SLE-Module-Containers-12-2023-3558 is not security or has no CVEs. patches: SUSE-2023-3558,SUSE-SLE-Module-Containers-12-2023-3558 SKIP SUSE-RU-2023:3574-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3574 is not security or has no CVEs. patches: SUSE-2023-3574,SUSE-SLE-Module-Public-Cloud-12-2023-3574 SKIP SUSE-RU-2023:3575-1 as openSUSE-SLE-15.5-2023-3575 is not security or has no CVEs. patches: SUSE-2023-3575,SUSE-SLE-Micro-5.3-2023-3575,SUSE-SLE-Micro-5.4-2023-3575,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3575,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3575,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3575,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3575,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3575,openSUSE-SLE-15.4-2023-3575,openSUSE-SLE-15.5-2023-3575 SKIP SUSE-RU-2023:3577-1 as openSUSE-SLE-15.5-2023-3577 is not security or has no CVEs. patches: SUSE-2023-3577,SUSE-SLE-Micro-5.3-2023-3577,SUSE-SLE-Micro-5.4-2023-3577,SUSE-SLE-Module-Basesystem-15-SP4-2023-3577,SUSE-SLE-Module-Basesystem-15-SP5-2023-3577,openSUSE-SLE-15.4-2023-3577,openSUSE-SLE-15.5-2023-3577 SKIP SUSE-RU-2023:3579-1 as SUSE-SLE-SAP-12-SP5-2023-3579 is not security or has no CVEs. patches: SUSE-2023-3579,SUSE-SLE-SAP-12-SP5-2023-3579 SKIP SUSE-RU-2023:3581-1 as openSUSE-SLE-15.5-2023-3581 is not security or has no CVEs. patches: SUSE-2023-3581,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3581,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3581,openSUSE-SLE-15.4-2023-3581,openSUSE-SLE-15.5-2023-3581 SKIP SUSE-RU-2023:3590-1 as SUSE-SLE-Module-Certifications-15-SP3-2023-3590 is not security or has no CVEs. patches: SUSE-2023-3590,SUSE-SLE-Module-Certifications-15-SP3-2023-3590 SKIP SUSE-RU-2023:3593-1 as SUSE-2023-3593 is not security or has no CVEs. patches: SUSE-2023-3593,SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2023-3593 SKIP SUSE-RU-2023:3611-1 as openSUSE-SLE-15.5-2023-3611 is not security or has no CVEs. patches: SUSE-2023-3611,SUSE-SLE-Micro-5.3-2023-3611,SUSE-SLE-Micro-5.4-2023-3611,SUSE-SLE-Module-Basesystem-15-SP4-2023-3611,SUSE-SLE-Module-Basesystem-15-SP5-2023-3611,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3611,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3611,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3611,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3611,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3611,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3611,SUSE-SLE-Product-WE-15-SP4-2023-3611,SUSE-SLE-Product-WE-15-SP5-2023-3611,openSUSE-SLE-15.4-2023-3611,openSUSE-SLE-15.5-2023-3611 SKIP SUSE-RU-2023:3636-1 as SUSE-SLE-Module-Public-Cloud-12-2023-3636 is not security or has no CVEs. patches: SUSE-2023-3636,SUSE-SLE-Module-Public-Cloud-12-2023-3636 SKIP SUSE-RU-2023:3637-1 as openSUSE-SLE-15.5-2023-3637 is not security or has no CVEs. patches: SUSE-2023-3637,SUSE-SLE-Micro-5.3-2023-3637,SUSE-SLE-Micro-5.4-2023-3637,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3637,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-3637,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-3637,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-3637,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3637,openSUSE-SLE-15.4-2023-3637,openSUSE-SLE-15.5-2023-3637 SKIP SUSE-RU-2023:3637-2 as SUSE-SLE-Micro-5.5-2023-3637 is not security or has no CVEs. patches: SUSE-2023-3637,SUSE-SLE-Micro-5.5-2023-3637 SKIP SUSE-RU-2023:3641-1 as openSUSE-SLE-15.5-2023-3641 is not security or has no CVEs. patches: SUSE-2023-3641,SUSE-SLE-Module-Basesystem-15-SP4-2023-3641,SUSE-SLE-Module-Basesystem-15-SP5-2023-3641,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3641,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3641,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3641,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3641,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3641,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3641,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3641,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3641,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3641,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3641,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3641,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3641,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3641,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3641,SUSE-Storage-7-2023-3641,SUSE-Storage-7.1-2023-3641,openSUSE-SLE-15.4-2023-3641,openSUSE-SLE-15.5-2023-3641 SKIP SUSE-RU-2023:3649-1 as openSUSE-SLE-15.5-2023-3649 is not security or has no CVEs. patches: SUSE-2023-3649,SUSE-SLE-Module-Basesystem-15-SP4-2023-3649,SUSE-SLE-Module-Basesystem-15-SP5-2023-3649,openSUSE-SLE-15.4-2023-3649,openSUSE-SLE-15.5-2023-3649 SKIP SUSE-RU-2023:3654-1 as openSUSE-SLE-15.5-2023-3654 is not security or has no CVEs. patches: SUSE-2023-3654,SUSE-SLE-Module-Containers-15-SP5-2023-3654,openSUSE-SLE-15.5-2023-3654 SKIP SUSE-RU-2023:3654-2 as SUSE-SLE-Micro-5.5-2023-3654 is not security or has no CVEs. patches: SUSE-2023-3654,SUSE-SLE-Micro-5.5-2023-3654 SKIP SUSE-RU-2023:3655-1 as openSUSE-SLE-15.5-2023-3655 is not security or has no CVEs. patches: SUSE-2023-3655,SUSE-SLE-Module-Containers-15-SP5-2023-3655,openSUSE-SLE-15.5-2023-3655 SKIP SUSE-RU-2023:3655-2 as SUSE-SLE-Micro-5.5-2023-3655 is not security or has no CVEs. patches: SUSE-2023-3655,SUSE-SLE-Micro-5.5-2023-3655 SKIP SUSE-RU-2023:3663-1 as openSUSE-SLE-15.5-2023-3663 is not security or has no CVEs. patches: SUSE-2023-3663,SUSE-SLE-Micro-5.3-2023-3663,SUSE-SLE-Micro-5.4-2023-3663,SUSE-SLE-Module-Basesystem-15-SP4-2023-3663,SUSE-SLE-Module-Basesystem-15-SP5-2023-3663,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3663,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3663,openSUSE-SLE-15.4-2023-3663,openSUSE-SLE-15.5-2023-3663 SKIP SUSE-RU-2023:3663-2 as SUSE-SLE-Micro-5.5-2023-3663 is not security or has no CVEs. patches: SUSE-2023-3663,SUSE-SLE-Micro-5.5-2023-3663 SKIP SUSE-RU-2023:3685-1 as openSUSE-SLE-15.5-2023-3685 is not security or has no CVEs. patches: SUSE-2023-3685,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3685,openSUSE-SLE-15.5-2023-3685 SKIP SUSE-RU-2023:3693-1 as openSUSE-SLE-15.4-2023-3693 is not security or has no CVEs. patches: SUSE-2023-3693,SUSE-SLE-Product-HA-15-SP4-2023-3693,openSUSE-SLE-15.4-2023-3693 SKIP SUSE-RU-2023:3694-1 as openSUSE-SLE-15.5-2023-3694 is not security or has no CVEs. patches: SUSE-2023-3694,SUSE-SLE-Product-HA-15-SP5-2023-3694,openSUSE-SLE-15.5-2023-3694 SKIP SUSE-RU-2023:3697-1 as SUSE-SLE-SERVER-12-SP5-2023-3697 is not security or has no CVEs. patches: SUSE-2023-3697,SUSE-SLE-SDK-12-SP5-2023-3697,SUSE-SLE-SERVER-12-SP5-2023-3697 SKIP SUSE-RU-2023:3716-1 as openSUSE-SLE-15.5-2023-3716 is not security or has no CVEs. patches: SUSE-2023-3716,SUSE-SLE-Module-Basesystem-15-SP5-2023-3716,openSUSE-SLE-15.5-2023-3716 SKIP SUSE-RU-2023:3716-2 as SUSE-SLE-Micro-5.5-2023-3716 is not security or has no CVEs. patches: SUSE-2023-3716,SUSE-SLE-Micro-5.5-2023-3716 SKIP SUSE-RU-2023:3717-1 as openSUSE-SLE-15.5-2023-3717 is not security or has no CVEs. patches: SUSE-2023-3717,SUSE-SLE-Module-Basesystem-15-SP5-2023-3717,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3717,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3717,openSUSE-SLE-15.5-2023-3717 SKIP SUSE-RU-2023:3718-1 as SUSE-Storage-7.1-2023-3718 is not security or has no CVEs. patches: SUSE-2023-3718,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3718,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3718,SUSE-SLE-Product-SLES-15-SP3-ERICSSON-2023-3718,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3718,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3718,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3718,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3718,SUSE-Storage-7.1-2023-3718 SKIP SUSE-RU-2023:3719-1 as openSUSE-SLE-15.5-2023-3719 is not security or has no CVEs. patches: SUSE-2023-3719,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3719,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3719,openSUSE-SLE-15.4-2023-3719,openSUSE-SLE-15.5-2023-3719 SKIP SUSE-RU-2023:3720-1 as SUSE-Storage-7.1-2023-3720 is not security or has no CVEs. patches: SUSE-2023-3720,SUSE-Storage-7.1-2023-3720 SKIP SUSE-RU-2023:3723-1 as openSUSE-SLE-15.5-2023-3723 is not security or has no CVEs. patches: SUSE-2023-3723,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3723,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3723,SUSE-SLE-Product-HA-15-SP1-2023-3723,SUSE-SLE-Product-HA-15-SP2-2023-3723,SUSE-SLE-Product-HA-15-SP3-2023-3723,SUSE-SLE-Product-HA-15-SP4-2023-3723,SUSE-SLE-Product-HA-15-SP5-2023-3723,openSUSE-SLE-15.4-2023-3723,openSUSE-SLE-15.5-2023-3723 SKIP SUSE-RU-2023:3724-1 as SUSE-SLE-SERVER-12-SP5-2023-3724 is not security or has no CVEs. patches: SUSE-2023-3724,SUSE-SLE-SERVER-12-SP5-2023-3724 SKIP SUSE-RU-2023:3725-1 as openSUSE-SLE-15.5-2023-3725 is not security or has no CVEs. patches: SUSE-2023-3725,SUSE-SLE-Product-HA-15-SP5-2023-3725,openSUSE-SLE-15.5-2023-3725 SKIP SUSE-RU-2023:3733-1 as SUSE-SUSE-MicroOS-5.2-2023-3733 is not security or has no CVEs. patches: SUSE-2023-3733,SUSE-SUSE-MicroOS-5.2-2023-3733 SKIP SUSE-RU-2023:3736-1 as openSUSE-SLE-15.4-2023-3736 is not security or has no CVEs. patches: SUSE-2023-3736,SUSE-SLE-Micro-5.3-2023-3736,SUSE-SLE-Micro-5.4-2023-3736,SUSE-SLE-Module-Basesystem-15-SP4-2023-3736,openSUSE-SLE-15.4-2023-3736 SKIP SUSE-RU-2023:3751-1 as SUSE-SLE-SAP-12-SP5-2023-3751 is not security or has no CVEs. patches: SUSE-2023-3751,SUSE-SLE-SAP-12-SP5-2023-3751 SKIP SUSE-RU-2023:3752-1 as SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3752 is not security or has no CVEs. patches: SUSE-2023-3752,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-3752 SKIP SUSE-RU-2023:3758-1 as openSUSE-SLE-15.4-2023-3758 is not security or has no CVEs. patches: SUSE-2023-3758,SUSE-SLE-Module-HPC-15-SP4-2023-3758,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3758,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3758,openSUSE-SLE-15.4-2023-3758 SKIP SUSE-RU-2023:3759-1 as openSUSE-SLE-15.5-2023-3759 is not security or has no CVEs. patches: SUSE-2023-3759,SUSE-SLE-Module-HPC-15-SP5-2023-3759,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3759,openSUSE-SLE-15.5-2023-3759 SKIP SUSE-RU-2023:3760-1 as SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3760 is not security or has no CVEs. patches: SUSE-2023-3760,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3760 SKIP SUSE-RU-2023:3761-1 as SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3761 is not security or has no CVEs. patches: SUSE-2023-3761,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3761 SKIP SUSE-RU-2023:3780-1 as openSUSE-SLE-15.5-2023-3780 is not security or has no CVEs. patches: SUSE-2023-3780,SUSE-SLE-Micro-5.3-2023-3780,SUSE-SLE-Micro-5.4-2023-3780,SUSE-SLE-Module-Basesystem-15-SP4-2023-3780,SUSE-SLE-Module-Basesystem-15-SP5-2023-3780,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3780,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3780,openSUSE-SLE-15.4-2023-3780,openSUSE-SLE-15.5-2023-3780 SKIP SUSE-RU-2023:3780-2 as SUSE-SLE-Micro-5.5-2023-3780 is not security or has no CVEs. patches: SUSE-2023-3780,SUSE-SLE-Micro-5.5-2023-3780 SKIP SUSE-RU-2023:3789-1 as SUSE-SUSE-MicroOS-5.2-2023-3789 is not security or has no CVEs. patches: SUSE-2023-3789,SUSE-SUSE-MicroOS-5.2-2023-3789 SKIP SUSE-RU-2023:3797-1 as openSUSE-SLE-15.5-2023-3797 is not security or has no CVEs. patches: SUSE-2023-3797,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-3797,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-3797,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-3797,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-3797,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3797,openSUSE-SLE-15.4-2023-3797,openSUSE-SLE-15.5-2023-3797 SKIP SUSE-RU-2023:3798-1 as openSUSE-SLE-15.5-2023-3798 is not security or has no CVEs. patches: SUSE-2023-3798,SUSE-SLE-Module-Basesystem-15-SP5-2023-3798,openSUSE-SLE-15.5-2023-3798 SKIP SUSE-RU-2023:3798-2 as SUSE-SLE-Micro-5.5-2023-3798 is not security or has no CVEs. patches: SUSE-2023-3798,SUSE-SLE-Micro-5.5-2023-3798 SKIP SUSE-RU-2023:3808-1 as SUSE-Storage-7-2023-3808 is not security or has no CVEs. patches: SUSE-2023-3808,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3808,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3808,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3808,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3808,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3808,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3808,SUSE-Storage-7-2023-3808 SKIP SUSE-RU-2023:3814-1 as openSUSE-SLE-15.5-2023-3814 is not security or has no CVEs. patches: SUSE-2023-3814,SUSE-SLE-Micro-5.3-2023-3814,SUSE-SLE-Micro-5.4-2023-3814,SUSE-SLE-Module-Basesystem-15-SP4-2023-3814,SUSE-SLE-Module-Basesystem-15-SP5-2023-3814,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3814,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3814,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3814,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3814,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3814,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3814,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3814,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3814,SUSE-SUSE-MicroOS-5.1-2023-3814,SUSE-SUSE-MicroOS-5.2-2023-3814,SUSE-Storage-7.1-2023-3814,openSUSE-SLE-15.4-2023-3814,openSUSE-SLE-15.5-2023-3814 SKIP SUSE-RU-2023:3843-1 as openSUSE-SLE-15.5-2023-3843 is not security or has no CVEs. patches: SUSE-2023-3843,SUSE-SLE-Micro-5.3-2023-3843,SUSE-SLE-Micro-5.4-2023-3843,SUSE-SLE-Module-Basesystem-15-SP4-2023-3843,SUSE-SLE-Module-Basesystem-15-SP5-2023-3843,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3843,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3843,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3843,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3843,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3843,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3843,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3843,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3843,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3843,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3843,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3843,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3843,SUSE-SUSE-MicroOS-5.1-2023-3843,SUSE-SUSE-MicroOS-5.2-2023-3843,SUSE-Storage-7.1-2023-3843,openSUSE-SLE-15.4-2023-3843,openSUSE-SLE-15.5-2023-3843 SKIP SUSE-RU-2023:3843-2 as SUSE-SLE-Micro-5.5-2023-3843 is not security or has no CVEs. patches: SUSE-2023-3843,SUSE-SLE-Micro-5.5-2023-3843 ERROR: notice SUSE-RU-2023:3845-1 has no valid patches out of: SUSE-2023-3845,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3845,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-3845 ERROR: notice SUSE-RU-2023:3845-2 has no valid patches out of: SUSE-2023-3845,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-3845,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-3845 SKIP SUSE-RU-2023:3850-1 as openSUSE-SLE-15.5-2023-3850 is not security or has no CVEs. patches: SUSE-2023-3850,SUSE-SLE-Micro-5.3-2023-3850,SUSE-SLE-Micro-5.4-2023-3850,SUSE-SLE-Module-Basesystem-15-SP4-2023-3850,SUSE-SLE-Module-Basesystem-15-SP5-2023-3850,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3850,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3850,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3850,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3850,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3850,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3850,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3850,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3850,SUSE-SLE-Product-WE-15-SP4-2023-3850,SUSE-SLE-Product-WE-15-SP5-2023-3850,SUSE-SUSE-MicroOS-5.2-2023-3850,openSUSE-SLE-15.4-2023-3850,openSUSE-SLE-15.5-2023-3850 SKIP SUSE-RU-2023:3850-2 as SUSE-SLE-Micro-5.5-2023-3850 is not security or has no CVEs. patches: SUSE-2023-3850,SUSE-SLE-Micro-5.5-2023-3850 SKIP SUSE-RU-2023:3851-1 as openSUSE-SLE-15.5-2023-3851 is not security or has no CVEs. patches: SUSE-2023-3851,SUSE-SLE-Module-Basesystem-15-SP5-2023-3851,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-3851,openSUSE-SLE-15.5-2023-3851 SKIP SUSE-RU-2023:3852-1 as openSUSE-SLE-15.4-2023-3852 is not security or has no CVEs. patches: SUSE-2023-3852,SUSE-SLE-Module-Basesystem-15-SP4-2023-3852,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3852,openSUSE-SLE-15.4-2023-3852 SKIP SUSE-RU-2023:3853-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3853 is not security or has no CVEs. patches: SUSE-2023-3853,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3853,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3853 SKIP SUSE-RU-2023:3854-1 as SUSE-SLE-SERVER-12-SP5-2023-3854 is not security or has no CVEs. patches: SUSE-2023-3854,SUSE-SLE-SERVER-12-SP5-2023-3854 SKIP SUSE-RU-2023:3855-1 as openSUSE-SLE-15.4-2023-3855 is not security or has no CVEs. patches: SUSE-2023-3855,SUSE-SLE-Micro-5.3-2023-3855,SUSE-SLE-Micro-5.4-2023-3855,SUSE-SLE-Module-Basesystem-15-SP4-2023-3855,openSUSE-SLE-15.4-2023-3855 SKIP SUSE-RU-2023:3856-1 as openSUSE-SLE-15.4-2023-3856 is not security or has no CVEs. patches: SUSE-2023-3856,SUSE-SLE-Micro-5.3-2023-3856,SUSE-SLE-Micro-5.4-2023-3856,SUSE-SLE-Module-Basesystem-15-SP4-2023-3856,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3856,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3856,openSUSE-SLE-15.4-2023-3856 ERROR: notice SUSE-RU-2023:3872-1 has no valid patches out of: SUSE-2023-3872,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-3872 SKIP SUSE-RU-2023:3900-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-3900 is not security or has no CVEs. patches: SUSE-2023-3900,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-3900 SKIP SUSE-RU-2023:3901-1 as SUSE-SLE-Module-SAP-Business-One-15-SP4-2023-3901 is not security or has no CVEs. patches: SUSE-2023-3901,SUSE-SLE-Module-SAP-Business-One-15-SP4-2023-3901 SKIP SUSE-RU-2023:3936-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3936 is not security or has no CVEs. patches: SUSE-2023-3936,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3936,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3936 SKIP SUSE-RU-2023:3937-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3937 is not security or has no CVEs. patches: SUSE-2023-3937,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3937,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3937,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3937 SKIP SUSE-RU-2023:3951-1 as openSUSE-SLE-15.5-2023-3951 is not security or has no CVEs. patches: SUSE-2023-3951,SUSE-SLE-Micro-5.3-2023-3951,SUSE-SLE-Micro-5.4-2023-3951,SUSE-SLE-Micro-5.5-2023-3951,SUSE-SLE-Module-Basesystem-15-SP4-2023-3951,SUSE-SLE-Module-Basesystem-15-SP5-2023-3951,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3951,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3951,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3951,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3951,SUSE-SUSE-MicroOS-5.1-2023-3951,SUSE-SUSE-MicroOS-5.2-2023-3951,openSUSE-SLE-15.4-2023-3951,openSUSE-SLE-15.5-2023-3951 SKIP SUSE-RU-2023:3959-1 as openSUSE-SLE-15.5-2023-3959 is not security or has no CVEs. patches: SUSE-2023-3959,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3959,openSUSE-SLE-15.5-2023-3959 SKIP SUSE-RU-2023:3970-1 as openSUSE-SLE-15.5-2023-3970 is not security or has no CVEs. patches: SUSE-2023-3970,SUSE-SLE-Micro-5.5-2023-3970,SUSE-SLE-Module-Basesystem-15-SP5-2023-3970,openSUSE-SLE-15.5-2023-3970 SKIP SUSE-RU-2023:3973-1 as openSUSE-SLE-15.5-2023-3973 is not security or has no CVEs. patches: SUSE-2023-3973,SUSE-SLE-Micro-5.3-2023-3973,SUSE-SLE-Micro-5.4-2023-3973,SUSE-SLE-Module-Basesystem-15-SP4-2023-3973,SUSE-SLE-Module-Basesystem-15-SP5-2023-3973,openSUSE-SLE-15.4-2023-3973,openSUSE-SLE-15.5-2023-3973 SKIP SUSE-RU-2023:3974-1 as SUSE-SLE-SERVER-12-SP5-2023-3974 is not security or has no CVEs. patches: SUSE-2023-3974,SUSE-SLE-HA-12-SP5-2023-3974,SUSE-SLE-SDK-12-SP5-2023-3974,SUSE-SLE-SERVER-12-SP5-2023-3974 SKIP SUSE-RU-2023:3976-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3976 is not security or has no CVEs. patches: SUSE-2023-3976,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3976,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3976 SKIP SUSE-RU-2023:3977-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-3977 is not security or has no CVEs. patches: SUSE-2023-3977,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-3977,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-3977 SKIP SUSE-RU-2023:3978-1 as openSUSE-SLE-15.5-2023-3978 is not security or has no CVEs. patches: SUSE-2023-3978,SUSE-SLE-Module-Basesystem-15-SP5-2023-3978,openSUSE-SLE-15.5-2023-3978 SKIP SUSE-RU-2023:3978-2 as SUSE-SLE-Micro-5.5-2023-3978 is not security or has no CVEs. patches: SUSE-2023-3978,SUSE-SLE-Micro-5.5-2023-3978 SKIP SUSE-RU-2023:3979-1 as openSUSE-SLE-15.5-2023-3979 is not security or has no CVEs. patches: SUSE-2023-3979,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3979,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3979,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3979,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3979,SUSE-SLE-Product-SLES-15-SP4-ERICSSON-2023-3979,SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2023-3979,openSUSE-SLE-15.4-2023-3979,openSUSE-SLE-15.5-2023-3979 SKIP SUSE-RU-2023:3980-1 as openSUSE-SLE-15.5-2023-3980 is not security or has no CVEs. patches: SUSE-2023-3980,SUSE-SLE-Module-Basesystem-15-SP5-2023-3980,SUSE-SLE-Module-Legacy-15-SP5-2023-3980,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3980,openSUSE-SLE-15.5-2023-3980 SKIP SUSE-RU-2023:3985-1 as openSUSE-SLE-15.5-2023-3985 is not security or has no CVEs. patches: SUSE-2023-3985,SUSE-SLE-Module-Basesystem-15-SP5-2023-3985,openSUSE-SLE-15.5-2023-3985 SKIP SUSE-RU-2023:3986-1 as openSUSE-SLE-15.4-2023-3986 is not security or has no CVEs. patches: SUSE-2023-3986,SUSE-SLE-Micro-5.3-2023-3986,SUSE-SLE-Micro-5.4-2023-3986,SUSE-SLE-Module-Basesystem-15-SP4-2023-3986,openSUSE-SLE-15.4-2023-3986 SKIP SUSE-RU-2023:3990-1 as openSUSE-SLE-15.5-2023-3990 is not security or has no CVEs. patches: SUSE-2023-3990,SUSE-SLE-Module-HPC-15-SP4-2023-3990,SUSE-SLE-Module-HPC-15-SP5-2023-3990,openSUSE-SLE-15.4-2023-3990,openSUSE-SLE-15.5-2023-3990 SKIP SUSE-RU-2023:3991-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3991 is not security or has no CVEs. patches: SUSE-2023-3991,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3991,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3991 SKIP SUSE-RU-2023:3993-1 as openSUSE-SLE-15.5-2023-3993 is not security or has no CVEs. patches: SUSE-2023-3993,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3993,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3993,openSUSE-SLE-15.4-2023-3993,openSUSE-SLE-15.5-2023-3993 SKIP SUSE-RU-2023:3994-1 as openSUSE-SLE-15.5-2023-3994 is not security or has no CVEs. patches: SUSE-2023-3994,SUSE-SLE-Micro-5.5-2023-3994,SUSE-SLE-Module-Basesystem-15-SP4-2023-3994,SUSE-SLE-Module-Basesystem-15-SP5-2023-3994,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3994,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3994,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3994,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3994,openSUSE-SLE-15.4-2023-3994,openSUSE-SLE-15.5-2023-3994 SKIP SUSE-RU-2023:3995-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3995 is not security or has no CVEs. patches: SUSE-2023-3995,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3995 SKIP SUSE-RU-2023:3996-1 as SUSE-SLE-SERVER-12-SP5-2023-3996 is not security or has no CVEs. patches: HPE-Helion-OpenStack-8-2023-3996,SUSE-2023-3996,SUSE-OpenStack-Cloud-8-2023-3996,SUSE-SLE-SDK-12-SP5-2023-3996,SUSE-SLE-SERVER-12-SP5-2023-3996 SKIP SUSE-RU-2023:3999-1 as openSUSE-SLE-15.5-2023-3999 is not security or has no CVEs. patches: SUSE-2023-3999,SUSE-SLE-Module-Development-Tools-15-SP4-2023-3999,SUSE-SLE-Module-Development-Tools-15-SP5-2023-3999,openSUSE-SLE-15.4-2023-3999,openSUSE-SLE-15.5-2023-3999 SKIP SUSE-RU-2023:4002-1 as SUSE-SLE-Micro-5.4-2023-4002 is not security or has no CVEs. patches: SUSE-2023-4002,SUSE-SLE-Micro-5.4-2023-4002 SKIP SUSE-RU-2023:4003-1 as openSUSE-SLE-15.5-2023-4003 is not security or has no CVEs. patches: SUSE-2023-4003,SUSE-SLE-Micro-5.5-2023-4003,SUSE-SLE-Module-Basesystem-15-SP5-2023-4003,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4003,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4003,openSUSE-SLE-15.5-2023-4003 SKIP SUSE-RU-2023:4004-1 as openSUSE-SLE-15.5-2023-4004 is not security or has no CVEs. patches: SUSE-2023-4004,openSUSE-SLE-15.4-2023-4004,openSUSE-SLE-15.5-2023-4004 SKIP SUSE-RU-2023:4005-1 as openSUSE-SLE-15.5-2023-4005 is not security or has no CVEs. patches: SUSE-2023-4005,openSUSE-SLE-15.4-2023-4005,openSUSE-SLE-15.5-2023-4005 SKIP SUSE-RU-2023:4006-1 as SUSE-Storage-7.1-2023-4006 is not security or has no CVEs. patches: SUSE-2023-4006,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4006,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4006,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4006,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4006,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4006,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4006,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4006,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4006,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4006,SUSE-SUSE-MicroOS-5.1-2023-4006,SUSE-SUSE-MicroOS-5.2-2023-4006,SUSE-Storage-7-2023-4006,SUSE-Storage-7.1-2023-4006 SKIP SUSE-RU-2023:4010-1 as openSUSE-SLE-15.5-2023-4010 is not security or has no CVEs. patches: SUSE-2023-4010,SUSE-SLE-Module-Basesystem-15-SP4-2023-4010,SUSE-SLE-Module-Basesystem-15-SP5-2023-4010,openSUSE-SLE-15.4-2023-4010,openSUSE-SLE-15.5-2023-4010 SKIP SUSE-RU-2023:4013-1 as openSUSE-SLE-15.5-2023-4013 is not security or has no CVEs. patches: SUSE-2023-4013,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-4013,openSUSE-SLE-15.5-2023-4013 SKIP SUSE-RU-2023:4014-1 as openSUSE-SLE-15.5-2023-4014 is not security or has no CVEs. patches: SUSE-2023-4014,SUSE-SLE-Module-HPC-15-SP1-2023-4014,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4014,openSUSE-SLE-15.4-2023-4014,openSUSE-SLE-15.5-2023-4014 SKIP SUSE-RU-2023:4015-1 as openSUSE-SLE-15.5-2023-4015 is not security or has no CVEs. patches: SUSE-2023-4015,SUSE-SLE-Module-HPC-15-SP2-2023-4015,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4015,openSUSE-SLE-15.4-2023-4015,openSUSE-SLE-15.5-2023-4015 SKIP SUSE-RU-2023:4020-1 as openSUSE-SLE-15.5-2023-4020 is not security or has no CVEs. patches: SUSE-2023-4020,SUSE-SLE-Module-Basesystem-15-SP5-2023-4020,openSUSE-SLE-15.5-2023-4020 SKIP SUSE-RU-2023:4034-1 as SUSE-SLE-Micro-5.3-2023-4034 is not security or has no CVEs. patches: SUSE-2023-4034,SUSE-SLE-Micro-5.3-2023-4034 SKIP SUSE-RU-2023:4037-1 as SUSE-SLE-Module-Public-Cloud-12-2023-4037 is not security or has no CVEs. patches: SUSE-2023-4037,SUSE-SLE-Module-Public-Cloud-12-2023-4037 SKIP SUSE-RU-2023:4052-1 as openSUSE-SLE-15.5-2023-4052 is not security or has no CVEs. patches: SUSE-2023-4052,SUSE-SLE-Module-Basesystem-15-SP4-2023-4052,SUSE-SLE-Module-Basesystem-15-SP5-2023-4052,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4052,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4052,openSUSE-SLE-15.4-2023-4052,openSUSE-SLE-15.5-2023-4052 SKIP SUSE-RU-2023:4052-2 as SUSE-SLE-Micro-5.5-2023-4052 is not security or has no CVEs. patches: SUSE-2023-4052,SUSE-SLE-Micro-5.5-2023-4052 SKIP SUSE-RU-2023:4067-1 as openSUSE-SLE-15.5-2023-4067 is not security or has no CVEs. patches: SUSE-2023-4067,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4067,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4067,openSUSE-SLE-15.4-2023-4067,openSUSE-SLE-15.5-2023-4067 SKIP SUSE-RU-2023:4073-1 as openSUSE-SLE-15.5-2023-4073 is not security or has no CVEs. patches: SUSE-2023-4073,SUSE-SLE-Micro-5.4-2023-4073,SUSE-SLE-Module-Basesystem-15-SP4-2023-4073,SUSE-SLE-Module-Basesystem-15-SP5-2023-4073,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4073,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4073,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4073,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4073,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-4073,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4073,openSUSE-SLE-15.4-2023-4073,openSUSE-SLE-15.5-2023-4073 SKIP SUSE-RU-2023:4073-2 as SUSE-SLE-Module-Python3-15-SP5-2023-4073 is not security or has no CVEs. patches: SUSE-2023-4073,SUSE-SLE-Module-Python3-15-SP4-2023-4073,SUSE-SLE-Module-Python3-15-SP5-2023-4073 SKIP SUSE-RU-2023:4073-3 as openSUSE-SLE-15.5-2023-4073 is not security or has no CVEs. patches: SUSE-2023-4073,openSUSE-SLE-15.4-2023-4073,openSUSE-SLE-15.5-2023-4073 SKIP SUSE-RU-2023:4074-1 as SUSE-SLE-SERVER-12-SP5-2023-4074 is not security or has no CVEs. patches: SUSE-2023-4074,SUSE-SLE-SERVER-12-SP5-2023-4074 SKIP SUSE-RU-2023:4077-1 as SUSE-SLE-SERVER-12-SP5-2023-4077 is not security or has no CVEs. patches: SUSE-2023-4077,SUSE-SLE-SERVER-12-SP5-2023-4077 SKIP SUSE-RU-2023:4078-1 as SUSE-SLE-Module-Basesystem-15-SP5-2023-4078 is not security or has no CVEs. patches: SUSE-2023-4078,SUSE-SLE-Module-Basesystem-15-SP5-2023-4078 SKIP SUSE-RU-2023:4080-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4080 is not security or has no CVEs. patches: SUSE-2023-4080,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4080 SKIP SUSE-RU-2023:4081-1 as SUSE-SLE-Module-SAP-Business-One-15-SP4-2023-4081 is not security or has no CVEs. patches: SUSE-2023-4081,SUSE-SLE-Module-SAP-Business-One-15-SP4-2023-4081 SKIP SUSE-RU-2023:4082-1 as SUSE-SLE-Module-SAP-Business-One-15-SP4-2023-4082 is not security or has no CVEs. patches: SUSE-2023-4082,SUSE-SLE-Module-SAP-Business-One-15-SP4-2023-4082 SKIP SUSE-RU-2023:4086-1 as SUSE-SLE-Module-Python3-15-SP4-2023-4086 is not security or has no CVEs. patches: SUSE-2023-4086,SUSE-SLE-Module-Python3-15-SP4-2023-4086 SKIP SUSE-RU-2023:4087-1 as SUSE-SLE-Module-Basesystem-15-SP4-2023-4087 is not security or has no CVEs. patches: SUSE-2023-4087,SUSE-SLE-Micro-5.3-2023-4087,SUSE-SLE-Micro-5.4-2023-4087,SUSE-SLE-Module-Basesystem-15-SP4-2023-4087 SKIP SUSE-RU-2023:4088-1 as SUSE-SLE-Module-Server-Applications-15-SP5-2023-4088 is not security or has no CVEs. patches: SUSE-2023-4088,SUSE-SLE-Micro-5.5-2023-4088,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4088 SKIP SUSE-RU-2023:4094-1 as SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4094 is not security or has no CVEs. patches: SUSE-2023-4094,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4094 SKIP SUSE-RU-2023:4100-1 as SUSE-Storage-7.1-2023-4100 is not security or has no CVEs. patches: SUSE-2023-4100,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4100,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4100,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4100,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4100,SUSE-Storage-7.1-2023-4100 SKIP SUSE-RU-2023:4105-1 as SUSE-SLE-Module-Basesystem-15-SP5-2023-4105 is not security or has no CVEs. patches: SUSE-2023-4105,SUSE-SLE-Micro-5.5-2023-4105,SUSE-SLE-Module-Basesystem-15-SP5-2023-4105 SKIP SUSE-RU-2023:4106-1 as SUSE-Storage-7.1-2023-4106 is not security or has no CVEs. patches: SUSE-2023-4106,SUSE-SLE-INSTALLER-15-SP1-2023-4106,SUSE-SLE-INSTALLER-15-SP2-2023-4106,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4106,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4106,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4106,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4106,SUSE-SLE-Product-RT-15-SP3-2023-4106,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4106,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4106,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4106,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4106,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4106,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4106,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4106,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4106,SUSE-Storage-7.1-2023-4106 SKIP SUSE-RU-2023:4107-1 as SUSE-SLE-SERVER-12-SP5-2023-4107 is not security or has no CVEs. patches: SUSE-2023-4107,SUSE-SLE-Manager-Tools-12-2023-4107,SUSE-SLE-Module-Containers-12-2023-4107,SUSE-SLE-SERVER-12-SP5-2023-4107 SKIP SUSE-RU-2023:4111-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4111 is not security or has no CVEs. patches: SUSE-2023-4111,SUSE-SLE-Module-Basesystem-15-SP4-2023-4111,SUSE-SLE-Module-Basesystem-15-SP5-2023-4111,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4111,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4111,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4111,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4111,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4111,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4111 SKIP SUSE-RU-2023:4112-1 as SUSE-Storage-7.1-2023-4112 is not security or has no CVEs. patches: SUSE-2023-4112,SUSE-SLE-Micro-5.3-2023-4112,SUSE-SLE-Micro-5.4-2023-4112,SUSE-SLE-Micro-5.5-2023-4112,SUSE-SLE-Module-Basesystem-15-SP4-2023-4112,SUSE-SLE-Module-Basesystem-15-SP5-2023-4112,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4112,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4112,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4112,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4112,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4112,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4112,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4112,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4112,SUSE-SUSE-MicroOS-5.1-2023-4112,SUSE-SUSE-MicroOS-5.2-2023-4112,SUSE-Storage-7.1-2023-4112 SKIP SUSE-RU-2023:4122-1 as SUSE-SLE-Module-Basesystem-15-SP4-2023-4122 is not security or has no CVEs. patches: SUSE-2023-4122,SUSE-SLE-Micro-5.3-2023-4122,SUSE-SLE-Micro-5.4-2023-4122,SUSE-SLE-Module-Basesystem-15-SP4-2023-4122 SKIP SUSE-RU-2023:4123-1 as SUSE-SLE-Product-WE-15-SP5-2023-4123 is not security or has no CVEs. patches: SUSE-2023-4123,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4123,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4123,SUSE-SLE-Product-WE-15-SP4-2023-4123,SUSE-SLE-Product-WE-15-SP5-2023-4123 SKIP SUSE-RU-2023:4128-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128 is not security or has no CVEs. patches: SUSE-2023-4128,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4128,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4128,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128 SKIP SUSE-RU-2023:4134-1 as SUSE-SLE-Micro-5.4-2023-4134 is not security or has no CVEs. patches: SUSE-2023-4134,SUSE-SLE-Micro-5.4-2023-4134 SKIP SUSE-RU-2023:4138-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4138 is not security or has no CVEs. patches: SUSE-2023-4138,SUSE-SLE-Micro-5.3-2023-4138,SUSE-SLE-Micro-5.4-2023-4138,SUSE-SLE-Micro-5.5-2023-4138,SUSE-SLE-Module-Basesystem-15-SP4-2023-4138,SUSE-SLE-Module-Basesystem-15-SP5-2023-4138,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4138,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4138 SKIP SUSE-RU-2023:4139-1 as SUSE-Storage-7.1-2023-4139 is not security or has no CVEs. patches: SUSE-2023-4139,SUSE-SLE-Micro-5.3-2023-4139,SUSE-SLE-Micro-5.4-2023-4139,SUSE-SLE-Micro-5.5-2023-4139,SUSE-SLE-Module-Containers-15-SP4-2023-4139,SUSE-SLE-Module-Containers-15-SP5-2023-4139,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4139,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4139,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4139,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4139,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4139,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4139,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4139,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4139,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4139,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4139,SUSE-SUSE-MicroOS-5.1-2023-4139,SUSE-SUSE-MicroOS-5.2-2023-4139,SUSE-Storage-7.1-2023-4139 SKIP SUSE-RU-2023:4143-1 as SUSE-SLE-Product-WE-15-SP5-2023-4143 is not security or has no CVEs. patches: SUSE-2023-4143,SUSE-SLE-Micro-5.3-2023-4143,SUSE-SLE-Micro-5.4-2023-4143,SUSE-SLE-Micro-5.5-2023-4143,SUSE-SLE-Module-Basesystem-15-SP4-2023-4143,SUSE-SLE-Module-Basesystem-15-SP5-2023-4143,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4143,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4143,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4143,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4143,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4143,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4143,SUSE-SLE-Product-WE-15-SP4-2023-4143,SUSE-SLE-Product-WE-15-SP5-2023-4143 SKIP SUSE-RU-2023:4144-1 as SUSE-SLE-WE-12-SP5-2023-4144 is not security or has no CVEs. patches: SUSE-2023-4144,SUSE-SLE-SDK-12-SP5-2023-4144,SUSE-SLE-SERVER-12-SP5-2023-4144,SUSE-SLE-WE-12-SP5-2023-4144 SKIP SUSE-RU-2023:4147-1 as SUSE-SLE-Product-WE-15-SP5-2023-4147 is not security or has no CVEs. patches: SUSE-2023-4147,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4147,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4147,SUSE-SLE-Product-WE-15-SP4-2023-4147,SUSE-SLE-Product-WE-15-SP5-2023-4147 SKIP SUSE-RU-2023:4148-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4148 is not security or has no CVEs. patches: SUSE-2023-4148,SUSE-SLE-Module-Basesystem-15-SP4-2023-4148,SUSE-SLE-Module-Basesystem-15-SP5-2023-4148,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4148,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4148 SKIP SUSE-RU-2023:4149-1 as SUSE-SLE-SERVER-12-SP5-2023-4149 is not security or has no CVEs. patches: SUSE-2023-4149,SUSE-SLE-SERVER-12-SP5-2023-4149 SKIP SUSE-RU-2023:4153-1 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4153 is not security or has no CVEs. patches: SUSE-2023-4153,SUSE-SLE-Micro-5.3-2023-4153,SUSE-SLE-Micro-5.4-2023-4153,SUSE-SLE-Micro-5.5-2023-4153,SUSE-SLE-Module-Basesystem-15-SP4-2023-4153,SUSE-SLE-Module-Basesystem-15-SP5-2023-4153,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4153,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4153 SKIP SUSE-RU-2023:4154-1 as SUSE-Storage-7.1-2023-4154 is not security or has no CVEs. patches: SUSE-2023-4154,SUSE-SLE-Micro-5.3-2023-4154,SUSE-SLE-Micro-5.4-2023-4154,SUSE-SLE-Micro-5.5-2023-4154,SUSE-SLE-Module-Basesystem-15-SP4-2023-4154,SUSE-SLE-Module-Basesystem-15-SP5-2023-4154,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4154,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4154,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4154,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4154,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4154,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4154,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4154,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4154,SUSE-SUSE-MicroOS-5.2-2023-4154,SUSE-Storage-7.1-2023-4154 SKIP SUSE-RU-2023:4177-1 as openSUSE-SLE-15.5-2023-4177 is not security or has no CVEs. patches: SUSE-2023-4177,SUSE-SLE-Micro-5.5-2023-4177,SUSE-SLE-Module-Basesystem-15-SP5-2023-4177,openSUSE-SLE-15.5-2023-4177 SKIP SUSE-RU-2023:4178-1 as openSUSE-SLE-15.4-2023-4178 is not security or has no CVEs. patches: SUSE-2023-4178,SUSE-SLE-Micro-5.3-2023-4178,SUSE-SLE-Micro-5.4-2023-4178,SUSE-SLE-Module-Basesystem-15-SP4-2023-4178,openSUSE-Leap-Micro-5.3-2023-4178,openSUSE-Leap-Micro-5.4-2023-4178,openSUSE-SLE-15.4-2023-4178 SKIP SUSE-RU-2023:4179-1 as SUSE-Storage-7.1-2023-4179 is not security or has no CVEs. patches: SUSE-2023-4179,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4179,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4179,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4179,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4179,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4179,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4179,SUSE-SUSE-MicroOS-5.1-2023-4179,SUSE-SUSE-MicroOS-5.2-2023-4179,SUSE-Storage-7.1-2023-4179 SKIP SUSE-RU-2023:4180-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4180 is not security or has no CVEs. patches: SUSE-2023-4180,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4180,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4180,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4180 SKIP SUSE-RU-2023:4181-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4181 is not security or has no CVEs. patches: SUSE-2023-4181,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4181,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4181,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4181 SKIP SUSE-RU-2023:4182-1 as SUSE-SLE-SERVER-12-SP5-2023-4182 is not security or has no CVEs. patches: SUSE-2023-4182,SUSE-SLE-SDK-12-SP5-2023-4182,SUSE-SLE-SERVER-12-SP5-2023-4182 SKIP SUSE-RU-2023:4188-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4188 is not security or has no CVEs. patches: SUSE-2023-4188,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4188,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4188 SKIP SUSE-RU-2023:4191-1 as openSUSE-SLE-15.5-2023-4191 is not security or has no CVEs. patches: SUSE-2023-4191,SUSE-SLE-Module-Basesystem-15-SP5-2023-4191,openSUSE-SLE-15.5-2023-4191 SKIP SUSE-RU-2023:4193-1 as openSUSE-SLE-15.5-2023-4193 is not security or has no CVEs. patches: SUSE-2023-4193,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4193,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4193,openSUSE-SLE-15.4-2023-4193,openSUSE-SLE-15.5-2023-4193 SKIP SUSE-RU-2023:4195-1 as openSUSE-SLE-15.5-2023-4195 is not security or has no CVEs. patches: SUSE-2023-4195,SUSE-SLE-Module-Basesystem-15-SP4-2023-4195,SUSE-SLE-Module-Basesystem-15-SP5-2023-4195,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4195,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4195,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4195,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4195,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4195,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4195,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4195,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4195,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4195,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4195,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4195,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4195,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4195,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4195,SUSE-Storage-7.1-2023-4195,openSUSE-SLE-15.4-2023-4195,openSUSE-SLE-15.5-2023-4195 SKIP SUSE-RU-2023:4196-1 as SUSE-SLE-SERVER-12-SP5-2023-4196 is not security or has no CVEs. patches: SUSE-2023-4196,SUSE-SLE-SERVER-12-SP5-2023-4196 SKIP SUSE-RU-2023:4197-1 as openSUSE-SLE-15.5-2023-4197 is not security or has no CVEs. patches: SUSE-2023-4197,SUSE-SLE-Module-Basesystem-15-SP4-2023-4197,SUSE-SLE-Module-Basesystem-15-SP5-2023-4197,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4197,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4197,SUSE-SLE-Product-WE-15-SP4-2023-4197,SUSE-SLE-Product-WE-15-SP5-2023-4197,openSUSE-SLE-15.4-2023-4197,openSUSE-SLE-15.5-2023-4197 SKIP SUSE-RU-2023:4205-1 as SUSE-SLE-SERVER-12-SP5-2023-4205 is not security or has no CVEs. patches: SUSE-2023-4205,SUSE-SLE-SERVER-12-SP5-2023-4205 SKIP SUSE-RU-2023:4206-1 as SUSE-SLE-SERVER-12-SP5-2023-4206 is not security or has no CVEs. patches: SUSE-2023-4206,SUSE-SLE-SDK-12-SP5-2023-4206,SUSE-SLE-SERVER-12-SP5-2023-4206 SKIP SUSE-RU-2023:4223-1 as openSUSE-SLE-15.5-2023-4223 is not security or has no CVEs. patches: SUSE-2023-4223,SUSE-SLE-INSTALLER-15-SP5-2023-4223,SUSE-SLE-Product-SLES-15-SP5-2023-4223,openSUSE-SLE-15.5-2023-4223 SKIP SUSE-RU-2023:4226-1 as SUSE-Storage-7.1-2023-4226 is not security or has no CVEs. patches: SUSE-2023-4226,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4226,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4226,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4226,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4226,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4226,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4226,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4226,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4226,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4226,SUSE-SUSE-MicroOS-5.1-2023-4226,SUSE-SUSE-MicroOS-5.2-2023-4226,SUSE-Storage-7.1-2023-4226 SKIP SUSE-RU-2023:4231-1 as openSUSE-SLE-15.5-2023-4231 is not security or has no CVEs. patches: SUSE-2023-4231,SUSE-SLE-Micro-5.3-2023-4231,SUSE-SLE-Micro-5.4-2023-4231,SUSE-SLE-Micro-5.5-2023-4231,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4231,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4231,SUSE-SUSE-MicroOS-5.1-2023-4231,SUSE-SUSE-MicroOS-5.2-2023-4231,openSUSE-Leap-Micro-5.3-2023-4231,openSUSE-Leap-Micro-5.4-2023-4231,openSUSE-SLE-15.4-2023-4231,openSUSE-SLE-15.5-2023-4231 SKIP SUSE-RU-2023:4233-1 as openSUSE-SLE-15.5-2023-4233 is not security or has no CVEs. patches: SUSE-2023-4233,SUSE-SLE-Module-Basesystem-15-SP4-2023-4233,SUSE-SLE-Module-Basesystem-15-SP5-2023-4233,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4233,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4233,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4233,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4233,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4233,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4233,SUSE-Storage-7.1-2023-4233,openSUSE-SLE-15.4-2023-4233,openSUSE-SLE-15.5-2023-4233 SKIP SUSE-RU-2023:4235-1 as openSUSE-SLE-15.5-2023-4235 is not security or has no CVEs. patches: SUSE-2023-4235,SUSE-SLE-Module-HPC-15-SP4-2023-4235,SUSE-SLE-Module-HPC-15-SP5-2023-4235,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4235,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4235,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4235,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4235,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4235,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4235,openSUSE-SLE-15.4-2023-4235,openSUSE-SLE-15.5-2023-4235 SKIP SUSE-RU-2023:4236-1 as SUSE-SLE-Module-HPC-12-2023-4236 is not security or has no CVEs. patches: SUSE-2023-4236,SUSE-SLE-Module-HPC-12-2023-4236 SKIP SUSE-RU-2023:4237-1 as SUSE-Storage-7.1-2023-4237 is not security or has no CVEs. patches: SUSE-2023-4237,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4237,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4237,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4237,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4237,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4237,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4237,SUSE-SUSE-MicroOS-5.1-2023-4237,SUSE-SUSE-MicroOS-5.2-2023-4237,SUSE-Storage-7.1-2023-4237 SKIP SUSE-RU-2023:4268-1 as openSUSE-SLE-15.5-2023-4268 is not security or has no CVEs. patches: SUSE-2023-4268,SUSE-SLE-Micro-5.3-2023-4268,SUSE-SLE-Micro-5.4-2023-4268,SUSE-SLE-Micro-5.5-2023-4268,SUSE-SLE-Module-Basesystem-15-SP4-2023-4268,SUSE-SLE-Module-Basesystem-15-SP5-2023-4268,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4268,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4268,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4268,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4268,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4268,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4268,SUSE-SUSE-MicroOS-5.1-2023-4268,SUSE-SUSE-MicroOS-5.2-2023-4268,SUSE-Storage-7.1-2023-4268,openSUSE-Leap-Micro-5.3-2023-4268,openSUSE-Leap-Micro-5.4-2023-4268,openSUSE-SLE-15.4-2023-4268,openSUSE-SLE-15.5-2023-4268 SKIP SUSE-RU-2023:4286-1 as openSUSE-SLE-15.5-2023-4286 is not security or has no CVEs. patches: SUSE-2023-4286,openSUSE-SLE-15.4-2023-4286,openSUSE-SLE-15.5-2023-4286 SKIP SUSE-RU-2023:4303-1 as SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-4303 is not security or has no CVEs. patches: SUSE-2023-4303,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-4303 SKIP SUSE-RU-2023:4304-1 as openSUSE-SLE-15.5-2023-4304 is not security or has no CVEs. patches: SUSE-2023-4304,SUSE-SLE-Micro-5.3-2023-4304,SUSE-SLE-Micro-5.4-2023-4304,SUSE-SLE-Micro-5.5-2023-4304,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4304,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-4304,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4304,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4304,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4304,openSUSE-Leap-Micro-5.3-2023-4304,openSUSE-Leap-Micro-5.4-2023-4304,openSUSE-SLE-15.4-2023-4304,openSUSE-SLE-15.5-2023-4304 SKIP SUSE-RU-2023:4310-1 as openSUSE-SLE-15.5-2023-4310 is not security or has no CVEs. patches: SUSE-2023-4310,SUSE-SLE-Micro-5.3-2023-4310,SUSE-SLE-Micro-5.4-2023-4310,SUSE-SLE-Micro-5.5-2023-4310,SUSE-SLE-Module-Basesystem-15-SP4-2023-4310,SUSE-SLE-Module-Basesystem-15-SP5-2023-4310,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4310,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4310,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4310,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4310,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4310,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4310,SUSE-SUSE-MicroOS-5.1-2023-4310,SUSE-SUSE-MicroOS-5.2-2023-4310,SUSE-Storage-7.1-2023-4310,openSUSE-Leap-Micro-5.3-2023-4310,openSUSE-Leap-Micro-5.4-2023-4310,openSUSE-SLE-15.4-2023-4310,openSUSE-SLE-15.5-2023-4310 SKIP SUSE-RU-2023:4340-1 as openSUSE-SLE-15.5-2023-4340 is not security or has no CVEs. patches: SUSE-2023-4340,SUSE-SLE-Module-Containers-15-SP4-2023-4340,SUSE-SLE-Module-Containers-15-SP5-2023-4340,openSUSE-SLE-15.4-2023-4340,openSUSE-SLE-15.5-2023-4340 SKIP SUSE-RU-2023:4341-1 as openSUSE-SLE-15.5-2023-4341 is not security or has no CVEs. patches: SUSE-2023-4341,SUSE-SLE-Module-Containers-15-SP4-2023-4341,SUSE-SLE-Module-Containers-15-SP5-2023-4341,openSUSE-SLE-15.4-2023-4341,openSUSE-SLE-15.5-2023-4341 SKIP SUSE-RU-2023:4342-1 as openSUSE-SLE-15.4-2023-4342 is not security or has no CVEs. patches: SUSE-2023-4342,SUSE-SLE-Micro-5.3-2023-4342,SUSE-SLE-Micro-5.4-2023-4342,SUSE-SLE-Module-Basesystem-15-SP4-2023-4342,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4342,openSUSE-SLE-15.4-2023-4342 SKIP SUSE-RU-2023:4344-1 as openSUSE-SLE-15.5-2023-4344 is not security or has no CVEs. patches: SUSE-2023-4344,SUSE-SLE-Module-Web-Scripting-15-SP5-2023-4344,openSUSE-SLE-15.5-2023-4344 SKIP SUSE-RU-2023:4365-1 as openSUSE-SLE-15.5-2023-4365 is not security or has no CVEs. patches: SUSE-2023-4365,SUSE-SLE-Module-Containers-15-SP4-2023-4365,SUSE-SLE-Module-Containers-15-SP5-2023-4365,openSUSE-SLE-15.4-2023-4365,openSUSE-SLE-15.5-2023-4365 SKIP SUSE-RU-2023:4366-1 as openSUSE-SLE-15.5-2023-4366 is not security or has no CVEs. patches: SUSE-2023-4366,SUSE-SLE-Module-Containers-15-SP4-2023-4366,SUSE-SLE-Module-Containers-15-SP5-2023-4366,openSUSE-SLE-15.4-2023-4366,openSUSE-SLE-15.5-2023-4366 SKIP SUSE-RU-2023:4382-1 as openSUSE-SLE-15.5-2023-4382 is not security or has no CVEs. patches: SUSE-2023-4382,SUSE-SLE-INSTALLER-15-SP5-2023-4382,SUSE-SLE-Product-SLES-15-SP5-2023-4382,openSUSE-SLE-15.5-2023-4382 SKIP SUSE-RU-2023:4383-1 as openSUSE-SLE-15.4-2023-4383 is not security or has no CVEs. patches: SUSE-2023-4383,SUSE-SLE-Product-HA-15-SP4-2023-4383,openSUSE-SLE-15.4-2023-4383 SKIP SUSE-RU-2023:4385-1 as openSUSE-SLE-15.5-2023-4385 is not security or has no CVEs. patches: SUSE-2023-4385,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4385,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4385,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-4385,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4385,openSUSE-SLE-15.4-2023-4385,openSUSE-SLE-15.5-2023-4385 SKIP SUSE-RU-2023:4391-1 as SUSE-SLE-Manager-Tools-12-2023-4391 is not security or has no CVEs. patches: SUSE-2023-4391,SUSE-SLE-Manager-Tools-12-2023-4391 SKIP SUSE-RU-2023:4392-1 as openSUSE-SLE-15.5-2023-4392 is not security or has no CVEs. patches: SUSE-2023-4392,SUSE-SLE-Manager-Tools-15-2023-4392,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4392,openSUSE-SLE-15.4-2023-4392,openSUSE-SLE-15.5-2023-4392 SKIP SUSE-RU-2023:4393-1 as openSUSE-SLE-15.5-2023-4393 is not security or has no CVEs. patches: SUSE-2023-4393,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4393,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4393,openSUSE-SLE-15.4-2023-4393,openSUSE-SLE-15.5-2023-4393 ERROR: notice SUSE-RU-2023:4396-1 has no valid patches out of: SUSE-2023-4396,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-4396 ERROR: notice SUSE-RU-2023:4397-1 has no valid patches out of: SUSE-2023-4397,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-4397 ERROR: notice SUSE-RU-2023:4398-1 has no valid patches out of: SUSE-2023-4398,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2023-4398 SKIP SUSE-RU-2023:4401-1 as SUSE-EL-9-CLIENT-TOOLS-2023-4401 is not security or has no CVEs. patches: SUSE-2023-4401,SUSE-EL-9-CLIENT-TOOLS-2023-4401 SKIP SUSE-RU-2023:4402-1 as SUSE-SLE-Manager-Tools-12-2023-4402 is not security or has no CVEs. patches: SUSE-2023-4402,SUSE-SLE-Manager-Tools-12-2023-4402 SKIP SUSE-RU-2023:4403-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4403 is not security or has no CVEs. patches: SUSE-2023-4403,SUSE-SLE-Manager-Tools-15-2023-4403,SUSE-SLE-Manager-Tools-For-Micro-5-2023-4403,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-4403,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4403 ERROR: notice SUSE-RU-2023:4406-1 has no valid patches out of: SUSE-2023-4406,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2023-4406 ERROR: notice SUSE-RU-2023:4407-1 has no valid patches out of: SUSE-2023-4407,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-4407 ERROR: notice SUSE-RU-2023:4408-1 has no valid patches out of: SUSE-2023-4408,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2023-4408 SKIP SUSE-RU-2023:4411-1 as SUSE-EL-9-CLIENT-TOOLS-2023-4411 is not security or has no CVEs. patches: SUSE-2023-4411,SUSE-EL-9-CLIENT-TOOLS-2023-4411 SKIP SUSE-RU-2023:4428-1 as openSUSE-SLE-15.5-2023-4428 is not security or has no CVEs. patches: SUSE-2023-4428,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4428,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4428,openSUSE-SLE-15.4-2023-4428,openSUSE-SLE-15.5-2023-4428 SKIP SUSE-RU-2023:4435-1 as openSUSE-SLE-15.5-2023-4435 is not security or has no CVEs. patches: SUSE-2023-4435,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4435,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4435,openSUSE-SLE-15.4-2023-4435,openSUSE-SLE-15.5-2023-4435 SKIP SUSE-RU-2023:4444-1 as openSUSE-Leap-Micro-5.3-2023-4444 is not security or has no CVEs. patches: SUSE-2023-4444,SUSE-SLE-Micro-5.3-2023-4444,openSUSE-Leap-Micro-5.3-2023-4444 SKIP SUSE-RU-2023:4445-1 as openSUSE-Leap-Micro-5.4-2023-4445 is not security or has no CVEs. patches: SUSE-2023-4445,SUSE-SLE-Micro-5.4-2023-4445,openSUSE-Leap-Micro-5.4-2023-4445 SKIP SUSE-RU-2023:4446-1 as openSUSE-SLE-15.5-2023-4446 is not security or has no CVEs. patches: SUSE-2023-4446,SUSE-SLE-Micro-5.3-2023-4446,SUSE-SLE-Micro-5.4-2023-4446,SUSE-SLE-Micro-5.5-2023-4446,SUSE-SLE-Module-Basesystem-15-SP4-2023-4446,SUSE-SLE-Module-Basesystem-15-SP5-2023-4446,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4446,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4446,SUSE-SUSE-MicroOS-5.1-2023-4446,SUSE-SUSE-MicroOS-5.2-2023-4446,openSUSE-Leap-Micro-5.3-2023-4446,openSUSE-Leap-Micro-5.4-2023-4446,openSUSE-SLE-15.4-2023-4446,openSUSE-SLE-15.5-2023-4446 SKIP SUSE-RU-2023:4447-1 as SUSE-SLE-SERVER-12-SP5-2023-4447 is not security or has no CVEs. patches: SUSE-2023-4447,SUSE-SLE-SERVER-12-SP5-2023-4447 SKIP SUSE-RU-2023:4448-1 as openSUSE-SLE-15.5-2023-4448 is not security or has no CVEs. patches: SUSE-2023-4448,SUSE-SLE-Module-Web-Scripting-15-SP4-2023-4448,SUSE-SLE-Module-Web-Scripting-15-SP5-2023-4448,openSUSE-SLE-15.4-2023-4448,openSUSE-SLE-15.5-2023-4448 SKIP SUSE-RU-2023:4450-1 as openSUSE-SLE-15.5-2023-4450 is not security or has no CVEs. patches: SUSE-2023-4450,SUSE-SLE-Micro-5.3-2023-4450,SUSE-SLE-Micro-5.4-2023-4450,SUSE-SLE-Micro-5.5-2023-4450,SUSE-SLE-Module-Basesystem-15-SP4-2023-4450,SUSE-SLE-Module-Basesystem-15-SP5-2023-4450,openSUSE-Leap-Micro-5.3-2023-4450,openSUSE-Leap-Micro-5.4-2023-4450,openSUSE-SLE-15.4-2023-4450,openSUSE-SLE-15.5-2023-4450 SKIP SUSE-RU-2023:4452-1 as SUSE-SLE-SERVER-12-SP5-2023-4452 is not security or has no CVEs. patches: SUSE-2023-4452,SUSE-SLE-SERVER-12-SP5-2023-4452 SKIP SUSE-RU-2023:4453-1 as openSUSE-SLE-15.5-2023-4453 is not security or has no CVEs. patches: SUSE-2023-4453,SUSE-SLE-Micro-5.3-2023-4453,SUSE-SLE-Micro-5.4-2023-4453,SUSE-SLE-Micro-5.5-2023-4453,SUSE-SLE-Module-Basesystem-15-SP4-2023-4453,SUSE-SLE-Module-Basesystem-15-SP5-2023-4453,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4453,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4453,SUSE-SUSE-MicroOS-5.1-2023-4453,SUSE-SUSE-MicroOS-5.2-2023-4453,openSUSE-Leap-Micro-5.3-2023-4453,openSUSE-Leap-Micro-5.4-2023-4453,openSUSE-SLE-15.4-2023-4453,openSUSE-SLE-15.5-2023-4453 SKIP SUSE-RU-2023:4456-1 as SUSE-SLE-Micro-5.5-2023-4456 is not security or has no CVEs. patches: SUSE-2023-4456,SUSE-SLE-Micro-5.5-2023-4456 SKIP SUSE-RU-2023:4457-1 as openSUSE-SLE-15.5-2023-4457 is not security or has no CVEs. patches: SUSE-2023-4457,SUSE-SLE-Micro-5.5-2023-4457,SUSE-SLE-Module-Basesystem-15-SP5-2023-4457,openSUSE-SLE-15.5-2023-4457 SKIP SUSE-RU-2023:4459-1 as openSUSE-SLE-15.5-2023-4459 is not security or has no CVEs. patches: SUSE-2023-4459,SUSE-SLE-Product-HA-15-SP5-2023-4459,openSUSE-SLE-15.5-2023-4459 SKIP SUSE-RU-2023:4460-1 as openSUSE-SLE-15.5-2023-4460 is not security or has no CVEs. patches: SUSE-2023-4460,SUSE-SLE-Module-Basesystem-15-SP4-2023-4460,SUSE-SLE-Module-Basesystem-15-SP5-2023-4460,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4460,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4460,openSUSE-SLE-15.4-2023-4460,openSUSE-SLE-15.5-2023-4460 SKIP SUSE-RU-2023:4461-1 as SUSE-Storage-7.1-2023-4461 is not security or has no CVEs. patches: SUSE-2023-4461,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4461,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4461,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4461,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4461,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4461,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4461,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4461,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4461,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4461,SUSE-Storage-7.1-2023-4461 SKIP SUSE-RU-2023:4462-1 as openSUSE-SLE-15.5-2023-4462 is not security or has no CVEs. patches: SUSE-2023-4462,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4462,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4462,openSUSE-SLE-15.4-2023-4462,openSUSE-SLE-15.5-2023-4462 SKIP SUSE-RU-2023:4474-1 as openSUSE-SLE-15.5-2023-4474 is not security or has no CVEs. patches: SUSE-2023-4474,SUSE-SLE-Module-Basesystem-15-SP4-2023-4474,SUSE-SLE-Module-Basesystem-15-SP5-2023-4474,SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4474,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4474,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4474,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4474,openSUSE-SLE-15.4-2023-4474,openSUSE-SLE-15.5-2023-4474 SKIP SUSE-RU-2023:4477-1 as openSUSE-SLE-15.4-2023-4477 is not security or has no CVEs. patches: SUSE-2023-4477,SUSE-SLE-Micro-5.3-2023-4477,SUSE-SLE-Micro-5.4-2023-4477,SUSE-SLE-Module-Basesystem-15-SP4-2023-4477,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-4477,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4477,openSUSE-Leap-Micro-5.3-2023-4477,openSUSE-Leap-Micro-5.4-2023-4477,openSUSE-SLE-15.4-2023-4477 SKIP SUSE-RU-2023:4478-1 as openSUSE-SLE-15.5-2023-4478 is not security or has no CVEs. patches: SUSE-2023-4478,SUSE-SLE-Micro-5.5-2023-4478,SUSE-SLE-Module-Basesystem-15-SP5-2023-4478,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4478,openSUSE-SLE-15.5-2023-4478 SKIP SUSE-RU-2023:4481-1 as openSUSE-SLE-15.5-2023-4481 is not security or has no CVEs. patches: SUSE-2023-4481,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4481,openSUSE-SLE-15.5-2023-4481 SKIP SUSE-RU-2023:4494-1 as openSUSE-SLE-15.5-2023-4494 is not security or has no CVEs. patches: SUSE-2023-4494,SUSE-SLE-Module-Basesystem-15-SP4-2023-4494,SUSE-SLE-Module-Basesystem-15-SP5-2023-4494,openSUSE-SLE-15.4-2023-4494,openSUSE-SLE-15.5-2023-4494 SKIP SUSE-RU-2023:4497-1 as openSUSE-SLE-15.5-2023-4497 is not security or has no CVEs. patches: SUSE-2023-4497,SUSE-SLE-Module-Containers-15-SP5-2023-4497,openSUSE-SLE-15.5-2023-4497 SKIP SUSE-RU-2023:4498-1 as openSUSE-SLE-15.4-2023-4498 is not security or has no CVEs. patches: SUSE-2023-4498,SUSE-SLE-Module-Containers-15-SP4-2023-4498,openSUSE-SLE-15.4-2023-4498 SKIP SUSE-RU-2023:4501-1 as openSUSE-SLE-15.4-2023-4501 is not security or has no CVEs. patches: SUSE-2023-4501,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4501,openSUSE-SLE-15.4-2023-4501 SKIP SUSE-RU-2023:4509-1 as openSUSE-SLE-15.5-2023-4509 is not security or has no CVEs. patches: SUSE-2023-4509,SUSE-SLE-Module-Containers-15-SP4-2023-4509,SUSE-SLE-Module-Containers-15-SP5-2023-4509,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4509,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4509,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4509,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4509,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4509,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4509,SUSE-Storage-7.1-2023-4509,openSUSE-SLE-15.4-2023-4509,openSUSE-SLE-15.5-2023-4509 SKIP SUSE-RU-2023:4525-1 as openSUSE-SLE-15.5-2023-4525 is not security or has no CVEs. patches: SUSE-2023-4525,SUSE-SLE-Micro-5.5-2023-4525,SUSE-SLE-Module-Basesystem-15-SP5-2023-4525,SUSE-SLE-Product-HA-15-SP5-2023-4525,openSUSE-SLE-15.5-2023-4525 SKIP SUSE-RU-2023:4526-1 as SUSE-SLE-HA-12-SP5-2023-4526 is not security or has no CVEs. patches: SUSE-2023-4526,SUSE-SLE-HA-12-SP5-2023-4526 SKIP SUSE-RU-2023:4531-1 as openSUSE-SLE-15.5-2023-4531 is not security or has no CVEs. patches: SUSE-2023-4531,SUSE-SLE-Module-Basesystem-15-SP4-2023-4531,SUSE-SLE-Module-Basesystem-15-SP5-2023-4531,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4531,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4531,openSUSE-SLE-15.4-2023-4531,openSUSE-SLE-15.5-2023-4531 SKIP SUSE-RU-2023:4534-1 as openSUSE-SLE-15.5-2023-4534 is not security or has no CVEs. patches: SUSE-2023-4534,SUSE-SLE-INSTALLER-15-SP4-2023-4534,SUSE-SLE-INSTALLER-15-SP5-2023-4534,SUSE-SLE-Micro-5.3-2023-4534,SUSE-SLE-Micro-5.4-2023-4534,SUSE-SLE-Micro-5.5-2023-4534,SUSE-SLE-Module-Basesystem-15-SP4-2023-4534,SUSE-SLE-Module-Basesystem-15-SP5-2023-4534,openSUSE-Leap-Micro-5.3-2023-4534,openSUSE-Leap-Micro-5.4-2023-4534,openSUSE-SLE-15.4-2023-4534,openSUSE-SLE-15.5-2023-4534 SKIP SUSE-RU-2023:4535-1 as SUSE-Storage-7.1-2023-4535 is not security or has no CVEs. patches: SUSE-2023-4535,SUSE-SLE-INSTALLER-15-SP2-2023-4535,SUSE-SLE-INSTALLER-15-SP3-2023-4535,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4535,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4535,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4535,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4535,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4535,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4535,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4535,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4535,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4535,SUSE-SUSE-MicroOS-5.1-2023-4535,SUSE-SUSE-MicroOS-5.2-2023-4535,SUSE-Storage-7.1-2023-4535 SKIP SUSE-RU-2023:4536-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4536 is not security or has no CVEs. patches: SUSE-2023-4536,SUSE-SLE-INSTALLER-15-SP1-2023-4536,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4536,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4536,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4536 SKIP SUSE-RU-2023:4538-1 as openSUSE-SLE-15.5-2023-4538 is not security or has no CVEs. patches: SUSE-2023-4538,SUSE-SLE-Micro-5.3-2023-4538,SUSE-SLE-Micro-5.4-2023-4538,SUSE-SLE-Micro-5.5-2023-4538,SUSE-SLE-Module-Basesystem-15-SP4-2023-4538,SUSE-SLE-Module-Basesystem-15-SP5-2023-4538,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4538,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4538,openSUSE-Leap-Micro-5.3-2023-4538,openSUSE-Leap-Micro-5.4-2023-4538,openSUSE-SLE-15.4-2023-4538,openSUSE-SLE-15.5-2023-4538 SKIP SUSE-RU-2023:4539-1 as openSUSE-SLE-15.5-2023-4539 is not security or has no CVEs. patches: SUSE-2023-4539,SUSE-SLE-Module-Basesystem-15-SP4-2023-4539,SUSE-SLE-Module-Basesystem-15-SP5-2023-4539,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4539,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4539,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4539,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4539,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4539,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4539,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4539,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4539,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4539,SUSE-Storage-7.1-2023-4539,openSUSE-SLE-15.4-2023-4539,openSUSE-SLE-15.5-2023-4539 SKIP SUSE-RU-2023:4540-1 as openSUSE-SLE-15.5-2023-4540 is not security or has no CVEs. patches: SUSE-2023-4540,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-4540,SUSE-SLE-Module-SAP-Business-One-15-SP5-2023-4540,openSUSE-SLE-15.5-2023-4540 SKIP SUSE-RU-2023:4541-1 as SUSE-SLE-SERVER-12-SP5-2023-4541 is not security or has no CVEs. patches: SUSE-2023-4541,SUSE-SLE-SERVER-12-SP5-2023-4541 SKIP SUSE-RU-2023:4542-1 as openSUSE-SLE-15.5-2023-4542 is not security or has no CVEs. patches: SUSE-2023-4542,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4542,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4542,openSUSE-SLE-15.4-2023-4542,openSUSE-SLE-15.5-2023-4542 SKIP SUSE-RU-2023:4552-1 as openSUSE-SLE-15.5-2023-4552 is not security or has no CVEs. patches: SUSE-2023-4552,SUSE-SLE-Module-Basesystem-15-SP4-2023-4552,SUSE-SLE-Module-Basesystem-15-SP5-2023-4552,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4552,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4552,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4552,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4552,openSUSE-SLE-15.4-2023-4552,openSUSE-SLE-15.5-2023-4552 SKIP SUSE-RU-2023:4553-1 as SUSE-SLE-SERVER-12-SP5-2023-4553 is not security or has no CVEs. patches: SUSE-2023-4553,SUSE-SLE-SERVER-12-SP5-2023-4553 SKIP SUSE-RU-2023:4554-1 as SUSE-SLE-SERVER-12-SP5-2023-4554 is not security or has no CVEs. patches: SUSE-2023-4554,SUSE-SLE-SDK-12-SP5-2023-4554,SUSE-SLE-SERVER-12-SP5-2023-4554 SKIP SUSE-RU-2023:4555-1 as openSUSE-SLE-15.4-2023-4555 is not security or has no CVEs. patches: SUSE-2023-4555,SUSE-SLE-Module-Basesystem-15-SP4-2023-4555,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4555,openSUSE-SLE-15.4-2023-4555 SKIP SUSE-RU-2023:4556-1 as openSUSE-SLE-15.5-2023-4556 is not security or has no CVEs. patches: SUSE-2023-4556,SUSE-SLE-Module-Basesystem-15-SP5-2023-4556,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4556,openSUSE-SLE-15.5-2023-4556 SKIP SUSE-RU-2023:4568-1 as openSUSE-SLE-15.5-2023-4568 is not security or has no CVEs. patches: SUSE-2023-4568,SUSE-SLE-Module-HPC-15-SP4-2023-4568,SUSE-SLE-Module-HPC-15-SP5-2023-4568,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4568,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4568,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4568,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4568,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4568,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4568,openSUSE-SLE-15.4-2023-4568,openSUSE-SLE-15.5-2023-4568 SKIP SUSE-RU-2023:4569-1 as openSUSE-SLE-15.5-2023-4569 is not security or has no CVEs. patches: SUSE-2023-4569,SUSE-SLE-Module-HPC-15-SP4-2023-4569,SUSE-SLE-Module-HPC-15-SP5-2023-4569,openSUSE-SLE-15.4-2023-4569,openSUSE-SLE-15.5-2023-4569 SKIP SUSE-RU-2023:4570-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4570 is not security or has no CVEs. patches: SUSE-2023-4570,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4570,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4570 SKIP SUSE-RU-2023:4584-1 as SUSE-SUSE-MicroOS-5.1-2023-4584 is not security or has no CVEs. patches: SUSE-2023-4584,SUSE-SUSE-MicroOS-5.1-2023-4584 SKIP SUSE-RU-2023:4585-1 as SUSE-Storage-7.1-2023-4585 is not security or has no CVEs. patches: SUSE-2023-4585,SUSE-SLE-Module-Basesystem-15-SP4-2023-4585,SUSE-SLE-Module-Basesystem-15-SP5-2023-4585,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4585,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4585,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4585,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4585,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4585,SUSE-Storage-7.1-2023-4585 SKIP SUSE-RU-2023:4592-1 as openSUSE-SLE-15.5-2023-4592 is not security or has no CVEs. patches: SUSE-2023-4592,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4592,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4592,openSUSE-SLE-15.4-2023-4592,openSUSE-SLE-15.5-2023-4592 SKIP SUSE-RU-2023:4599-1 as SUSE-SLE-SERVER-12-SP5-2023-4599 is not security or has no CVEs. patches: SUSE-2023-4599,SUSE-SLE-SERVER-12-SP5-2023-4599 SKIP SUSE-RU-2023:4600-1 as openSUSE-SLE-15.5-2023-4600 is not security or has no CVEs. patches: SUSE-2023-4600,SUSE-SLE-Module-Basesystem-15-SP4-2023-4600,SUSE-SLE-Module-Basesystem-15-SP5-2023-4600,openSUSE-SLE-15.4-2023-4600,openSUSE-SLE-15.5-2023-4600 SKIP SUSE-RU-2023:4601-1 as SUSE-SLE-Module-Basesystem-15-SP5-2023-4601 is not security or has no CVEs. patches: SUSE-2023-4601,SUSE-SLE-Micro-5.5-2023-4601,SUSE-SLE-Module-Basesystem-15-SP5-2023-4601 SKIP SUSE-RU-2023:4602-1 as openSUSE-Leap-Micro-5.4-2023-4602 is not security or has no CVEs. patches: SUSE-2023-4602,SUSE-SLE-Micro-5.3-2023-4602,SUSE-SLE-Micro-5.4-2023-4602,SUSE-SLE-Module-Basesystem-15-SP4-2023-4602,openSUSE-Leap-Micro-5.3-2023-4602,openSUSE-Leap-Micro-5.4-2023-4602 SKIP SUSE-RU-2023:4603-1 as SUSE-SLE-Micro-5.5-2023-4603 is not security or has no CVEs. patches: SUSE-2023-4603,SUSE-SLE-Micro-5.5-2023-4603 SKIP SUSE-RU-2023:4604-1 as openSUSE-Leap-Micro-5.4-2023-4604 is not security or has no CVEs. patches: SUSE-2023-4604,SUSE-SLE-Micro-5.4-2023-4604,openSUSE-Leap-Micro-5.4-2023-4604 SKIP SUSE-RU-2023:4605-1 as openSUSE-Leap-Micro-5.3-2023-4605 is not security or has no CVEs. patches: SUSE-2023-4605,SUSE-SLE-Micro-5.3-2023-4605,openSUSE-Leap-Micro-5.3-2023-4605 SKIP SUSE-RU-2023:4606-1 as openSUSE-SLE-15.5-2023-4606 is not security or has no CVEs. patches: SUSE-2023-4606,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4606,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4606,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4606,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4606,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4606,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4606,SUSE-Storage-7.1-2023-4606,openSUSE-SLE-15.4-2023-4606,openSUSE-SLE-15.5-2023-4606 SKIP SUSE-RU-2023:4610-1 as openSUSE-SLE-15.5-2023-4610 is not security or has no CVEs. patches: SUSE-2023-4610,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4610,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4610,openSUSE-SLE-15.4-2023-4610,openSUSE-SLE-15.5-2023-4610 SKIP SUSE-RU-2023:4615-1 as openSUSE-SLE-15.5-2023-4615 is not security or has no CVEs. patches: SUSE-2023-4615,SUSE-SLE-Micro-5.3-2023-4615,SUSE-SLE-Micro-5.4-2023-4615,SUSE-SLE-Module-Basesystem-15-SP4-2023-4615,SUSE-SLE-Module-Basesystem-15-SP5-2023-4615,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4615,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4615,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4615,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4615,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4615,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4615,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4615,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4615,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4615,SUSE-SUSE-MicroOS-5.1-2023-4615,SUSE-SUSE-MicroOS-5.2-2023-4615,SUSE-Storage-7.1-2023-4615,openSUSE-Leap-Micro-5.3-2023-4615,openSUSE-Leap-Micro-5.4-2023-4615,openSUSE-SLE-15.4-2023-4615,openSUSE-SLE-15.5-2023-4615 SKIP SUSE-RU-2023:4617-1 as openSUSE-SLE-15.5-2023-4617 is not security or has no CVEs. patches: SUSE-2023-4617,SUSE-SLE-Module-Basesystem-15-SP4-2023-4617,SUSE-SLE-Module-Basesystem-15-SP5-2023-4617,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4617,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4617,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4617,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4617,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4617,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4617,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4617,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4617,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4617,SUSE-Storage-7.1-2023-4617,openSUSE-SLE-15.4-2023-4617,openSUSE-SLE-15.5-2023-4617 SKIP SUSE-RU-2023:4618-1 as openSUSE-SLE-15.5-2023-4618 is not security or has no CVEs. patches: SUSE-2023-4618,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4618,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4618,openSUSE-SLE-15.4-2023-4618,openSUSE-SLE-15.5-2023-4618 SKIP SUSE-RU-2023:4620-1 as openSUSE-SLE-15.5-2023-4620 is not security or has no CVEs. patches: SUSE-2023-4620,SUSE-SLE-Micro-5.3-2023-4620,SUSE-SLE-Micro-5.4-2023-4620,SUSE-SLE-Micro-5.5-2023-4620,SUSE-SLE-Module-Basesystem-15-SP4-2023-4620,SUSE-SLE-Module-Basesystem-15-SP5-2023-4620,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4620,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4620,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4620,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4620,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4620,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4620,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4620,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4620,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4620,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4620,SUSE-SUSE-MicroOS-5.1-2023-4620,SUSE-SUSE-MicroOS-5.2-2023-4620,SUSE-Storage-7.1-2023-4620,openSUSE-Leap-Micro-5.3-2023-4620,openSUSE-Leap-Micro-5.4-2023-4620,openSUSE-SLE-15.4-2023-4620,openSUSE-SLE-15.5-2023-4620 SKIP SUSE-RU-2023:4621-1 as openSUSE-SLE-15.5-2023-4621 is not security or has no CVEs. patches: SUSE-2023-4621,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4621,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4621,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4621,openSUSE-SLE-15.4-2023-4621,openSUSE-SLE-15.5-2023-4621 SKIP SUSE-RU-2023:4627-1 as openSUSE-SLE-15.5-2023-4627 is not security or has no CVEs. patches: SUSE-2023-4627,SUSE-SLE-Micro-5.3-2023-4627,SUSE-SLE-Micro-5.4-2023-4627,SUSE-SLE-Micro-5.5-2023-4627,SUSE-SLE-Module-Basesystem-15-SP4-2023-4627,SUSE-SLE-Module-Basesystem-15-SP5-2023-4627,openSUSE-SLE-15.4-2023-4627,openSUSE-SLE-15.5-2023-4627 SKIP SUSE-RU-2023:4628-1 as openSUSE-SLE-15.5-2023-4628 is not security or has no CVEs. patches: SUSE-2023-4628,SUSE-SLE-Micro-5.5-2023-4628,SUSE-SLE-Module-Containers-15-SP5-2023-4628,openSUSE-SLE-15.5-2023-4628 SKIP SUSE-RU-2023:4629-1 as openSUSE-SLE-15.5-2023-4629 is not security or has no CVEs. patches: SUSE-2023-4629,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-4629,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-4629,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-4629,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4629,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-4629,openSUSE-SLE-15.5-2023-4629 SKIP SUSE-RU-2023:4633-1 as openSUSE-SLE-15.5-2023-4633 is not security or has no CVEs. patches: SUSE-2023-4633,SUSE-SLE-Manager-Tools-For-Micro-5-2023-4633,SUSE-SLE-Module-Basesystem-15-SP4-2023-4633,SUSE-SLE-Module-Basesystem-15-SP5-2023-4633,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4633,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4633,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4633,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4633,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4633,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4633,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4633,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4633,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4633,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4633,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4633,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4633,SUSE-Storage-7.1-2023-4633,openSUSE-SLE-15.4-2023-4633,openSUSE-SLE-15.5-2023-4633 SKIP SUSE-RU-2023:4636-1 as openSUSE-SLE-15.5-2023-4636 is not security or has no CVEs. patches: SUSE-2023-4636,openSUSE-SLE-15.5-2023-4636 SKIP SUSE-RU-2023:4640-1 as openSUSE-SLE-15.5-2023-4640 is not security or has no CVEs. patches: SUSE-2023-4640,SUSE-SLE-Module-HPC-15-SP5-2023-4640,openSUSE-SLE-15.5-2023-4640 SKIP SUSE-RU-2023:4641-1 as openSUSE-SLE-15.4-2023-4641 is not security or has no CVEs. patches: SUSE-2023-4641,SUSE-SLE-Micro-5.3-2023-4641,SUSE-SLE-Micro-5.4-2023-4641,SUSE-SLE-Module-Basesystem-15-SP4-2023-4641,SUSE-SLE-Module-Basesystem-15-SP5-2023-4641,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4641,openSUSE-SLE-15.4-2023-4641 SKIP SUSE-RU-2023:4642-1 as openSUSE-SLE-15.5-2023-4642 is not security or has no CVEs. patches: SUSE-2023-4642,SUSE-SLE-Micro-5.5-2023-4642,SUSE-SLE-Module-Basesystem-15-SP5-2023-4642,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4642,openSUSE-SLE-15.5-2023-4642 SKIP SUSE-RU-2023:4643-1 as openSUSE-SLE-15.5-2023-4643 is not security or has no CVEs. patches: SUSE-2023-4643,SUSE-SLE-Module-Basesystem-15-SP5-2023-4643,openSUSE-SLE-15.5-2023-4643 SKIP SUSE-RU-2023:4644-1 as openSUSE-SLE-15.5-2023-4644 is not security or has no CVEs. patches: SUSE-2023-4644,SUSE-SLE-Micro-5.3-2023-4644,SUSE-SLE-Micro-5.4-2023-4644,SUSE-SLE-Micro-5.5-2023-4644,SUSE-SLE-Module-Basesystem-15-SP4-2023-4644,SUSE-SLE-Module-Basesystem-15-SP5-2023-4644,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4644,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4644,SUSE-SUSE-MicroOS-5.1-2023-4644,SUSE-SUSE-MicroOS-5.2-2023-4644,openSUSE-Leap-Micro-5.3-2023-4644,openSUSE-Leap-Micro-5.4-2023-4644,openSUSE-SLE-15.4-2023-4644,openSUSE-SLE-15.5-2023-4644 SKIP SUSE-RU-2023:4658-1 as openSUSE-SLE-15.5-2023-4658 is not security or has no CVEs. patches: SUSE-2023-4658,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4658,openSUSE-SLE-15.5-2023-4658 SKIP SUSE-RU-2023:4667-1 as openSUSE-SLE-15.5-2023-4667 is not security or has no CVEs. patches: SUSE-2023-4667,SUSE-SLE-Module-Basesystem-15-SP5-2023-4667,openSUSE-SLE-15.5-2023-4667 SKIP SUSE-RU-2023:4668-1 as openSUSE-SLE-15.5-2023-4668 is not security or has no CVEs. patches: SUSE-2023-4668,SUSE-SLE-Micro-5.3-2023-4668,SUSE-SLE-Micro-5.4-2023-4668,SUSE-SLE-Micro-5.5-2023-4668,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4668,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-4668,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4668,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4668,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4668,openSUSE-Leap-Micro-5.3-2023-4668,openSUSE-Leap-Micro-5.4-2023-4668,openSUSE-SLE-15.4-2023-4668,openSUSE-SLE-15.5-2023-4668 SKIP SUSE-RU-2023:4669-1 as openSUSE-SLE-15.5-2023-4669 is not security or has no CVEs. patches: SUSE-2023-4669,SUSE-SLE-Micro-5.3-2023-4669,SUSE-SLE-Micro-5.4-2023-4669,SUSE-SLE-Micro-5.5-2023-4669,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4669,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-4669,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4669,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4669,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4669,openSUSE-Leap-Micro-5.3-2023-4669,openSUSE-Leap-Micro-5.4-2023-4669,openSUSE-SLE-15.4-2023-4669,openSUSE-SLE-15.5-2023-4669 SKIP SUSE-RU-2023:4670-1 as openSUSE-SLE-15.5-2023-4670 is not security or has no CVEs. patches: SUSE-2023-4670,SUSE-SLE-Micro-5.3-2023-4670,SUSE-SLE-Micro-5.4-2023-4670,SUSE-SLE-Micro-5.5-2023-4670,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4670,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-4670,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4670,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4670,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4670,openSUSE-Leap-Micro-5.3-2023-4670,openSUSE-Leap-Micro-5.4-2023-4670,openSUSE-SLE-15.4-2023-4670,openSUSE-SLE-15.5-2023-4670 SKIP SUSE-RU-2023:4671-1 as openSUSE-SLE-15.5-2023-4671 is not security or has no CVEs. patches: SUSE-2023-4671,SUSE-SLE-Micro-5.3-2023-4671,SUSE-SLE-Micro-5.4-2023-4671,SUSE-SLE-Micro-5.5-2023-4671,SUSE-SLE-Module-Basesystem-15-SP4-2023-4671,SUSE-SLE-Module-Basesystem-15-SP5-2023-4671,SUSE-SLE-Module-Legacy-15-SP4-2023-4671,SUSE-SLE-Module-Legacy-15-SP5-2023-4671,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4671,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4671,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4671,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4671,openSUSE-Leap-Micro-5.3-2023-4671,openSUSE-Leap-Micro-5.4-2023-4671,openSUSE-SLE-15.4-2023-4671,openSUSE-SLE-15.5-2023-4671 SKIP SUSE-RU-2023:4673-1 as openSUSE-SLE-15.5-2023-4673 is not security or has no CVEs. patches: SUSE-2023-4673,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4673,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4673,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4673,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4673,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4673,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4673,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4673,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4673,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4673,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4673,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4673,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4673,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4673,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4673,SUSE-Storage-7.1-2023-4673,openSUSE-SLE-15.4-2023-4673,openSUSE-SLE-15.5-2023-4673 SKIP SUSE-RU-2023:4674-1 as SUSE-SLE-SERVER-12-SP5-2023-4674 is not security or has no CVEs. patches: SUSE-2023-4674,SUSE-SLE-SAP-12-SP5-2023-4674,SUSE-SLE-SERVER-12-SP5-2023-4674 SKIP SUSE-RU-2023:4675-1 as SUSE-SLE-SERVER-12-SP5-2023-4675 is not security or has no CVEs. patches: SUSE-2023-4675,SUSE-SLE-SERVER-12-SP5-2023-4675 SKIP SUSE-RU-2023:4679-1 as openSUSE-Leap-Micro-5.4-2023-4679 is not security or has no CVEs. patches: SUSE-2023-4679,SUSE-SLE-Micro-5.4-2023-4679,openSUSE-Leap-Micro-5.4-2023-4679 SKIP SUSE-RU-2023:4680-1 as SUSE-SLE-Micro-5.5-2023-4680 is not security or has no CVEs. patches: SUSE-2023-4680,SUSE-SLE-Micro-5.5-2023-4680 SKIP SUSE-RU-2023:4681-1 as openSUSE-SLE-15.4-2023-4681 is not security or has no CVEs. patches: SUSE-2023-4681,SUSE-SLE-Micro-5.3-2023-4681,SUSE-SLE-Micro-5.4-2023-4681,SUSE-SLE-Module-Basesystem-15-SP4-2023-4681,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4681,openSUSE-Leap-Micro-5.3-2023-4681,openSUSE-Leap-Micro-5.4-2023-4681,openSUSE-SLE-15.4-2023-4681 SKIP SUSE-RU-2023:4682-1 as openSUSE-SLE-15.5-2023-4682 is not security or has no CVEs. patches: SUSE-2023-4682,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4682,SUSE-SLE-Product-WE-15-SP5-2023-4682,openSUSE-SLE-15.5-2023-4682 SKIP SUSE-RU-2023:4683-1 as openSUSE-SLE-15.5-2023-4683 is not security or has no CVEs. patches: SUSE-2023-4683,SUSE-SLE-Module-Basesystem-15-SP5-2023-4683,openSUSE-SLE-15.5-2023-4683 SKIP SUSE-RU-2023:4684-1 as openSUSE-SLE-15.4-2023-4684 is not security or has no CVEs. patches: SUSE-2023-4684,SUSE-SLE-INSTALLER-15-SP4-2023-4684,SUSE-SLE-Module-Basesystem-15-SP4-2023-4684,openSUSE-SLE-15.4-2023-4684 SKIP SUSE-RU-2023:4685-1 as openSUSE-SLE-15.5-2023-4685 is not security or has no CVEs. patches: SUSE-2023-4685,SUSE-SLE-Module-Basesystem-15-SP5-2023-4685,openSUSE-SLE-15.5-2023-4685 SKIP SUSE-RU-2023:4686-1 as openSUSE-SLE-15.4-2023-4686 is not security or has no CVEs. patches: SUSE-2023-4686,SUSE-SLE-Module-Basesystem-15-SP4-2023-4686,openSUSE-SLE-15.4-2023-4686 SKIP SUSE-RU-2023:4687-1 as openSUSE-SLE-15.4-2023-4687 is not security or has no CVEs. patches: SUSE-2023-4687,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4687,openSUSE-SLE-15.4-2023-4687 SKIP SUSE-RU-2023:4688-1 as openSUSE-SLE-15.5-2023-4688 is not security or has no CVEs. patches: SUSE-2023-4688,SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-4688,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4688,openSUSE-SLE-15.5-2023-4688 SKIP SUSE-RU-2023:4694-1 as openSUSE-SLE-15.5-2023-4694 is not security or has no CVEs. patches: SUSE-2023-4694,SUSE-SLE-Product-HA-15-SP5-2023-4694,openSUSE-SLE-15.5-2023-4694 SKIP SUSE-RU-2023:4695-1 as openSUSE-SLE-15.5-2023-4695 is not security or has no CVEs. patches: SUSE-2023-4695,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4695,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4695,openSUSE-SLE-15.4-2023-4695,openSUSE-SLE-15.5-2023-4695 SKIP SUSE-RU-2023:4696-1 as SUSE-SLE-Module-Python3-15-SP5-2023-4696 is not security or has no CVEs. patches: SUSE-2023-4696,SUSE-SLE-Module-Python3-15-SP4-2023-4696,SUSE-SLE-Module-Python3-15-SP5-2023-4696 SKIP SUSE-RU-2023:4699-1 as openSUSE-SLE-15.5-2023-4699 is not security or has no CVEs. patches: SUSE-2023-4699,SUSE-SLE-Micro-5.3-2023-4699,SUSE-SLE-Micro-5.4-2023-4699,SUSE-SLE-Micro-5.5-2023-4699,SUSE-SLE-Module-Basesystem-15-SP4-2023-4699,SUSE-SLE-Module-Basesystem-15-SP5-2023-4699,SUSE-SUSE-MicroOS-5.1-2023-4699,SUSE-SUSE-MicroOS-5.2-2023-4699,openSUSE-Leap-Micro-5.3-2023-4699,openSUSE-Leap-Micro-5.4-2023-4699,openSUSE-SLE-15.4-2023-4699,openSUSE-SLE-15.5-2023-4699 SKIP SUSE-RU-2023:4700-1 as openSUSE-SLE-15.5-2023-4700 is not security or has no CVEs. patches: SUSE-2023-4700,SUSE-SLE-Micro-5.5-2023-4700,SUSE-SLE-Module-Basesystem-15-SP5-2023-4700,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4700,openSUSE-SLE-15.5-2023-4700 SKIP SUSE-RU-2023:4701-1 as openSUSE-SLE-15.5-2023-4701 is not security or has no CVEs. patches: SUSE-2023-4701,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-4701,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-4701,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-4701,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4701,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-4701,openSUSE-SLE-15.4-2023-4701,openSUSE-SLE-15.5-2023-4701 SKIP SUSE-RU-2023:4702-1 as SUSE-SLE-SAP-12-SP5-2023-4702 is not security or has no CVEs. patches: SUSE-2023-4702,SUSE-SLE-SAP-12-SP5-2023-4702 SKIP SUSE-RU-2023:4703-1 as openSUSE-SLE-15.5-2023-4703 is not security or has no CVEs. patches: SUSE-2023-4703,SUSE-SLE-Micro-5.5-2023-4703,SUSE-SLE-Module-Basesystem-15-SP5-2023-4703,openSUSE-SLE-15.5-2023-4703 SKIP SUSE-RU-2023:4704-1 as SUSE-Storage-7.1-2023-4704 is not security or has no CVEs. patches: SUSE-2023-4704,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4704,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4704,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4704,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4704,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4704,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4704,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4704,SUSE-SUSE-MicroOS-5.1-2023-4704,SUSE-SUSE-MicroOS-5.2-2023-4704,SUSE-Storage-7.1-2023-4704 SKIP SUSE-RU-2023:4705-1 as openSUSE-SLE-15.4-2023-4705 is not security or has no CVEs. patches: SUSE-2023-4705,SUSE-SLE-Micro-5.3-2023-4705,SUSE-SLE-Micro-5.4-2023-4705,SUSE-SLE-Module-Basesystem-15-SP4-2023-4705,openSUSE-Leap-Micro-5.3-2023-4705,openSUSE-Leap-Micro-5.4-2023-4705,openSUSE-SLE-15.4-2023-4705 SKIP SUSE-RU-2023:4706-1 as openSUSE-SLE-15.5-2023-4706 is not security or has no CVEs. patches: SUSE-2023-4706,SUSE-SLE-Module-Basesystem-15-SP5-2023-4706,openSUSE-SLE-15.5-2023-4706 SKIP SUSE-RU-2023:4711-1 as openSUSE-SLE-15.5-2023-4711 is not security or has no CVEs. patches: SUSE-2023-4711,SUSE-SLE-Micro-5.5-2023-4711,SUSE-SLE-Module-Basesystem-15-SP4-2023-4711,SUSE-SLE-Module-Basesystem-15-SP5-2023-4711,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4711,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4711,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4711,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4711,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4711,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4711,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4711,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4711,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4711,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4711,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4711,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4711,SUSE-Storage-7.1-2023-4711,openSUSE-SLE-15.4-2023-4711,openSUSE-SLE-15.5-2023-4711 SKIP SUSE-RU-2023:4716-1 as openSUSE-SLE-15.5-2023-4716 is not security or has no CVEs. patches: SUSE-2023-4716,SUSE-SLE-Micro-5.5-2023-4716,SUSE-SLE-Module-Basesystem-15-SP4-2023-4716,SUSE-SLE-Module-Basesystem-15-SP5-2023-4716,SUSE-SLE-Module-Development-Tools-15-SP4-2023-4716,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4716,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4716,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4716,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4716,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4716,SUSE-Storage-7.1-2023-4716,openSUSE-SLE-15.4-2023-4716,openSUSE-SLE-15.5-2023-4716 SKIP SUSE-RU-2023:4717-1 as SUSE-SLE-SERVER-12-SP5-2023-4717 is not security or has no CVEs. patches: SUSE-2023-4717,SUSE-SLE-SDK-12-SP5-2023-4717,SUSE-SLE-SERVER-12-SP5-2023-4717 SKIP SUSE-RU-2023:4719-1 as SUSE-SLE-SDK-12-SP5-2023-4719 is not security or has no CVEs. patches: SUSE-2023-4719,SUSE-SLE-HA-12-SP5-2023-4719,SUSE-SLE-SDK-12-SP5-2023-4719 SKIP SUSE-RU-2023:4720-1 as SUSE-SLE-Module-Basesystem-15-SP5-2023-4720 is not security or has no CVEs. patches: SUSE-2023-4720,SUSE-SLE-Module-Basesystem-15-SP5-2023-4720 SKIP SUSE-RU-2023:4721-1 as SUSE-SLE-Module-Basesystem-15-SP4-2023-4721 is not security or has no CVEs. patches: SUSE-2023-4721,SUSE-SLE-Module-Basesystem-15-SP4-2023-4721 SKIP SUSE-RU-2023:4722-1 as openSUSE-SLE-15.5-2023-4722 is not security or has no CVEs. patches: SUSE-2023-4722,SUSE-SLE-Manager-Tools-For-Micro-5-2023-4722,SUSE-SLE-Module-Basesystem-15-SP4-2023-4722,SUSE-SLE-Module-Basesystem-15-SP5-2023-4722,openSUSE-SLE-15.4-2023-4722,openSUSE-SLE-15.5-2023-4722 SKIP SUSE-RU-2023:4723-1 as openSUSE-SLE-15.5-2023-4723 is not security or has no CVEs. patches: SUSE-2023-4723,SUSE-SLE-Micro-5.3-2023-4723,SUSE-SLE-Micro-5.4-2023-4723,SUSE-SLE-Micro-5.5-2023-4723,SUSE-SLE-Module-Basesystem-15-SP4-2023-4723,SUSE-SLE-Module-Basesystem-15-SP5-2023-4723,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4723,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4723,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4723,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4723,SUSE-SUSE-MicroOS-5.1-2023-4723,SUSE-SUSE-MicroOS-5.2-2023-4723,SUSE-Storage-7.1-2023-4723,openSUSE-Leap-Micro-5.3-2023-4723,openSUSE-Leap-Micro-5.4-2023-4723,openSUSE-SLE-15.4-2023-4723,openSUSE-SLE-15.5-2023-4723 SKIP SUSE-RU-2023:4725-1 as SUSE-Storage-7.1-2023-4725 is not security or has no CVEs. patches: SUSE-2023-4725,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4725,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4725,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4725,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4725,SUSE-SUSE-MicroOS-5.1-2023-4725,SUSE-SUSE-MicroOS-5.2-2023-4725,SUSE-Storage-7.1-2023-4725 SKIP SUSE-RU-2023:4726-1 as openSUSE-SLE-15.4-2023-4726 is not security or has no CVEs. patches: SUSE-2023-4726,SUSE-SLE-Micro-5.3-2023-4726,SUSE-SLE-Micro-5.4-2023-4726,SUSE-SLE-Module-Containers-15-SP4-2023-4726,openSUSE-Leap-Micro-5.3-2023-4726,openSUSE-Leap-Micro-5.4-2023-4726,openSUSE-SLE-15.4-2023-4726 SKIP SUSE-RU-2023:4728-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2023-4728 is not security or has no CVEs. patches: SUSE-2023-4728,SUSE-SLE-Product-SLES-15-SP4-LTSS-2023-4728 SKIP SUSE-RU-2023:4729-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4729 is not security or has no CVEs. patches: SUSE-2023-4729,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4729,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4729 SKIP SUSE-RU-2023:4738-1 as SUSE-SLE-Manager-Tools-12-2023-4738 is not security or has no CVEs. patches: SUSE-2023-4738,SUSE-SLE-Manager-Tools-12-2023-4738 SKIP SUSE-RU-2023:4739-1 as openSUSE-SLE-15.5-2023-4739 is not security or has no CVEs. patches: SUSE-2023-4739,SUSE-SLE-Manager-Tools-15-2023-4739,openSUSE-SLE-15.4-2023-4739,openSUSE-SLE-15.5-2023-4739 ERROR: notice SUSE-RU-2023:4743-1 has no valid patches out of: SUSE-2023-4743,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2023-4743 ERROR: notice SUSE-RU-2023:4744-1 has no valid patches out of: SUSE-2023-4744,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2023-4744 SKIP SUSE-RU-2023:4747-1 as SUSE-EL-9-CLIENT-TOOLS-2023-4747 is not security or has no CVEs. patches: SUSE-2023-4747,SUSE-EL-9-CLIENT-TOOLS-2023-4747 SKIP SUSE-RU-2023:4759-1 as openSUSE-SLE-15.5-2023-4759 is not security or has no CVEs. patches: SUSE-2023-4759,SUSE-SLE-Micro-5.5-2023-4759,SUSE-SLE-Module-Basesystem-15-SP5-2023-4759,openSUSE-SLE-15.5-2023-4759 SKIP SUSE-RU-2023:4760-1 as openSUSE-SLE-15.5-2023-4760 is not security or has no CVEs. patches: SUSE-2023-4760,SUSE-SLE-Micro-5.5-2023-4760,SUSE-SLE-Module-Basesystem-15-SP5-2023-4760,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4760,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4760,openSUSE-SLE-15.5-2023-4760 SKIP SUSE-RU-2023:4823-1 as openSUSE-SLE-15.5-2023-4823 is not security or has no CVEs. patches: SUSE-2023-4823,SUSE-SLE-Module-Basesystem-15-SP4-2023-4823,SUSE-SLE-Module-Basesystem-15-SP5-2023-4823,openSUSE-SLE-15.4-2023-4823,openSUSE-SLE-15.5-2023-4823 SKIP SUSE-RU-2023:4852-1 as openSUSE-SLE-15.5-2023-4852 is not security or has no CVEs. patches: SUSE-2023-4852,SUSE-SLE-Module-Live-Patching-15-SP4-2023-4852,SUSE-SLE-Module-Live-Patching-15-SP5-2023-4852,openSUSE-SLE-15.4-2023-4852,openSUSE-SLE-15.5-2023-4852 SKIP SUSE-RU-2023:4860-1 as openSUSE-SLE-15.5-2023-4860 is not security or has no CVEs. patches: SUSE-2023-4860,SUSE-SLE-Module-Basesystem-15-SP5-2023-4860,openSUSE-SLE-15.5-2023-4860 SKIP SUSE-RU-2023:4876-1 as openSUSE-SLE-15.5-2023-4876 is not security or has no CVEs. patches: SUSE-2023-4876,openSUSE-SLE-15.4-2023-4876,openSUSE-SLE-15.5-2023-4876 SKIP SUSE-RU-2023:4880-1 as openSUSE-SLE-15.4-2023-4880 is not security or has no CVEs. patches: SUSE-2023-4880,SUSE-SLE-Micro-5.3-2023-4880,SUSE-SLE-Micro-5.4-2023-4880,SUSE-SLE-Module-Basesystem-15-SP4-2023-4880,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4880,openSUSE-Leap-Micro-5.3-2023-4880,openSUSE-Leap-Micro-5.4-2023-4880,openSUSE-SLE-15.4-2023-4880 SKIP SUSE-RU-2023:4881-1 as openSUSE-SLE-15.5-2023-4881 is not security or has no CVEs. patches: SUSE-2023-4881,SUSE-SLE-Module-Basesystem-15-SP4-2023-4881,SUSE-SLE-Module-Basesystem-15-SP5-2023-4881,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4881,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4881,openSUSE-SLE-15.4-2023-4881,openSUSE-SLE-15.5-2023-4881 SKIP SUSE-RU-2023:4884-1 as openSUSE-SLE-15.5-2023-4884 is not security or has no CVEs. patches: SUSE-2023-4884,SUSE-SLE-Module-Development-Tools-15-SP5-2023-4884,openSUSE-SLE-15.5-2023-4884 SKIP SUSE-RU-2023:4886-1 as openSUSE-SLE-15.5-2023-4886 is not security or has no CVEs. patches: SUSE-2023-4886,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4886,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-4886,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4886,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4886,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4886,openSUSE-SLE-15.4-2023-4886,openSUSE-SLE-15.5-2023-4886 SKIP SUSE-RU-2023:4887-1 as openSUSE-SLE-15.5-2023-4887 is not security or has no CVEs. patches: SUSE-2023-4887,SUSE-SLE-Module-Basesystem-15-SP5-2023-4887,openSUSE-SLE-15.5-2023-4887 SKIP SUSE-RU-2023:4888-1 as openSUSE-SLE-15.5-2023-4888 is not security or has no CVEs. patches: SUSE-2023-4888,SUSE-SLE-Module-Basesystem-15-SP5-2023-4888,openSUSE-SLE-15.5-2023-4888 SKIP SUSE-RU-2023:4889-1 as SUSE-SLE-SERVER-12-SP5-2023-4889 is not security or has no CVEs. patches: SUSE-2023-4889,SUSE-SLE-SDK-12-SP5-2023-4889,SUSE-SLE-SERVER-12-SP5-2023-4889 SKIP SUSE-RU-2023:4890-1 as openSUSE-SLE-15.5-2023-4890 is not security or has no CVEs. patches: SUSE-2023-4890,SUSE-SLE-Module-Basesystem-15-SP4-2023-4890,SUSE-SLE-Module-Basesystem-15-SP5-2023-4890,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4890,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4890,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4890,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4890,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4890,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4890,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4890,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4890,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4890,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4890,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4890,SUSE-Storage-7.1-2023-4890,openSUSE-SLE-15.4-2023-4890,openSUSE-SLE-15.5-2023-4890 SKIP SUSE-RU-2023:4896-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4896 is not security or has no CVEs. patches: SUSE-2023-4896,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4896 SKIP SUSE-RU-2023:4897-1 as openSUSE-SLE-15.5-2023-4897 is not security or has no CVEs. patches: SUSE-2023-4897,SUSE-SLE-Micro-5.3-2023-4897,SUSE-SLE-Micro-5.4-2023-4897,SUSE-SLE-Micro-5.5-2023-4897,SUSE-SLE-Module-Basesystem-15-SP4-2023-4897,SUSE-SLE-Module-Basesystem-15-SP5-2023-4897,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4897,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4897,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4897,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4897,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4897,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4897,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4897,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4897,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4897,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4897,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4897,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4897,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4897,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4897,SUSE-SUSE-MicroOS-5.1-2023-4897,SUSE-SUSE-MicroOS-5.2-2023-4897,SUSE-Storage-7.1-2023-4897,openSUSE-Leap-Micro-5.3-2023-4897,openSUSE-Leap-Micro-5.4-2023-4897,openSUSE-SLE-15.4-2023-4897,openSUSE-SLE-15.5-2023-4897 SKIP SUSE-RU-2023:4898-1 as openSUSE-SLE-15.5-2023-4898 is not security or has no CVEs. patches: SUSE-2023-4898,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-4898,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-4898,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4898,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-4898,openSUSE-SLE-15.4-2023-4898,openSUSE-SLE-15.5-2023-4898 SKIP SUSE-RU-2023:4899-1 as SUSE-SLE-Module-SAP-Applications-15-SP1-2023-4899 is not security or has no CVEs. patches: SUSE-2023-4899,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-4899 SKIP SUSE-RU-2023:4913-1 as openSUSE-SLE-15.5-2023-4913 is not security or has no CVEs. patches: SUSE-2023-4913,SUSE-SLE-Module-Basesystem-15-SP4-2023-4913,SUSE-SLE-Module-Basesystem-15-SP5-2023-4913,openSUSE-SLE-15.4-2023-4913,openSUSE-SLE-15.5-2023-4913 SKIP SUSE-RU-2023:4914-1 as SUSE-SLE-SERVER-12-SP5-2023-4914 is not security or has no CVEs. patches: SUSE-2023-4914,SUSE-SLE-SDK-12-SP5-2023-4914,SUSE-SLE-SERVER-12-SP5-2023-4914 SKIP SUSE-RU-2023:4915-1 as openSUSE-SLE-15.5-2023-4915 is not security or has no CVEs. patches: SUSE-2023-4915,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-4915,openSUSE-SLE-15.4-2023-4915,openSUSE-SLE-15.5-2023-4915 SKIP SUSE-RU-2023:4916-1 as openSUSE-SLE-15.4-2023-4916 is not security or has no CVEs. patches: SUSE-2023-4916,SUSE-SLE-Micro-5.3-2023-4916,SUSE-SLE-Micro-5.4-2023-4916,SUSE-SLE-Module-Basesystem-15-SP4-2023-4916,SUSE-SLE-Product-HA-15-SP4-2023-4916,openSUSE-Leap-Micro-5.3-2023-4916,openSUSE-Leap-Micro-5.4-2023-4916,openSUSE-SLE-15.4-2023-4916 SKIP SUSE-RU-2023:4922-1 as SUSE-SLE-Module-Public-Cloud-12-2023-4922 is not security or has no CVEs. patches: SUSE-2023-4922,SUSE-SLE-Module-Public-Cloud-12-2023-4922 SKIP SUSE-RU-2023:4923-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4923 is not security or has no CVEs. patches: SUSE-2023-4923,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4923,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4923 SKIP SUSE-RU-2023:4924-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4924 is not security or has no CVEs. patches: SUSE-2023-4924,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4924,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4924 SKIP SUSE-RU-2023:4927-1 as openSUSE-SLE-15.5-2023-4927 is not security or has no CVEs. patches: SUSE-2023-4927,SUSE-SLE-Module-Basesystem-15-SP5-2023-4927,openSUSE-SLE-15.5-2023-4927 SKIP SUSE-RU-2023:4937-1 as openSUSE-SLE-15.5-2023-4937 is not security or has no CVEs. patches: SUSE-2023-4937,SUSE-SLE-Micro-5.3-2023-4937,SUSE-SLE-Micro-5.4-2023-4937,SUSE-SLE-Micro-5.5-2023-4937,SUSE-SLE-Module-Basesystem-15-SP4-2023-4937,SUSE-SLE-Module-Basesystem-15-SP5-2023-4937,openSUSE-Leap-Micro-5.3-2023-4937,openSUSE-Leap-Micro-5.4-2023-4937,openSUSE-SLE-15.4-2023-4937,openSUSE-SLE-15.5-2023-4937 SKIP SUSE-RU-2023:4940-1 as openSUSE-SLE-15.5-2023-4940 is not security or has no CVEs. patches: SUSE-2023-4940,SUSE-SLE-Module-SAP-Applications-15-SP1-2023-4940,SUSE-SLE-Module-SAP-Applications-15-SP2-2023-4940,SUSE-SLE-Module-SAP-Applications-15-SP3-2023-4940,SUSE-SLE-Module-SAP-Applications-15-SP4-2023-4940,SUSE-SLE-Module-SAP-Applications-15-SP5-2023-4940,openSUSE-SLE-15.4-2023-4940,openSUSE-SLE-15.5-2023-4940 SKIP SUSE-RU-2023:4953-1 as SUSE-SLE-Module-Server-Applications-15-SP5-2023-4953 is not security or has no CVEs. patches: SUSE-2023-4953,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4953 SKIP SUSE-RU-2023:4954-1 as openSUSE-SLE-15.5-2023-4954 is not security or has no CVEs. patches: SUSE-2023-4954,SUSE-SLE-Module-Basesystem-15-SP5-2023-4954,openSUSE-SLE-15.5-2023-4954 SKIP SUSE-RU-2023:4955-1 as SUSE-Storage-7.1-2023-4955 is not security or has no CVEs. patches: SUSE-2023-4955,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4955,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4955,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4955,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4955,SUSE-Storage-7.1-2023-4955 SKIP SUSE-RU-2023:4956-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4956 is not security or has no CVEs. patches: SUSE-2023-4956,SUSE-SLE-INSTALLER-15-SP1-2023-4956,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4956,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4956,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4956 SKIP SUSE-RU-2023:4959-1 as SUSE-SLE-SERVER-12-SP5-2023-4959 is not security or has no CVEs. patches: SUSE-2023-4959,SUSE-SLE-SDK-12-SP5-2023-4959,SUSE-SLE-SERVER-12-SP5-2023-4959 SKIP SUSE-RU-2023:4960-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4960 is not security or has no CVEs. patches: SUSE-2023-4960,SUSE-SLE-INSTALLER-15-SP2-2023-4960,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4960,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4960,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4960 SKIP SUSE-RU-2023:4962-1 as openSUSE-SLE-15.5-2023-4962 is not security or has no CVEs. patches: SUSE-2023-4962,SUSE-SLE-INSTALLER-15-SP4-2023-4962,SUSE-SLE-INSTALLER-15-SP5-2023-4962,SUSE-SLE-Micro-5.3-2023-4962,SUSE-SLE-Micro-5.4-2023-4962,SUSE-SLE-Micro-5.5-2023-4962,SUSE-SLE-Module-Basesystem-15-SP4-2023-4962,SUSE-SLE-Module-Basesystem-15-SP5-2023-4962,SUSE-SLE-Product-RT-15-SP4-2023-4962,openSUSE-Leap-Micro-5.3-2023-4962,openSUSE-Leap-Micro-5.4-2023-4962,openSUSE-SLE-15.4-2023-4962,openSUSE-SLE-15.5-2023-4962 SKIP SUSE-RU-2023:4963-1 as SUSE-Storage-7.1-2023-4963 is not security or has no CVEs. patches: SUSE-2023-4963,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4963,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4963,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4963,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4963,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4963,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4963,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4963,SUSE-SUSE-MicroOS-5.1-2023-4963,SUSE-SUSE-MicroOS-5.2-2023-4963,SUSE-Storage-7.1-2023-4963 SKIP SUSE-RU-2023:4964-1 as SUSE-SLE-SERVER-12-SP5-2023-4964 is not security or has no CVEs. patches: SUSE-2023-4964,SUSE-SLE-SDK-12-SP5-2023-4964,SUSE-SLE-SERVER-12-SP5-2023-4964 SKIP SUSE-RU-2023:4966-1 as openSUSE-SLE-15.5-2023-4966 is not security or has no CVEs. patches: SUSE-2023-4966,SUSE-SLE-Micro-5.3-2023-4966,SUSE-SLE-Micro-5.4-2023-4966,SUSE-SLE-Micro-5.5-2023-4966,SUSE-SLE-Module-Public-Cloud-15-SP1-2023-4966,SUSE-SLE-Module-Public-Cloud-15-SP2-2023-4966,SUSE-SLE-Module-Public-Cloud-15-SP3-2023-4966,SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4966,SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4966,openSUSE-Leap-Micro-5.3-2023-4966,openSUSE-Leap-Micro-5.4-2023-4966,openSUSE-SLE-15.4-2023-4966,openSUSE-SLE-15.5-2023-4966 SKIP SUSE-RU-2023:4967-1 as SUSE-SLE-Module-Public-Cloud-12-2023-4967 is not security or has no CVEs. patches: SUSE-2023-4967,SUSE-SLE-Module-Public-Cloud-12-2023-4967 SKIP SUSE-RU-2023:4970-1 as openSUSE-SLE-15.5-2023-4970 is not security or has no CVEs. patches: SUSE-2023-4970,SUSE-SLE-Micro-5.3-2023-4970,SUSE-SLE-Micro-5.4-2023-4970,SUSE-SLE-Module-Basesystem-15-SP4-2023-4970,SUSE-SLE-Module-Basesystem-15-SP5-2023-4970,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4970,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4970,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4970,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4970,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4970,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4970,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4970,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4970,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4970,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4970,SUSE-SUSE-MicroOS-5.1-2023-4970,SUSE-SUSE-MicroOS-5.2-2023-4970,SUSE-Storage-7.1-2023-4970,openSUSE-Leap-Micro-5.3-2023-4970,openSUSE-Leap-Micro-5.4-2023-4970,openSUSE-SLE-15.4-2023-4970,openSUSE-SLE-15.5-2023-4970 SKIP SUSE-RU-2023:4973-1 as openSUSE-SLE-15.5-2023-4973 is not security or has no CVEs. patches: SUSE-2023-4973,SUSE-SLE-Micro-5.5-2023-4973,SUSE-SLE-Module-Basesystem-15-SP5-2023-4973,openSUSE-SLE-15.5-2023-4973 SKIP SUSE-RU-2023:4975-1 as SUSE-SLE-SERVER-12-SP5-2023-4975 is not security or has no CVEs. patches: SUSE-2023-4975,SUSE-SLE-SERVER-12-SP5-2023-4975 SKIP SUSE-RU-2023:4976-1 as openSUSE-SLE-15.5-2023-4976 is not security or has no CVEs. patches: SUSE-2023-4976,SUSE-SLE-Module-Basesystem-15-SP4-2023-4976,SUSE-SLE-Module-Basesystem-15-SP5-2023-4976,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4976,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4976,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-4976,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4976,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4976,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4976,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-4976,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4976,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4976,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-4976,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4976,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4976,SUSE-Storage-7.1-2023-4976,openSUSE-SLE-15.4-2023-4976,openSUSE-SLE-15.5-2023-4976 SKIP SUSE-RU-2023:4977-1 as SUSE-SLE-SERVER-12-SP5-2023-4977 is not security or has no CVEs. patches: SUSE-2023-4977,SUSE-SLE-SDK-12-SP5-2023-4977,SUSE-SLE-SERVER-12-SP5-2023-4977 SKIP SUSE-RU-2023:4985-1 as openSUSE-SLE-15.5-2023-4985 is not security or has no CVEs. patches: SUSE-2023-4985,SUSE-SLE-Micro-5.5-2023-4985,SUSE-SLE-Module-Basesystem-15-SP5-2023-4985,SUSE-SLE-Product-HA-15-SP5-2023-4985,openSUSE-SLE-15.5-2023-4985 SKIP SUSE-RU-2023:4989-1 as openSUSE-SLE-15.4-2023-4989 is not security or has no CVEs. patches: SUSE-2023-4989,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4989,openSUSE-SLE-15.4-2023-4989 SKIP SUSE-RU-2023:4990-1 as openSUSE-SLE-15.5-2023-4990 is not security or has no CVEs. patches: SUSE-2023-4990,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4990,openSUSE-SLE-15.5-2023-4990 ERROR: notice SUSE-RU-202401:15248-1 has no valid patches out of: suse-ubu204ct-client-tools-202401-15248 ERROR: notice SUSE-RU-202401:15249-1 has no valid patches out of: suse-ubu224ct-client-tools-202401-15249 ERROR: notice SUSE-RU-202401:15251-1 has no valid patches out of: suse-ubu204ct-client-tools-202401-15251 ERROR: notice SUSE-RU-202401:15252-1 has no valid patches out of: suse-ubu224ct-client-tools-202401-15252 ERROR: notice SUSE-RU-202404:15255-1 has no valid patches out of: suse-ubu224ct-client-tools-202404-15255 ERROR: notice SUSE-RU-202405:15261-1 has no valid patches out of: SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-1618,suse-ubu204ct-client-tools-beta-202405-15261 ERROR: notice SUSE-RU-202405:15262-1 has no valid patches out of: SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-1619,suse-ubu224ct-client-tools-beta-202405-15262 ERROR: notice SUSE-RU-202406:15266-1 has no valid patches out of: suse-ubu204ct-client-tools-202406-15266 ERROR: notice SUSE-RU-202406:15267-1 has no valid patches out of: suse-ubu224ct-client-tools-202406-15267 ERROR: notice SUSE-RU-202406:15269-1 has no valid patches out of: suse-ubu204ct-client-tools-202406-15269 ERROR: notice SUSE-RU-202406:15270-1 has no valid patches out of: suse-ubu224ct-client-tools-202406-15270 ERROR: notice SUSE-RU-202408:15273-1 has no valid patches out of: SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-3269,suse-ubu224ct-client-tools-202408-15273 ERROR: notice SUSE-RU-202408:15275-1 has no valid patches out of: suse-ubu204ct-client-tools-202408-15275 ERROR: notice SUSE-RU-202408:15276-1 has no valid patches out of: suse-ubu224ct-client-tools-202408-15276 SKIP SUSE-RU-2024:0001-1 as openSUSE-SLE-15.5-2024-1 is not security or has no CVEs. patches: SUSE-2024-1,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1,openSUSE-SLE-15.5-2024-1 SKIP SUSE-RU-2024:0008-1 as openSUSE-SLE-15.4-2024-8 is not security or has no CVEs. patches: SUSE-2024-8,SUSE-SLE-Micro-5.3-2024-8,SUSE-SLE-Micro-5.4-2024-8,SUSE-SLE-Product-HA-15-SP4-2024-8,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-8,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-8,SUSE-SLE-Product-RT-15-SP4-2024-8,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-8,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-8,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-8,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-8,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-8,openSUSE-Leap-Micro-5.3-2024-8,openSUSE-Leap-Micro-5.4-2024-8,openSUSE-SLE-15.4-2024-8 SKIP SUSE-RU-2024:0009-1 as SUSE-Storage-7.1-2024-9 is not security or has no CVEs. patches: SUSE-2024-9,SUSE-SLE-Product-HA-15-SP3-2024-9,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-9,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-9,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-9,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-9,SUSE-SUSE-MicroOS-5.2-2024-9,SUSE-Storage-7.1-2024-9 SKIP SUSE-RU-2024:0011-1 as openSUSE-SLE-15.5-2024-11 is not security or has no CVEs. patches: SUSE-2024-11,SUSE-SLE-Micro-5.3-2024-11,SUSE-SLE-Micro-5.4-2024-11,SUSE-SLE-Micro-5.5-2024-11,SUSE-SLE-Module-Basesystem-15-SP4-2024-11,SUSE-SLE-Module-Basesystem-15-SP5-2024-11,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-11,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-11,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-11,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-11,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-11,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-11,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-11,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-11,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-11,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-11,SUSE-SUSE-MicroOS-5.1-2024-11,SUSE-SUSE-MicroOS-5.2-2024-11,SUSE-Storage-7.1-2024-11,openSUSE-Leap-Micro-5.3-2024-11,openSUSE-Leap-Micro-5.4-2024-11,openSUSE-SLE-15.4-2024-11,openSUSE-SLE-15.5-2024-11 SKIP SUSE-RU-2024:0013-1 as SUSE-SLE-SERVER-12-SP5-2024-13 is not security or has no CVEs. patches: SUSE-2024-13,SUSE-SLE-SERVER-12-SP5-2024-13 SKIP SUSE-RU-2024:0015-1 as SUSE-SLE-Live-Patching-12-SP5-2024-15 is not security or has no CVEs. patches: SUSE-2024-15,SUSE-SLE-Live-Patching-12-2024-15,SUSE-SLE-Live-Patching-12-SP5-2024-15 SKIP SUSE-RU-2024:0016-1 as openSUSE-SLE-15.5-2024-16 is not security or has no CVEs. patches: SUSE-2024-16,SUSE-SLE-Micro-5.3-2024-16,SUSE-SLE-Micro-5.4-2024-16,SUSE-SLE-Micro-5.5-2024-16,SUSE-SLE-Module-Basesystem-15-SP4-2024-16,SUSE-SLE-Module-Basesystem-15-SP5-2024-16,SUSE-SUSE-MicroOS-5.1-2024-16,SUSE-SUSE-MicroOS-5.2-2024-16,openSUSE-Leap-Micro-5.3-2024-16,openSUSE-Leap-Micro-5.4-2024-16,openSUSE-SLE-15.4-2024-16,openSUSE-SLE-15.5-2024-16 SKIP SUSE-RU-2024:0017-1 as openSUSE-SLE-15.5-2024-17 is not security or has no CVEs. patches: SUSE-2024-17,SUSE-SLE-Module-Basesystem-15-SP4-2024-17,SUSE-SLE-Module-Basesystem-15-SP5-2024-17,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-17,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-17,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-17,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-17,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-17,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-17,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-17,SUSE-Storage-7.1-2024-17,openSUSE-SLE-15.4-2024-17,openSUSE-SLE-15.5-2024-17 SKIP SUSE-RU-2024:0018-1 as openSUSE-SLE-15.5-2024-18 is not security or has no CVEs. patches: SUSE-2024-18,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-18,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-18,SUSE-SLE-Product-WE-15-SP4-2024-18,SUSE-SLE-Product-WE-15-SP5-2024-18,openSUSE-SLE-15.4-2024-18,openSUSE-SLE-15.5-2024-18 SKIP SUSE-RU-2024:0019-1 as openSUSE-SLE-15.5-2024-19 is not security or has no CVEs. patches: SUSE-2024-19,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-19,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-19,SUSE-SLE-Product-WE-15-SP4-2024-19,SUSE-SLE-Product-WE-15-SP5-2024-19,openSUSE-SLE-15.4-2024-19,openSUSE-SLE-15.5-2024-19 SKIP SUSE-RU-2024:0020-1 as openSUSE-SLE-15.5-2024-20 is not security or has no CVEs. patches: SUSE-2024-20,SUSE-SLE-Module-Live-Patching-15-SP1-2024-20,SUSE-SLE-Module-Live-Patching-15-SP2-2024-20,SUSE-SLE-Module-Live-Patching-15-SP3-2024-20,SUSE-SLE-Module-Live-Patching-15-SP4-2024-20,SUSE-SLE-Module-Live-Patching-15-SP5-2024-20,openSUSE-SLE-15.4-2024-20,openSUSE-SLE-15.5-2024-20 SKIP SUSE-RU-2024:0021-1 as openSUSE-SLE-15.5-2024-21 is not security or has no CVEs. patches: SUSE-2024-21,SUSE-SLE-Micro-5.3-2024-21,SUSE-SLE-Micro-5.4-2024-21,SUSE-SLE-Micro-5.5-2024-21,SUSE-SLE-Module-Basesystem-15-SP4-2024-21,SUSE-SLE-Module-Basesystem-15-SP5-2024-21,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-21,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-21,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-21,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-21,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-21,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-21,SUSE-Storage-7.1-2024-21,openSUSE-Leap-Micro-5.3-2024-21,openSUSE-Leap-Micro-5.4-2024-21,openSUSE-SLE-15.4-2024-21,openSUSE-SLE-15.5-2024-21 SKIP SUSE-RU-2024:0021-2 as SUSE-SLE-Micro-5.5-2024-21 is not security or has no CVEs. patches: SUSE-2024-21,SUSE-SLE-Micro-5.5-2024-21 SKIP SUSE-RU-2024:0022-1 as openSUSE-SLE-15.5-2024-22 is not security or has no CVEs. patches: SUSE-2024-22,SUSE-SLE-Micro-5.5-2024-22,SUSE-SLE-Module-Server-Applications-15-SP5-2024-22,openSUSE-SLE-15.5-2024-22 SKIP SUSE-RU-2024:0023-1 as openSUSE-SLE-15.4-2024-23 is not security or has no CVEs. patches: SUSE-2024-23,SUSE-SLE-Micro-5.4-2024-23,SUSE-SLE-Module-Server-Applications-15-SP4-2024-23,openSUSE-Leap-Micro-5.4-2024-23,openSUSE-SLE-15.4-2024-23 SKIP SUSE-RU-2024:0026-1 as openSUSE-SLE-15.5-2024-26 is not security or has no CVEs. patches: SUSE-2024-26,SUSE-SLE-Micro-5.3-2024-26,SUSE-SLE-Micro-5.4-2024-26,SUSE-SLE-Micro-5.5-2024-26,SUSE-SLE-Module-Basesystem-15-SP5-2024-26,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-26,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-26,SUSE-SLE-Product-RT-15-SP4-2024-26,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-26,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-26,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-26,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-26,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-26,openSUSE-Leap-Micro-5.3-2024-26,openSUSE-Leap-Micro-5.4-2024-26,openSUSE-SLE-15.4-2024-26,openSUSE-SLE-15.5-2024-26 SKIP SUSE-RU-2024:0027-1 as SUSE-SLE-SERVER-12-SP5-2024-27 is not security or has no CVEs. patches: SUSE-2024-27,SUSE-SLE-SDK-12-SP5-2024-27,SUSE-SLE-SERVER-12-SP5-2024-27 SKIP SUSE-RU-2024:0028-1 as SUSE-Storage-7.1-2024-28 is not security or has no CVEs. patches: SUSE-2024-28,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-28,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-28,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-28,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-28,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-28,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-28,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-28,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-28,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-28,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-28,SUSE-SUSE-MicroOS-5.1-2024-28,SUSE-SUSE-MicroOS-5.2-2024-28,SUSE-Storage-7.1-2024-28 SKIP SUSE-RU-2024:0031-1 as SUSE-SLE-SERVER-12-SP5-2024-31 is not security or has no CVEs. patches: SUSE-2024-31,SUSE-SLE-SERVER-12-SP5-2024-31 SKIP SUSE-RU-2024:0036-1 as openSUSE-SLE-15.5-2024-36 is not security or has no CVEs. patches: SUSE-2024-36,SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-36,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-36,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-36,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-36,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-36,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-36,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-36,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-36,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-36,SUSE-Storage-7.1-2024-36,openSUSE-SLE-15.4-2024-36,openSUSE-SLE-15.5-2024-36 SKIP SUSE-RU-2024:0038-1 as SUSE-SLE-SERVER-12-SP5-2024-38 is not security or has no CVEs. patches: SUSE-2024-38,SUSE-SLE-HA-12-SP5-2024-38,SUSE-SLE-SDK-12-SP5-2024-38,SUSE-SLE-SERVER-12-SP5-2024-38 SKIP SUSE-RU-2024:0039-1 as openSUSE-SLE-15.5-2024-39 is not security or has no CVEs. patches: SUSE-2024-39,SUSE-SLE-Micro-5.5-2024-39,SUSE-SLE-Module-Basesystem-15-SP5-2024-39,SUSE-SLE-Product-HA-15-SP5-2024-39,openSUSE-SLE-15.5-2024-39 SKIP SUSE-RU-2024:0040-1 as openSUSE-SLE-15.5-2024-40 is not security or has no CVEs. patches: SUSE-2024-40,SUSE-SLE-INSTALLER-15-SP5-2024-40,SUSE-SLE-Module-Basesystem-15-SP5-2024-40,openSUSE-SLE-15.5-2024-40 SKIP SUSE-RU-2024:0042-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2024-42 is not security or has no CVEs. patches: SUSE-2024-42,SUSE-SLE-INSTALLER-15-SP1-2024-42,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-42,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-42,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-42 SKIP SUSE-RU-2024:0043-1 as SUSE-Storage-7.1-2024-43 is not security or has no CVEs. patches: SUSE-2024-43,SUSE-SLE-INSTALLER-15-SP2-2024-43,SUSE-SLE-INSTALLER-15-SP3-2024-43,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-43,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-43,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-43,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-43,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-43,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-43,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-43,SUSE-SUSE-MicroOS-5.1-2024-43,SUSE-SUSE-MicroOS-5.2-2024-43,SUSE-Storage-7.1-2024-43 SKIP SUSE-RU-2024:0046-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-46 is not security or has no CVEs. patches: SUSE-2024-46,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-46,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-46 SKIP SUSE-RU-2024:0047-1 as openSUSE-SLE-15.5-2024-47 is not security or has no CVEs. patches: SUSE-2024-47,SUSE-SLE-Module-RT-15-SP5-2024-47,SUSE-SLE-Module-Server-Applications-15-SP5-2024-47,openSUSE-SLE-15.5-2024-47 SKIP SUSE-RU-2024:0048-1 as SUSE-SLE-SAP-12-SP5-2024-48 is not security or has no CVEs. patches: SUSE-2024-48,SUSE-SLE-SAP-12-SP5-2024-48 SKIP SUSE-RU-2024:0049-1 as openSUSE-SLE-15.5-2024-49 is not security or has no CVEs. patches: SUSE-2024-49,openSUSE-SLE-15.4-2024-49,openSUSE-SLE-15.5-2024-49 SKIP SUSE-RU-2024:0050-1 as openSUSE-SLE-15.5-2024-50 is not security or has no CVEs. patches: SUSE-2024-50,SUSE-SLE-Micro-5.3-2024-50,SUSE-SLE-Micro-5.4-2024-50,SUSE-SLE-Micro-5.5-2024-50,SUSE-SLE-Module-Basesystem-15-SP4-2024-50,SUSE-SLE-Module-Basesystem-15-SP5-2024-50,SUSE-SLE-Module-Public-Cloud-15-SP1-2024-50,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-50,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-50,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-50,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-50,openSUSE-Leap-Micro-5.3-2024-50,openSUSE-Leap-Micro-5.4-2024-50,openSUSE-SLE-15.4-2024-50,openSUSE-SLE-15.5-2024-50 SKIP SUSE-RU-2024:0051-1 as SUSE-SLE-Module-Public-Cloud-12-2024-51 is not security or has no CVEs. patches: SUSE-2024-51,SUSE-SLE-Module-Public-Cloud-12-2024-51 SKIP SUSE-RU-2024:0052-1 as SUSE-SLE-Module-Development-Tools-15-SP5-2024-52 is not security or has no CVEs. patches: SUSE-2024-52,SUSE-SLE-Module-Development-Tools-15-SP5-2024-52 SKIP SUSE-RU-2024:0053-1 as openSUSE-SLE-15.5-2024-53 is not security or has no CVEs. patches: SUSE-2024-53,SUSE-SLE-Micro-5.3-2024-53,SUSE-SLE-Micro-5.4-2024-53,SUSE-SLE-Micro-5.5-2024-53,SUSE-SLE-Module-Development-Tools-15-SP4-2024-53,SUSE-SLE-Module-Development-Tools-15-SP5-2024-53,SUSE-SUSE-MicroOS-5.1-2024-53,SUSE-SUSE-MicroOS-5.2-2024-53,openSUSE-Leap-Micro-5.3-2024-53,openSUSE-Leap-Micro-5.4-2024-53,openSUSE-SLE-15.4-2024-53,openSUSE-SLE-15.5-2024-53 SKIP SUSE-RU-2024:0054-1 as openSUSE-SLE-15.5-2024-54 is not security or has no CVEs. patches: SUSE-2024-54,SUSE-SLE-Micro-5.5-2024-54,SUSE-SLE-Module-Basesystem-15-SP5-2024-54,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-54,SUSE-SLE-Product-WE-15-SP5-2024-54,openSUSE-SLE-15.5-2024-54 SKIP SUSE-RU-2024:0054-2 as SUSE-SLE-Micro-5.5-2024-54 is not security or has no CVEs. patches: SUSE-2024-54,SUSE-SLE-Micro-5.5-2024-54 SKIP SUSE-RU-2024:0055-1 as SUSE-SLE-SERVER-12-SP5-2024-55 is not security or has no CVEs. patches: SUSE-2024-55,SUSE-SLE-SERVER-12-SP5-2024-55 SKIP SUSE-RU-2024:0060-1 as openSUSE-Leap-Micro-5.4-2024-60 is not security or has no CVEs. patches: SUSE-2024-60,SUSE-SLE-Micro-5.4-2024-60,openSUSE-Leap-Micro-5.4-2024-60 SKIP SUSE-RU-2024:0061-1 as SUSE-SLE-SERVER-12-SP5-2024-61 is not security or has no CVEs. patches: SUSE-2024-61,SUSE-SLE-SERVER-12-SP5-2024-61 SKIP SUSE-RU-2024:0062-1 as openSUSE-SLE-15.5-2024-62 is not security or has no CVEs. patches: SUSE-2024-62,SUSE-SLE-Micro-5.3-2024-62,SUSE-SLE-Micro-5.4-2024-62,SUSE-SLE-Micro-5.5-2024-62,SUSE-SLE-Module-Basesystem-15-SP4-2024-62,SUSE-SLE-Module-Basesystem-15-SP5-2024-62,SUSE-SLE-Module-Development-Tools-15-SP4-2024-62,SUSE-SLE-Module-Development-Tools-15-SP5-2024-62,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-62,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-62,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-62,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-62,SUSE-SUSE-MicroOS-5.1-2024-62,SUSE-SUSE-MicroOS-5.2-2024-62,SUSE-Storage-7.1-2024-62,openSUSE-Leap-Micro-5.3-2024-62,openSUSE-Leap-Micro-5.4-2024-62,openSUSE-SLE-15.4-2024-62,openSUSE-SLE-15.5-2024-62 SKIP SUSE-RU-2024:0062-2 as SUSE-SLE-Micro-5.5-2024-62 is not security or has no CVEs. patches: SUSE-2024-62,SUSE-SLE-Micro-5.5-2024-62 SKIP SUSE-RU-2024:0065-1 as SUSE-2024-65 is not security or has no CVEs. patches: SUSE-2024-65 SKIP SUSE-RU-2024:0066-1 as SUSE-SLE-SERVER-12-SP5-2024-66 is not security or has no CVEs. patches: SUSE-2024-66,SUSE-SLE-SERVER-12-SP5-2024-66 SKIP SUSE-RU-2024:0068-1 as openSUSE-SLE-15.5-2024-68 is not security or has no CVEs. patches: SUSE-2024-68,SUSE-SLE-Module-Basesystem-15-SP5-2024-68,SUSE-SLE-Module-Server-Applications-15-SP5-2024-68,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-68,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-68,SUSE-SLE-Product-RT-15-SP4-2024-68,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-68,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-68,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-68,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-68,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-68,openSUSE-SLE-15.4-2024-68,openSUSE-SLE-15.5-2024-68 SKIP SUSE-RU-2024:0069-1 as SUSE-SLE-SAP-12-SP5-2024-69 is not security or has no CVEs. patches: SUSE-2024-69,SUSE-SLE-SAP-12-SP5-2024-69 SKIP SUSE-RU-2024:0072-1 as SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-72 is not security or has no CVEs. patches: SUSE-2024-72,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-72,SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-72 SKIP SUSE-RU-2024:0073-1 as openSUSE-SLE-15.5-2024-73 is not security or has no CVEs. patches: SUSE-2024-73,SUSE-SLE-Micro-5.5-2024-73,SUSE-SLE-Module-Basesystem-15-SP5-2024-73,openSUSE-SLE-15.5-2024-73 SKIP SUSE-RU-2024:0074-1 as SUSE-SLE-SERVER-12-SP5-2024-74 is not security or has no CVEs. patches: SUSE-2024-74,SUSE-SLE-SDK-12-SP5-2024-74,SUSE-SLE-SERVER-12-SP5-2024-74 SKIP SUSE-RU-2024:0079-1 as SUSE-SLE-Module-Public-Cloud-15-SP2-2024-79 is not security or has no CVEs. patches: SUSE-2024-79,SUSE-SLE-Module-Public-Cloud-15-SP1-2024-79,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-79 SKIP SUSE-RU-2024:0080-1 as openSUSE-SLE-15.5-2024-80 is not security or has no CVEs. patches: SUSE-2024-80,SUSE-SLE-Module-Development-Tools-15-SP5-2024-80,openSUSE-SLE-15.5-2024-80 SKIP SUSE-RU-2024:0081-1 as openSUSE-SLE-15.5-2024-81 is not security or has no CVEs. patches: SUSE-2024-81,SUSE-SLE-Micro-5.3-2024-81,SUSE-SLE-Micro-5.4-2024-81,SUSE-SLE-Micro-5.5-2024-81,SUSE-SLE-Module-Basesystem-15-SP4-2024-81,SUSE-SLE-Module-Basesystem-15-SP5-2024-81,openSUSE-Leap-Micro-5.3-2024-81,openSUSE-Leap-Micro-5.4-2024-81,openSUSE-SLE-15.4-2024-81,openSUSE-SLE-15.5-2024-81 SKIP SUSE-RU-2024:0082-1 as SUSE-Storage-7.1-2024-82 is not security or has no CVEs. patches: SUSE-2024-82,SUSE-Storage-7.1-2024-82 SKIP SUSE-RU-2024:0083-1 as SUSE-Storage-7.1-2024-83 is not security or has no CVEs. patches: SUSE-2024-83,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-83,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-83,SUSE-SLE-Product-RT-15-SP3-2024-83,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-83,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-83,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2024-83,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2024-83,SUSE-SUSE-MicroOS-5.1-2024-83,SUSE-SUSE-MicroOS-5.2-2024-83,SUSE-Storage-7.1-2024-83 SKIP SUSE-RU-2024:0084-1 as openSUSE-SLE-15.5-2024-84 is not security or has no CVEs. patches: SUSE-2024-84,SUSE-SLE-Module-SAP-Applications-15-SP1-2024-84,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-84,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-84,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-84,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-84,openSUSE-SLE-15.4-2024-84,openSUSE-SLE-15.5-2024-84 SKIP SUSE-RU-2024:0085-1 as SUSE-SLE-SAP-12-SP5-2024-85 is not security or has no CVEs. patches: SUSE-2024-85,SUSE-SLE-SAP-12-SP5-2024-85 SKIP SUSE-RU-2024:0086-1 as openSUSE-SLE-15.5-2024-86 is not security or has no CVEs. patches: SUSE-2024-86,SUSE-SLE-Module-SAP-Applications-15-SP1-2024-86,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-86,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-86,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-86,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-86,openSUSE-SLE-15.4-2024-86,openSUSE-SLE-15.5-2024-86 SKIP SUSE-RU-2024:0087-1 as openSUSE-SLE-15.5-2024-87 is not security or has no CVEs. patches: SUSE-2024-87,SUSE-SLE-Module-Basesystem-15-SP4-2024-87,SUSE-SLE-Module-Basesystem-15-SP5-2024-87,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-87,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-87,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-87,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-87,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-87,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-87,SUSE-SLE-Product-RT-15-SP4-2024-87,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-87,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-87,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-87,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-87,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-87,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-87,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-87,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-87,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-87,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-87,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-87,SUSE-Storage-7.1-2024-87,openSUSE-SLE-15.4-2024-87,openSUSE-SLE-15.5-2024-87 SKIP SUSE-RU-2024:0088-1 as openSUSE-SLE-15.5-2024-88 is not security or has no CVEs. patches: SUSE-2024-88,SUSE-SLE-INSTALLER-15-SP4-2024-88,SUSE-SLE-INSTALLER-15-SP5-2024-88,SUSE-SLE-Micro-5.3-2024-88,SUSE-SLE-Micro-5.4-2024-88,SUSE-SLE-Micro-5.5-2024-88,SUSE-SLE-Module-Basesystem-15-SP5-2024-88,SUSE-SLE-Module-Development-Tools-15-SP5-2024-88,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-88,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-88,SUSE-SLE-Product-RT-15-SP4-2024-88,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-88,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-88,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-88,openSUSE-Leap-Micro-5.3-2024-88,openSUSE-Leap-Micro-5.4-2024-88,openSUSE-SLE-15.5-2024-88 SKIP SUSE-RU-2024:0093-1 as openSUSE-SLE-15.5-2024-93 is not security or has no CVEs. patches: SUSE-2024-93,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-93,openSUSE-SLE-15.4-2024-93,openSUSE-SLE-15.5-2024-93 SKIP SUSE-RU-2024:0094-1 as openSUSE-SLE-15.5-2024-94 is not security or has no CVEs. patches: SUSE-2024-94,openSUSE-SLE-15.4-2024-94,openSUSE-SLE-15.5-2024-94 SKIP SUSE-RU-2024:0095-1 as openSUSE-SLE-15.5-2024-95 is not security or has no CVEs. patches: SUSE-2024-95,SUSE-SLE-Module-Development-Tools-15-SP4-2024-95,SUSE-SLE-Module-Development-Tools-15-SP5-2024-95,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-95,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-95,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-95,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-95,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-95,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-95,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-95,SUSE-Storage-7.1-2024-95,openSUSE-SLE-15.4-2024-95,openSUSE-SLE-15.5-2024-95 SKIP SUSE-RU-2024:0096-1 as openSUSE-SLE-15.5-2024-96 is not security or has no CVEs. patches: SUSE-2024-96,SUSE-SLE-Module-Development-Tools-15-SP4-2024-96,SUSE-SLE-Module-Development-Tools-15-SP5-2024-96,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-96,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-96,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-96,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-96,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-96,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-96,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-96,SUSE-Storage-7.1-2024-96,openSUSE-SLE-15.4-2024-96,openSUSE-SLE-15.5-2024-96 SKIP SUSE-RU-2024:0097-1 as openSUSE-SLE-15.5-2024-97 is not security or has no CVEs. patches: SUSE-2024-97,SUSE-SLE-Module-Basesystem-15-SP4-2024-97,SUSE-SLE-Module-Basesystem-15-SP5-2024-97,SUSE-SLE-Module-Development-Tools-15-SP4-2024-97,SUSE-SLE-Module-Development-Tools-15-SP5-2024-97,SUSE-SLE-Module-Web-Scripting-15-SP4-2024-97,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-97,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-97,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-97,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-97,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-97,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-97,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-97,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-97,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-97,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-97,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-97,SUSE-Storage-7.1-2024-97,openSUSE-SLE-15.4-2024-97,openSUSE-SLE-15.5-2024-97 SKIP SUSE-RU-2024:0098-1 as openSUSE-SLE-15.5-2024-98 is not security or has no CVEs. patches: SUSE-2024-98,SUSE-SLE-Micro-5.3-2024-98,SUSE-SLE-Micro-5.4-2024-98,SUSE-SLE-Module-Basesystem-15-SP4-2024-98,SUSE-SLE-Module-Basesystem-15-SP5-2024-98,SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-98,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-98,SUSE-SLE-Module-Development-Tools-15-SP4-2024-98,SUSE-SLE-Module-Development-Tools-15-SP5-2024-98,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-98,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-98,SUSE-SLE-Product-WE-15-SP4-2024-98,SUSE-SLE-Product-WE-15-SP5-2024-98,openSUSE-Leap-Micro-5.3-2024-98,openSUSE-Leap-Micro-5.4-2024-98,openSUSE-SLE-15.4-2024-98,openSUSE-SLE-15.5-2024-98 SKIP SUSE-RU-2024:0099-1 as openSUSE-SLE-15.5-2024-99 is not security or has no CVEs. patches: SUSE-2024-99,SUSE-SLE-Module-Development-Tools-15-SP5-2024-99,openSUSE-SLE-15.5-2024-99 SKIP SUSE-RU-2024:0101-1 as SUSE-SLE-SERVER-12-SP5-2024-101 is not security or has no CVEs. patches: SUSE-2024-101,SUSE-SLE-SERVER-12-SP5-2024-101 SKIP SUSE-RU-2024:0105-1 as openSUSE-SLE-15.5-2024-105 is not security or has no CVEs. patches: SUSE-2024-105,SUSE-SLE-Micro-5.3-2024-105,SUSE-SLE-Micro-5.4-2024-105,SUSE-SLE-Micro-5.5-2024-105,SUSE-SLE-Module-Basesystem-15-SP5-2024-105,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-105,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-105,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-105,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-105,SUSE-SLE-Product-RT-15-SP4-2024-105,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-105,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-105,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-105,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-105,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-105,openSUSE-Leap-Micro-5.3-2024-105,openSUSE-Leap-Micro-5.4-2024-105,openSUSE-SLE-15.5-2024-105 SKIP SUSE-RU-2024:0107-1 as openSUSE-SLE-15.5-2024-107 is not security or has no CVEs. patches: SUSE-2024-107,SUSE-SLE-INSTALLER-15-SP5-2024-107,openSUSE-SLE-15.5-2024-107 SKIP SUSE-RU-2024:0108-1 as openSUSE-SLE-15.5-2024-108 is not security or has no CVEs. patches: SUSE-2024-108,SUSE-SLE-Module-Server-Applications-15-SP5-2024-108,SUSE-SLE-Product-RT-15-SP4-2024-108,openSUSE-SLE-15.5-2024-108 SKIP SUSE-RU-2024:0108-2 as SUSE-Storage-7.1-2024-108 is not security or has no CVEs. patches: SUSE-2024-108,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-108,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-108,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-108,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-108,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-108,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-108,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-108,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-108,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-108,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-108,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-108,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-108,SUSE-Storage-7.1-2024-108 SKIP SUSE-RU-2024:0122-1 as SUSE-SUSE-MicroOS-5.2-2024-122 is not security or has no CVEs. patches: SUSE-2024-122,SUSE-SUSE-MicroOS-5.2-2024-122 SKIP SUSE-RU-2024:0123-1 as SUSE-SUSE-MicroOS-5.1-2024-123 is not security or has no CVEs. patches: SUSE-2024-123,SUSE-SUSE-MicroOS-5.1-2024-123 SKIP SUSE-RU-2024:0124-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-124 is not security or has no CVEs. patches: SUSE-2024-124,SUSE-SLE-Micro-5.5-2024-124,SUSE-SLE-Module-Basesystem-15-SP5-2024-124 SKIP SUSE-RU-2024:0125-1 as openSUSE-Leap-Micro-5.4-2024-125 is not security or has no CVEs. patches: SUSE-2024-125,SUSE-SLE-Micro-5.3-2024-125,SUSE-SLE-Micro-5.4-2024-125,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-125,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-125,SUSE-SLE-Product-RT-15-SP4-2024-125,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-125,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-125,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-125,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-125,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-125,openSUSE-Leap-Micro-5.3-2024-125,openSUSE-Leap-Micro-5.4-2024-125 SKIP SUSE-RU-2024:0126-1 as SUSE-Storage-7.1-2024-126 is not security or has no CVEs. patches: SUSE-2024-126,SUSE-SLE-INSTALLER-15-SP1-2024-126,SUSE-SLE-INSTALLER-15-SP2-2024-126,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-126,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-126,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-126,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-126,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-126,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-126,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-126,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-126,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-126,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-126,SUSE-Storage-7.1-2024-126 SKIP SUSE-RU-2024:0127-1 as openSUSE-SLE-15.5-2024-127 is not security or has no CVEs. patches: SUSE-2024-127,SUSE-SLE-Module-Public-Cloud-15-SP1-2024-127,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-127,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-127,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-127,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-127,openSUSE-SLE-15.5-2024-127 SKIP SUSE-RU-2024:0130-1 as SUSE-SLE-Module-Public-Cloud-12-2024-130 is not security or has no CVEs. patches: SUSE-2024-130,SUSE-SLE-Module-Public-Cloud-12-2024-130 SKIP SUSE-RU-2024:0131-1 as openSUSE-SLE-15.5-2024-131 is not security or has no CVEs. patches: SUSE-2024-131,SUSE-SLE-Module-Server-Applications-15-SP5-2024-131,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-131,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-131,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-131,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-131,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-131,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-131,SUSE-SLE-Product-RT-15-SP4-2024-131,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-131,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-131,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-131,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-131,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-131,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-131,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-131,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-131,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-131,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-131,SUSE-Storage-7.1-2024-131,openSUSE-SLE-15.5-2024-131 SKIP SUSE-RU-2024:0132-1 as SUSE-SLE-WE-12-SP5-2024-132 is not security or has no CVEs. patches: SUSE-2024-132,SUSE-SLE-SDK-12-SP5-2024-132,SUSE-SLE-SERVER-12-SP5-2024-132,SUSE-SLE-WE-12-SP5-2024-132 SKIP SUSE-RU-2024:0133-1 as SUSE-SLE-Module-Public-Cloud-12-2024-133 is not security or has no CVEs. patches: SUSE-2024-133,SUSE-SLE-Module-Public-Cloud-12-2024-133 SKIP SUSE-RU-2024:0134-1 as SUSE-SLE-Module-Public-Cloud-12-2024-134 is not security or has no CVEs. patches: SUSE-2024-134,SUSE-SLE-Module-Public-Cloud-12-2024-134 SKIP SUSE-RU-2024:0139-1 as openSUSE-SLE-15.5-2024-139 is not security or has no CVEs. patches: SUSE-2024-139,SUSE-SLE-Module-Containers-15-SP4-2024-139,SUSE-SLE-Module-Containers-15-SP5-2024-139,SUSE-SLE-Module-Development-Tools-15-SP5-2024-139,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-139,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-139,SUSE-SLE-Product-RT-15-SP4-2024-139,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-139,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-139,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-139,openSUSE-SLE-15.5-2024-139 SKIP SUSE-RU-2024:0142-1 as openSUSE-SLE-15.5-2024-142 is not security or has no CVEs. patches: SUSE-2024-142,SUSE-SLE-Module-Development-Tools-15-SP5-2024-142,SUSE-SLE-Product-RT-15-SP4-2024-142,openSUSE-SLE-15.5-2024-142 SKIP SUSE-RU-2024:0143-1 as openSUSE-SLE-15.5-2024-143 is not security or has no CVEs. patches: SUSE-2024-143,SUSE-SLE-Micro-5.5-2024-143,SUSE-SLE-Module-Basesystem-15-SP5-2024-143,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-143,openSUSE-SLE-15.5-2024-143 SKIP SUSE-RU-2024:0144-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-144 is not security or has no CVEs. patches: SUSE-2024-144,SUSE-SLE-Module-Basesystem-15-SP5-2024-144 SKIP SUSE-RU-2024:0145-1 as openSUSE-SLE-15.5-2024-145 is not security or has no CVEs. patches: SUSE-2024-145,SUSE-SLE-Micro-5.5-2024-145,SUSE-SLE-Module-Basesystem-15-SP5-2024-145,openSUSE-SLE-15.5-2024-145 SKIP SUSE-RU-2024:0145-2 as SUSE-SLE-Micro-5.5-2024-145 is not security or has no CVEs. patches: SUSE-2024-145,SUSE-SLE-Micro-5.5-2024-145 SKIP SUSE-RU-2024:0146-1 as openSUSE-Leap-Micro-5.4-2024-146 is not security or has no CVEs. patches: SUSE-2024-146,SUSE-SLE-Micro-5.3-2024-146,SUSE-SLE-Micro-5.4-2024-146,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-146,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-146,SUSE-SLE-Product-RT-15-SP4-2024-146,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-146,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-146,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-146,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-146,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-146,openSUSE-Leap-Micro-5.3-2024-146,openSUSE-Leap-Micro-5.4-2024-146 SKIP SUSE-RU-2024:0147-1 as SUSE-SLE-Micro-5.5-2024-147 is not security or has no CVEs. patches: SUSE-2024-147,SUSE-SLE-Micro-5.5-2024-147 SKIP SUSE-RU-2024:0147-2 as SUSE-SLE-Micro-5.5-2024-147 is not security or has no CVEs. patches: SUSE-2024-147,SUSE-SLE-Micro-5.5-2024-147 SKIP SUSE-RU-2024:0149-1 as SUSE-SLE-Micro-5.5-2024-149 is not security or has no CVEs. patches: SUSE-2024-149,SUSE-SLE-Micro-5.5-2024-149 SKIP SUSE-RU-2024:0150-1 as openSUSE-Leap-Micro-5.4-2024-150 is not security or has no CVEs. patches: SUSE-2024-150,SUSE-SLE-Micro-5.4-2024-150,openSUSE-Leap-Micro-5.4-2024-150 SKIP SUSE-RU-2024:0151-1 as openSUSE-Leap-Micro-5.3-2024-151 is not security or has no CVEs. patches: SUSE-2024-151,SUSE-SLE-Micro-5.3-2024-151,openSUSE-Leap-Micro-5.3-2024-151 SKIP SUSE-RU-2024:0152-1 as openSUSE-SLE-15.5-2024-152 is not security or has no CVEs. patches: SUSE-2024-152,SUSE-SLE-Module-HPC-15-SP5-2024-152,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-152,openSUSE-SLE-15.5-2024-152 SKIP SUSE-RU-2024:0159-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-159 is not security or has no CVEs. patches: SUSE-2024-159,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-159,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-159,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-159 SKIP SUSE-RU-2024:0161-1 as openSUSE-SLE-15.5-2024-161 is not security or has no CVEs. patches: SUSE-2024-161,SUSE-SLE-Micro-5.5-2024-161,SUSE-SLE-Module-Basesystem-15-SP5-2024-161,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-161,SUSE-SLE-Module-Server-Applications-15-SP5-2024-161,openSUSE-SLE-15.5-2024-161 SKIP SUSE-RU-2024:0161-2 as SUSE-SLE-Micro-5.5-2024-161 is not security or has no CVEs. patches: SUSE-2024-161,SUSE-SLE-Micro-5.5-2024-161 SKIP SUSE-RU-2024:0162-1 as openSUSE-SLE-15.5-2024-162 is not security or has no CVEs. patches: SUSE-2024-162,openSUSE-SLE-15.5-2024-162 SKIP SUSE-RU-2024:0163-1 as openSUSE-SLE-15.5-2024-163 is not security or has no CVEs. patches: SUSE-2024-163,SUSE-SLE-Module-Development-Tools-15-SP4-2024-163,SUSE-SLE-Module-Development-Tools-15-SP5-2024-163,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-163,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-163,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-163,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-163,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-163,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-163,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-163,SUSE-Storage-7.1-2024-163,openSUSE-SLE-15.4-2024-163,openSUSE-SLE-15.5-2024-163 SKIP SUSE-RU-2024:0164-1 as SUSE-Storage-7.1-2024-164 is not security or has no CVEs. patches: SUSE-2024-164,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-164,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-164,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-164,SUSE-SUSE-MicroOS-5.1-2024-164,SUSE-SUSE-MicroOS-5.2-2024-164,SUSE-Storage-7.1-2024-164 SKIP SUSE-RU-2024:0169-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-169 is not security or has no CVEs. patches: SUSE-2024-169,SUSE-SLE-Micro-5.3-2024-169,SUSE-SLE-Micro-5.4-2024-169,SUSE-SLE-Module-Basesystem-15-SP5-2024-169,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-169,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-169,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-169,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-169,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-169,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-169,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-169,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-169 SKIP SUSE-RU-2024:0171-1 as SUSE-SLE-SERVER-12-SP5-2024-171 is not security or has no CVEs. patches: SUSE-2024-171,SUSE-SLE-SERVER-12-SP5-2024-171 SKIP SUSE-RU-2024:0173-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-173 is not security or has no CVEs. patches: SUSE-2024-173,SUSE-SLE-Micro-5.5-2024-173,SUSE-SLE-Module-Basesystem-15-SP5-2024-173 SKIP SUSE-RU-2024:0174-1 as SUSE-SLE-SERVER-12-SP5-2024-174 is not security or has no CVEs. patches: SUSE-2024-174,SUSE-SLE-SERVER-12-SP5-2024-174 SKIP SUSE-RU-2024:0175-1 as SUSE-SUSE-MicroOS-5.1-2024-175 is not security or has no CVEs. patches: SUSE-2024-175,SUSE-SUSE-MicroOS-5.1-2024-175 SKIP SUSE-RU-2024:0176-1 as SUSE-SUSE-MicroOS-5.2-2024-176 is not security or has no CVEs. patches: SUSE-2024-176,SUSE-SUSE-MicroOS-5.2-2024-176 SKIP SUSE-RU-2024:0179-1 as SUSE-SLE-SERVER-12-SP5-2024-179 is not security or has no CVEs. patches: SUSE-2024-179,SUSE-SLE-SDK-12-SP5-2024-179,SUSE-SLE-SERVER-12-SP5-2024-179 SKIP SUSE-RU-2024:0180-1 as SUSE-SLE-SERVER-12-SP5-2024-180 is not security or has no CVEs. patches: SUSE-2024-180,SUSE-SLE-SERVER-12-SP5-2024-180 SKIP SUSE-RU-2024:0181-1 as SUSE-SLE-SERVER-12-SP5-2024-181 is not security or has no CVEs. patches: SUSE-2024-181,SUSE-SLE-SDK-12-SP5-2024-181,SUSE-SLE-SERVER-12-SP5-2024-181 SKIP SUSE-RU-2024:0186-1 as SUSE-SLE-WE-12-SP5-2024-186 is not security or has no CVEs. patches: SUSE-2024-186,SUSE-SLE-Module-Public-Cloud-12-2024-186,SUSE-SLE-SDK-12-SP5-2024-186,SUSE-SLE-SERVER-12-SP5-2024-186,SUSE-SLE-WE-12-SP5-2024-186 SKIP SUSE-RU-2024:0187-1 as openSUSE-SLE-15.5-2024-187 is not security or has no CVEs. patches: SUSE-2024-187,SUSE-SLE-Micro-5.3-2024-187,SUSE-SLE-Micro-5.4-2024-187,SUSE-SLE-Micro-5.5-2024-187,SUSE-SLE-Module-Basesystem-15-SP5-2024-187,SUSE-SUSE-MicroOS-5.1-2024-187,SUSE-SUSE-MicroOS-5.2-2024-187,openSUSE-Leap-Micro-5.3-2024-187,openSUSE-Leap-Micro-5.4-2024-187,openSUSE-SLE-15.5-2024-187 SKIP SUSE-RU-2024:0188-1 as openSUSE-Leap-Micro-5.4-2024-188 is not security or has no CVEs. patches: SUSE-2024-188,SUSE-SLE-Micro-5.3-2024-188,SUSE-SLE-Micro-5.4-2024-188,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-188,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-188,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-188,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-188,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-188,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-188,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-188,openSUSE-Leap-Micro-5.3-2024-188,openSUSE-Leap-Micro-5.4-2024-188 SKIP SUSE-RU-2024:0189-1 as SUSE-Storage-7.1-2024-189 is not security or has no CVEs. patches: SUSE-2024-189,SUSE-SLE-INSTALLER-15-SP1-2024-189,SUSE-SLE-INSTALLER-15-SP2-2024-189,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-189,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-189,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-189,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-189,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-189,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-189,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-189,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-189,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-189,SUSE-Storage-7.1-2024-189 ERROR: notice SUSE-RU-2024:0192-1 has no valid patches out of: SUSE-2024-192,SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-192 SKIP SUSE-RU-2024:0194-1 as SUSE-EL-9-CLIENT-TOOLS-BETA-2024-194 is not security or has no CVEs. patches: SUSE-2024-194,SUSE-EL-9-CLIENT-TOOLS-BETA-2024-194 ERROR: notice SUSE-RU-2024:0197-1 has no valid patches out of: SUSE-2024-197,SUSE-Debian-12-CLIENT-TOOLS-BETA-2024-197 ERROR: notice SUSE-RU-2024:0198-1 has no valid patches out of: SUSE-2024-198,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-198 ERROR: notice SUSE-RU-2024:0199-1 has no valid patches out of: SUSE-2024-199,SUSE-Debian-11-CLIENT-TOOLS-BETA-2024-199 SKIP SUSE-RU-2024:0201-1 as openSUSE-SLE-15.5-2024-201 is not security or has no CVEs. patches: SUSE-2024-201,SUSE-SLE-Module-Basesystem-15-SP4-2024-201,SUSE-SLE-Module-Basesystem-15-SP5-2024-201,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-201,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-201,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-201,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-201,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-201,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-201,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-201,SUSE-Storage-7.1-2024-201,openSUSE-SLE-15.4-2024-201,openSUSE-SLE-15.5-2024-201 SKIP SUSE-RU-2024:0202-1 as openSUSE-SLE-15.5-2024-202 is not security or has no CVEs. patches: SUSE-2024-202,SUSE-SLE-Module-Basesystem-15-SP5-2024-202,SUSE-SLE-Module-Server-Applications-15-SP5-2024-202,openSUSE-SLE-15.5-2024-202 SKIP SUSE-RU-2024:0213-1 as openSUSE-SLE-15.5-2024-213 is not security or has no CVEs. patches: SUSE-2024-213,SUSE-SLE-Module-Basesystem-15-SP5-2024-213,openSUSE-SLE-15.5-2024-213 SKIP SUSE-RU-2024:0214-1 as openSUSE-SLE-15.5-2024-214 is not security or has no CVEs. patches: SUSE-2024-214,SUSE-SLE-Micro-5.3-2024-214,SUSE-SLE-Micro-5.4-2024-214,SUSE-SLE-Micro-5.5-2024-214,SUSE-SLE-Module-Basesystem-15-SP5-2024-214,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-214,openSUSE-Leap-Micro-5.3-2024-214,openSUSE-Leap-Micro-5.4-2024-214,openSUSE-SLE-15.5-2024-214 SKIP SUSE-RU-2024:0214-2 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-214 is not security or has no CVEs. patches: SUSE-2024-214,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-214,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-214,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-214,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-214,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-214,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-214,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-214 SKIP SUSE-RU-2024:0214-3 as SUSE-SLE-Micro-5.5-2024-214 is not security or has no CVEs. patches: SUSE-2024-214,SUSE-SLE-Micro-5.5-2024-214 SKIP SUSE-RU-2024:0215-1 as openSUSE-SLE-15.4-2024-215 is not security or has no CVEs. patches: SUSE-2024-215,SUSE-SLE-Product-HA-15-SP4-2024-215,openSUSE-SLE-15.4-2024-215 SKIP SUSE-RU-2024:0216-1 as openSUSE-SLE-15.5-2024-216 is not security or has no CVEs. patches: SUSE-2024-216,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-216,openSUSE-SLE-15.5-2024-216 SKIP SUSE-RU-2024:0217-1 as openSUSE-Leap-Micro-5.4-2024-217 is not security or has no CVEs. patches: SUSE-2024-217,SUSE-SLE-Micro-5.3-2024-217,SUSE-SLE-Micro-5.4-2024-217,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-217,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-217,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-217,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-217,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-217,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-217,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-217,openSUSE-Leap-Micro-5.3-2024-217,openSUSE-Leap-Micro-5.4-2024-217 SKIP SUSE-RU-2024:0218-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-218 is not security or has no CVEs. patches: SUSE-2024-218,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-218,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-218,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-218,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-218,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-218,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-218,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-218 SKIP SUSE-RU-2024:0219-1 as openSUSE-SLE-15.5-2024-219 is not security or has no CVEs. patches: SUSE-2024-219,SUSE-SLE-Module-Basesystem-15-SP5-2024-219,SUSE-SLE-Module-Server-Applications-15-SP5-2024-219,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-219,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-219,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-219,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-219,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-219,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-219,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-219,openSUSE-SLE-15.5-2024-219 SKIP SUSE-RU-2024:0220-1 as openSUSE-SLE-15.5-2024-220 is not security or has no CVEs. patches: SUSE-2024-220,SUSE-SLE-INSTALLER-15-SP5-2024-220,SUSE-SLE-Module-Basesystem-15-SP5-2024-220,openSUSE-SLE-15.5-2024-220 SKIP SUSE-RU-2024:0221-1 as SUSE-Storage-7.1-2024-221 is not security or has no CVEs. patches: SUSE-2024-221,SUSE-SLE-INSTALLER-15-SP3-2024-221,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-221,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-221,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-221,SUSE-Storage-7.1-2024-221 SKIP SUSE-RU-2024:0222-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-222 is not security or has no CVEs. patches: SUSE-2024-222,SUSE-SLE-INSTALLER-15-SP2-2024-222,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-222,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-222,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-222 SKIP SUSE-RU-2024:0223-1 as openSUSE-SLE-15.5-2024-223 is not security or has no CVEs. patches: SUSE-2024-223,SUSE-SLE-Module-Server-Applications-15-SP5-2024-223,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-223,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-223,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-223,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-223,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-223,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-223,SUSE-SLE-Product-RT-15-SP4-2024-223,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-223,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-223,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-223,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-223,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-223,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-223,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-223,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-223,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-223,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-223,SUSE-Storage-7.1-2024-223,openSUSE-SLE-15.5-2024-223 SKIP SUSE-RU-2024:0225-1 as openSUSE-SLE-15.5-2024-225 is not security or has no CVEs. patches: SUSE-2024-225,SUSE-SLE-Module-Development-Tools-15-SP5-2024-225,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-225,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-225,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-225,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-225,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-225,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-225,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-225,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-225,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-225,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-225,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-225,SUSE-Storage-7.1-2024-225,openSUSE-SLE-15.5-2024-225 SKIP SUSE-RU-2024:0226-1 as openSUSE-SLE-15.5-2024-226 is not security or has no CVEs. patches: SUSE-2024-226,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-226,openSUSE-SLE-15.5-2024-226 SKIP SUSE-RU-2024:0227-1 as openSUSE-SLE-15.5-2024-227 is not security or has no CVEs. patches: SUSE-2024-227,openSUSE-SLE-15.5-2024-227 SKIP SUSE-RU-2024:0230-1 as openSUSE-SLE-15.5-2024-230 is not security or has no CVEs. patches: SUSE-2024-230,SUSE-SLE-Module-Basesystem-15-SP5-2024-230,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-230,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-230,SUSE-SLE-Product-RT-15-SP4-2024-230,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-230,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-230,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-230,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-230,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-230,openSUSE-SLE-15.5-2024-230 SKIP SUSE-RU-2024:0231-1 as openSUSE-SLE-15.5-2024-231 is not security or has no CVEs. patches: SUSE-2024-231,SUSE-SLE-Micro-5.5-2024-231,SUSE-SLE-Module-Basesystem-15-SP5-2024-231,openSUSE-SLE-15.5-2024-231 SKIP SUSE-RU-2024:0232-1 as SUSE-Storage-7.1-2024-232 is not security or has no CVEs. patches: SUSE-2024-232,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-232,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-232,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-232,SUSE-SUSE-MicroOS-5.1-2024-232,SUSE-SUSE-MicroOS-5.2-2024-232,SUSE-Storage-7.1-2024-232 SKIP SUSE-RU-2024:0233-1 as openSUSE-Leap-Micro-5.4-2024-233 is not security or has no CVEs. patches: SUSE-2024-233,SUSE-SLE-Micro-5.3-2024-233,SUSE-SLE-Micro-5.4-2024-233,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-233,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-233,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-233,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-233,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-233,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-233,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-233,openSUSE-Leap-Micro-5.3-2024-233,openSUSE-Leap-Micro-5.4-2024-233 SKIP SUSE-RU-2024:0234-1 as openSUSE-SLE-15.5-2024-234 is not security or has no CVEs. patches: SUSE-2024-234,SUSE-SLE-Micro-5.5-2024-234,SUSE-SLE-Module-Basesystem-15-SP5-2024-234,openSUSE-SLE-15.5-2024-234 SKIP SUSE-RU-2024:0235-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-235 is not security or has no CVEs. patches: SUSE-2024-235,SUSE-SLE-INSTALLER-15-SP4-2024-235,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-235,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-235,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-235,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-235,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-235,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-235,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-235 SKIP SUSE-RU-2024:0237-1 as openSUSE-SLE-15.5-2024-237 is not security or has no CVEs. patches: SUSE-2024-237,SUSE-SLE-Module-Basesystem-15-SP5-2024-237,openSUSE-SLE-15.5-2024-237 SKIP SUSE-RU-2024:0243-1 as openSUSE-Leap-Micro-5.4-2024-243 is not security or has no CVEs. patches: SUSE-2024-243,SUSE-SLE-Micro-5.3-2024-243,SUSE-SLE-Micro-5.4-2024-243,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-243,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-243,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-243,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-243,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-243,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-243,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-243,openSUSE-Leap-Micro-5.3-2024-243,openSUSE-Leap-Micro-5.4-2024-243 SKIP SUSE-RU-2024:0244-1 as openSUSE-SLE-15.5-2024-244 is not security or has no CVEs. patches: SUSE-2024-244,SUSE-SLE-Micro-5.5-2024-244,SUSE-SLE-Module-Basesystem-15-SP5-2024-244,SUSE-SLE-Module-Server-Applications-15-SP5-2024-244,openSUSE-SLE-15.5-2024-244 SKIP SUSE-RU-2024:0245-1 as openSUSE-SLE-15.5-2024-245 is not security or has no CVEs. patches: SUSE-2024-245,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-245,openSUSE-SLE-15.5-2024-245 SKIP SUSE-RU-2024:0246-1 as openSUSE-SLE-15.5-2024-246 is not security or has no CVEs. patches: SUSE-2024-246,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-246,SUSE-SLE-Product-WE-15-SP5-2024-246,openSUSE-SLE-15.5-2024-246 SKIP SUSE-RU-2024:0254-1 as openSUSE-SLE-15.5-2024-254 is not security or has no CVEs. patches: SUSE-2024-254,SUSE-SLE-Micro-5.3-2024-254,SUSE-SLE-Micro-5.4-2024-254,SUSE-SLE-Micro-5.5-2024-254,SUSE-SLE-Module-Containers-15-SP4-2024-254,SUSE-SLE-Module-Containers-15-SP5-2024-254,SUSE-SUSE-MicroOS-5.1-2024-254,SUSE-SUSE-MicroOS-5.2-2024-254,openSUSE-Leap-Micro-5.3-2024-254,openSUSE-Leap-Micro-5.4-2024-254,openSUSE-SLE-15.5-2024-254 SKIP SUSE-RU-2024:0254-2 as SUSE-SLE-Module-Containers-15-SP4-2024-254 is not security or has no CVEs. patches: SUSE-2024-254,SUSE-SLE-Module-Containers-15-SP4-2024-254 SKIP SUSE-RU-2024:0255-1 as openSUSE-SLE-15.5-2024-255 is not security or has no CVEs. patches: SUSE-2024-255,SUSE-SLE-Micro-5.5-2024-255,SUSE-SLE-Module-Basesystem-15-SP5-2024-255,openSUSE-SLE-15.5-2024-255 SKIP SUSE-RU-2024:0257-1 as SUSE-SLE-Module-Public-Cloud-12-2024-257 is not security or has no CVEs. patches: SUSE-2024-257,SUSE-SLE-Module-Public-Cloud-12-2024-257 SKIP SUSE-RU-2024:0258-1 as openSUSE-SLE-15.5-2024-258 is not security or has no CVEs. patches: SUSE-2024-258,SUSE-SLE-Micro-5.3-2024-258,SUSE-SLE-Micro-5.4-2024-258,SUSE-SLE-Micro-5.5-2024-258,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-258,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-258,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-258,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-258,openSUSE-Leap-Micro-5.3-2024-258,openSUSE-Leap-Micro-5.4-2024-258,openSUSE-SLE-15.5-2024-258 SKIP SUSE-RU-2024:0259-1 as openSUSE-SLE-15.5-2024-259 is not security or has no CVEs. patches: SUSE-2024-259,SUSE-SLE-Product-HA-15-SP5-2024-259,openSUSE-SLE-15.5-2024-259 SKIP SUSE-RU-2024:0261-1 as openSUSE-Leap-Micro-5.4-2024-261 is not security or has no CVEs. patches: SUSE-2024-261,SUSE-SLE-Micro-5.3-2024-261,SUSE-SLE-Micro-5.4-2024-261,SUSE-SLE-Module-Containers-15-SP4-2024-261,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-261,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-261,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-261,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-261,openSUSE-Leap-Micro-5.3-2024-261,openSUSE-Leap-Micro-5.4-2024-261 SKIP SUSE-RU-2024:0261-2 as SUSE-SLE-Module-Containers-15-SP4-2024-261 is not security or has no CVEs. patches: SUSE-2024-261,SUSE-SLE-Module-Containers-15-SP4-2024-261 SKIP SUSE-RU-2024:0262-1 as openSUSE-SLE-15.5-2024-262 is not security or has no CVEs. patches: SUSE-2024-262,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-262,openSUSE-SLE-15.5-2024-262 SKIP SUSE-RU-2024:0263-1 as openSUSE-SLE-15.5-2024-263 is not security or has no CVEs. patches: SUSE-2024-263,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-263,openSUSE-SLE-15.5-2024-263 SKIP SUSE-RU-2024:0271-1 as SUSE-SLE-Product-HA-15-SP4-2024-271 is not security or has no CVEs. patches: SUSE-2024-271,SUSE-SLE-Product-HA-15-SP4-2024-271 SKIP SUSE-RU-2024:0272-1 as SUSE-SLE-Product-HA-15-SP3-2024-272 is not security or has no CVEs. patches: SUSE-2024-272,SUSE-SLE-Product-HA-15-SP3-2024-272 SKIP SUSE-RU-2024:0273-1 as openSUSE-SLE-15.5-2024-273 is not security or has no CVEs. patches: SUSE-2024-273,openSUSE-SLE-15.5-2024-273 SKIP SUSE-RU-2024:0276-1 as SUSE-SLE-Module-Public-Cloud-12-2024-276 is not security or has no CVEs. patches: SUSE-2024-276,SUSE-SLE-Module-Public-Cloud-12-2024-276 SKIP SUSE-RU-2024:0282-1 as openSUSE-SLE-15.5-2024-282 is not security or has no CVEs. patches: SUSE-2024-282,SUSE-SLE-Product-HA-15-SP1-2024-282,SUSE-SLE-Product-HA-15-SP2-2024-282,SUSE-SLE-Product-HA-15-SP3-2024-282,SUSE-SLE-Product-HA-15-SP4-2024-282,SUSE-SLE-Product-HA-15-SP5-2024-282,openSUSE-SLE-15.5-2024-282 SKIP SUSE-RU-2024:0285-1 as openSUSE-SLE-15.5-2024-285 is not security or has no CVEs. patches: SUSE-2024-285,SUSE-SLE-Micro-5.3-2024-285,SUSE-SLE-Micro-5.4-2024-285,SUSE-SLE-Micro-5.5-2024-285,SUSE-SLE-Module-Basesystem-15-SP5-2024-285,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-285,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-285,openSUSE-Leap-Micro-5.3-2024-285,openSUSE-Leap-Micro-5.4-2024-285,openSUSE-SLE-15.5-2024-285 SKIP SUSE-RU-2024:0285-2 as SUSE-SLE-Micro-5.5-2024-285 is not security or has no CVEs. patches: SUSE-2024-285,SUSE-SLE-Micro-5.5-2024-285 SKIP SUSE-RU-2024:0297-1 as SUSE-SLE-Micro-5.5-2024-297 is not security or has no CVEs. patches: SUSE-2024-297,SUSE-SLE-Micro-5.5-2024-297 SKIP SUSE-RU-2024:0302-1 as SUSE-SLE-Module-Public-Cloud-12-2024-302 is not security or has no CVEs. patches: SUSE-2024-302,SUSE-SLE-Module-Public-Cloud-12-2024-302 SKIP SUSE-RU-2024:0303-1 as openSUSE-SLE-15.5-2024-303 is not security or has no CVEs. patches: SUSE-2024-303,SUSE-SLE-Module-Basesystem-15-SP5-2024-303,SUSE-SLE-Module-Development-Tools-15-SP5-2024-303,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-303,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-303,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-303,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-303,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-303,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-303,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-303,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-303,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-303,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-303,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-303,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-303,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-303,SUSE-Storage-7.1-2024-303,openSUSE-SLE-15.5-2024-303 SKIP SUSE-RU-2024:0304-1 as SUSE-2024-304 is not security or has no CVEs. patches: SUSE-2024-304 SKIP SUSE-RU-2024:0306-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-306 is not security or has no CVEs. patches: SUSE-2024-306,SUSE-SLE-Micro-5.3-2024-306,SUSE-SLE-Micro-5.4-2024-306,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-306,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-306,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-306,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-306 SKIP SUSE-RU-2024:0316-1 as openSUSE-SLE-15.5-2024-316 is not security or has no CVEs. patches: SUSE-2024-316,SUSE-SLE-Module-Development-Tools-15-SP5-2024-316,openSUSE-SLE-15.5-2024-316 SKIP SUSE-RU-2024:0322-1 as openSUSE-SLE-15.5-2024-322 is not security or has no CVEs. patches: SUSE-2024-322,SUSE-SLE-Micro-5.3-2024-322,SUSE-SLE-Micro-5.4-2024-322,SUSE-SLE-Micro-5.5-2024-322,SUSE-SLE-Module-Basesystem-15-SP5-2024-322,SUSE-SLE-Module-Development-Tools-15-SP5-2024-322,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-322,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-322,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-322,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-322,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-322,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-322,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-322,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-322,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-322,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-322,SUSE-SUSE-MicroOS-5.2-2024-322,SUSE-Storage-7.1-2024-322,openSUSE-Leap-Micro-5.3-2024-322,openSUSE-Leap-Micro-5.4-2024-322,openSUSE-SLE-15.5-2024-322 SKIP SUSE-RU-2024:0324-1 as SUSE-SLE-SERVER-12-SP5-2024-324 is not security or has no CVEs. patches: SUSE-2024-324,SUSE-SLE-SERVER-12-SP5-2024-324 SKIP SUSE-RU-2024:0363-1 as openSUSE-SLE-15.5-2024-363 is not security or has no CVEs. patches: SUSE-2024-363,SUSE-SLE-Micro-5.5-2024-363,SUSE-SLE-Module-Basesystem-15-SP5-2024-363,openSUSE-SLE-15.5-2024-363 SKIP SUSE-RU-2024:0408-1 as openSUSE-SLE-15.5-2024-408 is not security or has no CVEs. patches: SUSE-2024-408,SUSE-SLE-Micro-5.5-2024-408,SUSE-SLE-Module-Containers-15-SP5-2024-408,openSUSE-SLE-15.5-2024-408 SKIP SUSE-RU-2024:0424-1 as openSUSE-SLE-15.5-2024-424 is not security or has no CVEs. patches: SUSE-2024-424,SUSE-SLE-Micro-5.3-2024-424,SUSE-SLE-Micro-5.4-2024-424,SUSE-SLE-Micro-5.5-2024-424,SUSE-SLE-Module-Basesystem-15-SP5-2024-424,openSUSE-Leap-Micro-5.3-2024-424,openSUSE-Leap-Micro-5.4-2024-424,openSUSE-SLE-15.5-2024-424 SKIP SUSE-RU-2024:0424-2 as SUSE-SLE-Micro-5.5-2024-424 is not security or has no CVEs. patches: SUSE-2024-424,SUSE-SLE-Micro-5.5-2024-424 SKIP SUSE-RU-2024:0425-1 as openSUSE-SLE-15.5-2024-425 is not security or has no CVEs. patches: SUSE-2024-425,SUSE-SLE-Module-Basesystem-15-SP5-2024-425,openSUSE-SLE-15.5-2024-425 SKIP SUSE-RU-2024:0425-2 as SUSE-Storage-7.1-2024-425 is not security or has no CVEs. patches: SUSE-2024-425,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-425,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-425,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-425,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-425,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-425,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-425,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-425,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-425,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-425,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-425,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-425,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-425,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-425,SUSE-Storage-7.1-2024-425 SKIP SUSE-RU-2024:0426-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-426 is not security or has no CVEs. patches: SUSE-2024-426,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-426,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-426,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-426,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-426,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-426,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-426 SKIP SUSE-RU-2024:0427-1 as openSUSE-SLE-15.5-2024-427 is not security or has no CVEs. patches: SUSE-2024-427,SUSE-SLE-Micro-5.3-2024-427,SUSE-SLE-Micro-5.4-2024-427,SUSE-SLE-Micro-5.5-2024-427,SUSE-SLE-Module-Basesystem-15-SP5-2024-427,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-427,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-427,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-427,SUSE-SLE-Product-RT-15-SP4-2024-427,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-427,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-427,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-427,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-427,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-427,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-427,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-427,SUSE-SUSE-MicroOS-5.1-2024-427,SUSE-SUSE-MicroOS-5.2-2024-427,SUSE-Storage-7.1-2024-427,openSUSE-Leap-Micro-5.3-2024-427,openSUSE-Leap-Micro-5.4-2024-427,openSUSE-SLE-15.5-2024-427 SKIP SUSE-RU-2024:0432-1 as openSUSE-SLE-15.5-2024-432 is not security or has no CVEs. patches: SUSE-2024-432,openSUSE-SLE-15.5-2024-432 SKIP SUSE-RU-2024:0433-1 as openSUSE-SLE-15.5-2024-433 is not security or has no CVEs. patches: SUSE-2024-433,SUSE-SLE-Module-Development-Tools-15-SP5-2024-433,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-433,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-433,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-433,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-433,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-433,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-433,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-433,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-433,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-433,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-433,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-433,SUSE-Storage-7.1-2024-433,openSUSE-SLE-15.5-2024-433 SKIP SUSE-RU-2024:0440-1 as openSUSE-SLE-15.5-2024-440 is not security or has no CVEs. patches: SUSE-2024-440,SUSE-SLE-Manager-Tools-For-Micro-5-2024-440,SUSE-SLE-Module-Basesystem-15-SP5-2024-440,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-440,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-440,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-440,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-440,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-440,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-440,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-440,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-440,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-440,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-440,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-440,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-440,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-440,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-440,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-440,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-440,SUSE-Storage-7.1-2024-440,openSUSE-SLE-15.5-2024-440 SKIP SUSE-RU-2024:0443-1 as openSUSE-SLE-15.5-2024-443 is not security or has no CVEs. patches: SUSE-2024-443,SUSE-SLE-Module-Development-Tools-15-SP5-2024-443,openSUSE-SLE-15.5-2024-443 SKIP SUSE-RU-2024:0446-1 as openSUSE-SLE-15.5-2024-446 is not security or has no CVEs. patches: SUSE-2024-446,openSUSE-SLE-15.5-2024-446 SKIP SUSE-RU-2024:0447-1 as openSUSE-SLE-15.5-2024-447 is not security or has no CVEs. patches: SUSE-2024-447,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-447,openSUSE-SLE-15.5-2024-447 SKIP SUSE-RU-2024:0448-1 as openSUSE-SLE-15.5-2024-448 is not security or has no CVEs. patches: SUSE-2024-448,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-448,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-448,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-448,openSUSE-SLE-15.5-2024-448 SKIP SUSE-RU-2024:0449-1 as openSUSE-SLE-15.5-2024-449 is not security or has no CVEs. patches: SUSE-2024-449,SUSE-SLE-Module-HPC-15-SP5-2024-449,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-449,openSUSE-SLE-15.5-2024-449 SKIP SUSE-RU-2024:0450-1 as openSUSE-SLE-15.5-2024-450 is not security or has no CVEs. patches: SUSE-2024-450,SUSE-SLE-Module-HPC-15-SP5-2024-450,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-450,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-450,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-450,openSUSE-SLE-15.5-2024-450 SKIP SUSE-RU-2024:0451-1 as openSUSE-SLE-15.5-2024-451 is not security or has no CVEs. patches: SUSE-2024-451,SUSE-SLE-Module-HPC-15-SP5-2024-451,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-451,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-451,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-451,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-451,openSUSE-SLE-15.5-2024-451 SKIP SUSE-RU-2024:0452-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-452 is not security or has no CVEs. patches: SUSE-2024-452,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-452 SKIP SUSE-RU-2024:0453-1 as openSUSE-SLE-15.5-2024-453 is not security or has no CVEs. patches: SUSE-2024-453,SUSE-SLE-Module-HPC-15-SP5-2024-453,openSUSE-SLE-15.5-2024-453 SKIP SUSE-RU-2024:0456-1 as openSUSE-SLE-15.5-2024-456 is not security or has no CVEs. patches: SUSE-2024-456,SUSE-SLE-Micro-5.5-2024-456,SUSE-SLE-Module-Basesystem-15-SP5-2024-456,SUSE-SLE-Module-Server-Applications-15-SP5-2024-456,openSUSE-SLE-15.5-2024-456 SKIP SUSE-RU-2024:0457-1 as openSUSE-SLE-15.5-2024-457 is not security or has no CVEs. patches: SUSE-2024-457,SUSE-SLE-Micro-5.3-2024-457,SUSE-SLE-Micro-5.4-2024-457,SUSE-SLE-Micro-5.5-2024-457,SUSE-SLE-Module-Development-Tools-15-SP5-2024-457,SUSE-SUSE-MicroOS-5.1-2024-457,SUSE-SUSE-MicroOS-5.2-2024-457,openSUSE-Leap-Micro-5.3-2024-457,openSUSE-Leap-Micro-5.4-2024-457,openSUSE-SLE-15.5-2024-457 SKIP SUSE-RU-2024:0458-1 as openSUSE-SLE-15.5-2024-458 is not security or has no CVEs. patches: SUSE-2024-458,SUSE-SLE-Manager-Tools-15-2024-458,SUSE-SLE-Micro-5.3-2024-458,SUSE-SLE-Micro-5.4-2024-458,SUSE-SLE-Micro-5.5-2024-458,SUSE-SLE-Module-Basesystem-15-SP5-2024-458,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-458,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-458,SUSE-SUSE-MicroOS-5.2-2024-458,openSUSE-Leap-Micro-5.3-2024-458,openSUSE-Leap-Micro-5.4-2024-458,openSUSE-SLE-15.5-2024-458 SKIP SUSE-RU-2024:0465-1 as openSUSE-SLE-15.5-2024-465 is not security or has no CVEs. patches: SUSE-2024-465,SUSE-SLE-Module-Basesystem-15-SP5-2024-465,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-465,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-465,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-465,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-465,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-465,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-465,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-465,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-465,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-465,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-465,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-465,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-465,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-465,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-465,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-465,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-465,SUSE-Storage-7.1-2024-465,openSUSE-SLE-15.5-2024-465 SKIP SUSE-RU-2024:0466-1 as openSUSE-SLE-15.5-2024-466 is not security or has no CVEs. patches: SUSE-2024-466,SUSE-SLE-Micro-5.3-2024-466,SUSE-SLE-Micro-5.4-2024-466,SUSE-SLE-Micro-5.5-2024-466,SUSE-SLE-Module-Basesystem-15-SP5-2024-466,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-466,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-466,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-466,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-466,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-466,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-466,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-466,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-466,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-466,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-466,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-466,SUSE-Storage-7.1-2024-466,openSUSE-Leap-Micro-5.3-2024-466,openSUSE-Leap-Micro-5.4-2024-466,openSUSE-SLE-15.5-2024-466 SKIP SUSE-RU-2024:0467-1 as openSUSE-SLE-15.5-2024-467 is not security or has no CVEs. patches: SUSE-2024-467,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-467,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-467,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-467,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-467,openSUSE-SLE-15.5-2024-467 SKIP SUSE-RU-2024:0470-1 as SUSE-SLE-Live-Patching-12-SP5-2024-470 is not security or has no CVEs. patches: SUSE-2024-470,SUSE-SLE-Live-Patching-12-2024-470,SUSE-SLE-Live-Patching-12-SP5-2024-470 SKIP SUSE-RU-2024:0471-1 as openSUSE-SLE-15.5-2024-471 is not security or has no CVEs. patches: SUSE-2024-471,SUSE-SLE-Module-Live-Patching-15-SP1-2024-471,SUSE-SLE-Module-Live-Patching-15-SP2-2024-471,SUSE-SLE-Module-Live-Patching-15-SP3-2024-471,SUSE-SLE-Module-Live-Patching-15-SP4-2024-471,SUSE-SLE-Module-Live-Patching-15-SP5-2024-471,openSUSE-SLE-15.5-2024-471 SKIP SUSE-RU-2024:0475-1 as SUSE-Storage-7.1-2024-475 is not security or has no CVEs. patches: SUSE-2024-475,SUSE-SLE-INSTALLER-15-SP2-2024-475,SUSE-SLE-INSTALLER-15-SP3-2024-475,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-475,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-475,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-475,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-475,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-475,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-475,SUSE-SUSE-MicroOS-5.1-2024-475,SUSE-SUSE-MicroOS-5.2-2024-475,SUSE-Storage-7.1-2024-475 SKIP SUSE-RU-2024:0477-1 as openSUSE-SLE-15.5-2024-477 is not security or has no CVEs. patches: SUSE-2024-477,SUSE-SLE-INSTALLER-15-SP5-2024-477,SUSE-SLE-Module-Basesystem-15-SP5-2024-477,openSUSE-SLE-15.5-2024-477 SKIP SUSE-RU-2024:0480-1 as openSUSE-SLE-15.5-2024-480 is not security or has no CVEs. patches: SUSE-2024-480,SUSE-SLE-INSTALLER-15-SP4-2024-480,SUSE-SLE-INSTALLER-15-SP5-2024-480,SUSE-SLE-Micro-5.3-2024-480,SUSE-SLE-Micro-5.4-2024-480,SUSE-SLE-Micro-5.5-2024-480,SUSE-SLE-Module-Basesystem-15-SP5-2024-480,SUSE-SLE-Module-Development-Tools-15-SP5-2024-480,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-480,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-480,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-480,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-480,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-480,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-480,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-480,openSUSE-Leap-Micro-5.3-2024-480,openSUSE-Leap-Micro-5.4-2024-480,openSUSE-SLE-15.5-2024-480 SKIP SUSE-RU-2024:0481-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-481 is not security or has no CVEs. patches: SUSE-2024-481,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-481 ERROR: notice SUSE-RU-2024:0490-1 has no valid patches out of: SUSE-2024-490,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2024-490 ERROR: notice SUSE-RU-2024:0491-1 has no valid patches out of: SUSE-2024-491,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-491 ERROR: notice SUSE-RU-2024:0492-1 has no valid patches out of: SUSE-2024-492,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-492 SKIP SUSE-RU-2024:0495-1 as SUSE-EL-9-CLIENT-TOOLS-2024-495 is not security or has no CVEs. patches: SUSE-2024-495,SUSE-EL-9-CLIENT-TOOLS-2024-495 SKIP SUSE-RU-2024:0496-1 as SUSE-SLE-Manager-Tools-12-2024-496 is not security or has no CVEs. patches: SUSE-2024-496,SUSE-SLE-Manager-Tools-12-2024-496 SKIP SUSE-RU-2024:0497-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-497 is not security or has no CVEs. patches: SUSE-2024-497,SUSE-SLE-Manager-Tools-15-2024-497,SUSE-SLE-Manager-Tools-For-Micro-5-2024-497,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-497,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-497 ERROR: notice SUSE-RU-2024:0500-1 has no valid patches out of: SUSE-2024-500,SUSE-Debian-10-CLIENT-TOOLS-x86_64-2024-500 ERROR: notice SUSE-RU-2024:0501-1 has no valid patches out of: SUSE-2024-501,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-501 ERROR: notice SUSE-RU-2024:0502-1 has no valid patches out of: SUSE-2024-502,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-502 SKIP SUSE-RU-2024:0505-1 as SUSE-EL-9-CLIENT-TOOLS-2024-505 is not security or has no CVEs. patches: SUSE-2024-505,SUSE-EL-9-CLIENT-TOOLS-2024-505 SKIP SUSE-RU-2024:0521-1 as SUSE-SLE-Product-SLES_SAP-15-SP1-2024-521 is not security or has no CVEs. patches: SUSE-2024-521,SUSE-SLE-INSTALLER-15-SP1-2024-521,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2024-521,SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-521,SUSE-SLE-Product-SLES-15-SP1-BCL-2024-521,SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-521,SUSE-SLE-Product-SLES_SAP-15-SP1-2024-521 SKIP SUSE-RU-2024:0527-1 as openSUSE-SLE-15.5-2024-527 is not security or has no CVEs. patches: SUSE-2024-527,SUSE-SLE-Micro-5.5-2024-527,SUSE-SLE-Module-Containers-15-SP5-2024-527,openSUSE-SLE-15.5-2024-527 SKIP SUSE-RU-2024:0527-2 as SUSE-SLE-Micro-5.5-2024-527 is not security or has no CVEs. patches: SUSE-2024-527,SUSE-SLE-Micro-5.5-2024-527 SKIP SUSE-RU-2024:0532-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-532 is not security or has no CVEs. patches: SUSE-2024-532,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-532,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-532 SKIP SUSE-RU-2024:0533-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-533 is not security or has no CVEs. patches: SUSE-2024-533,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-533,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-533 SKIP SUSE-RU-2024:0534-1 as openSUSE-SLE-15.5-2024-534 is not security or has no CVEs. patches: SUSE-2024-534,SUSE-SLE-Micro-5.3-2024-534,SUSE-SLE-Micro-5.4-2024-534,SUSE-SLE-Micro-5.5-2024-534,SUSE-SLE-Module-Public-Cloud-15-SP1-2024-534,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-534,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-534,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-534,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-534,openSUSE-SLE-15.5-2024-534 SKIP SUSE-RU-2024:0534-2 as SUSE-SLE-Micro-5.5-2024-534 is not security or has no CVEs. patches: SUSE-2024-534,SUSE-SLE-Micro-5.5-2024-534 SKIP SUSE-RU-2024:0535-1 as SUSE-SLE-Module-Public-Cloud-12-2024-535 is not security or has no CVEs. patches: SUSE-2024-535,SUSE-SLE-Module-Public-Cloud-12-2024-535 SKIP SUSE-RU-2024:0536-1 as openSUSE-SLE-15.5-2024-536 is not security or has no CVEs. patches: SUSE-2024-536,SUSE-SLE-Product-HA-15-SP5-2024-536,openSUSE-SLE-15.5-2024-536 SKIP SUSE-RU-2024:0537-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-537 is not security or has no CVEs. patches: SUSE-2024-537,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-537,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-537 SKIP SUSE-RU-2024:0547-1 as openSUSE-SLE-15.5-2024-547 is not security or has no CVEs. patches: SUSE-2024-547,SUSE-SLE-Module-Development-Tools-15-SP5-2024-547,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-547,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-547,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-547,openSUSE-SLE-15.5-2024-547 SKIP SUSE-RU-2024:0559-1 as openSUSE-SLE-15.5-2024-559 is not security or has no CVEs. patches: SUSE-2024-559,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-559,openSUSE-SLE-15.5-2024-559 SKIP SUSE-RU-2024:0561-1 as openSUSE-SLE-15.5-2024-561 is not security or has no CVEs. patches: SUSE-2024-561,SUSE-SLE-Module-Basesystem-15-SP5-2024-561,SUSE-SLE-Module-HPC-15-SP5-2024-561,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-561,openSUSE-SLE-15.5-2024-561 SKIP SUSE-RU-2024:0562-1 as openSUSE-SLE-15.5-2024-562 is not security or has no CVEs. patches: SUSE-2024-562,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-562,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-562,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-562,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-562,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-562,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-562,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-562,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-562,openSUSE-SLE-15.5-2024-562 SKIP SUSE-RU-2024:0563-1 as openSUSE-SLE-15.5-2024-563 is not security or has no CVEs. patches: SUSE-2024-563,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-563,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-563,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-563,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-563,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-563,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-563,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-563,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-563,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-563,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-563,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-563,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-563,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-563,SUSE-SLE-Product-WE-15-SP5-2024-563,SUSE-Storage-7.1-2024-563,openSUSE-SLE-15.5-2024-563 SKIP SUSE-RU-2024:0564-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-564 is not security or has no CVEs. patches: SUSE-2024-564,SUSE-SLE-Micro-5.5-2024-564,SUSE-SLE-Module-Basesystem-15-SP5-2024-564 SKIP SUSE-RU-2024:0565-1 as openSUSE-Leap-Micro-5.4-2024-565 is not security or has no CVEs. patches: SUSE-2024-565,SUSE-SLE-Micro-5.3-2024-565,SUSE-SLE-Micro-5.4-2024-565,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-565,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-565,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-565,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-565,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-565,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-565,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-565,openSUSE-Leap-Micro-5.3-2024-565,openSUSE-Leap-Micro-5.4-2024-565 SKIP SUSE-RU-2024:0566-1 as SUSE-SUSE-MicroOS-5.1-2024-566 is not security or has no CVEs. patches: SUSE-2024-566,SUSE-SUSE-MicroOS-5.1-2024-566 SKIP SUSE-RU-2024:0567-1 as SUSE-SUSE-MicroOS-5.2-2024-567 is not security or has no CVEs. patches: SUSE-2024-567,SUSE-SUSE-MicroOS-5.2-2024-567 SKIP SUSE-RU-2024:0568-1 as SUSE-SLE-SERVER-12-SP5-2024-568 is not security or has no CVEs. patches: SUSE-2024-568,SUSE-SLE-SERVER-12-SP5-2024-568 SKIP SUSE-RU-2024:0569-1 as SUSE-Storage-7.1-2024-569 is not security or has no CVEs. patches: SUSE-2024-569,SUSE-SLE-INSTALLER-15-SP2-2024-569,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-569,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-569,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-569,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-569,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-569,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-569,SUSE-Storage-7.1-2024-569 SKIP SUSE-RU-2024:0570-1 as openSUSE-SLE-15.5-2024-570 is not security or has no CVEs. patches: SUSE-2024-570,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-570,openSUSE-SLE-15.5-2024-570 SKIP SUSE-RU-2024:0571-1 as openSUSE-SLE-15.5-2024-571 is not security or has no CVEs. patches: SUSE-2024-571,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-571,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-571,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-571,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-571,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-571,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-571,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-571,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-571,SUSE-Storage-7.1-2024-571,openSUSE-SLE-15.5-2024-571 SKIP SUSE-RU-2024:0571-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-571 is not security or has no CVEs. patches: SUSE-2024-571,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-571 SKIP SUSE-RU-2024:0572-1 as openSUSE-SLE-15.5-2024-572 is not security or has no CVEs. patches: SUSE-2024-572,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-572,openSUSE-SLE-15.5-2024-572 SKIP SUSE-RU-2024:0575-1 as openSUSE-SLE-15.5-2024-575 is not security or has no CVEs. patches: SUSE-2024-575,SUSE-SLE-Module-Legacy-15-SP5-2024-575,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-575,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-575,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-575,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-575,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-575,openSUSE-SLE-15.5-2024-575 SKIP SUSE-RU-2024:0582-1 as openSUSE-SLE-15.5-2024-582 is not security or has no CVEs. patches: SUSE-2024-582,SUSE-SLE-Module-Development-Tools-15-SP5-2024-582,openSUSE-SLE-15.5-2024-582 SKIP SUSE-RU-2024:0583-1 as openSUSE-SLE-15.5-2024-583 is not security or has no CVEs. patches: SUSE-2024-583,SUSE-SLE-Micro-5.3-2024-583,SUSE-SLE-Micro-5.4-2024-583,SUSE-SLE-Micro-5.5-2024-583,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-583,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-583,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-583,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-583,openSUSE-Leap-Micro-5.3-2024-583,openSUSE-Leap-Micro-5.4-2024-583,openSUSE-SLE-15.5-2024-583 SKIP SUSE-RU-2024:0584-1 as SUSE-SLE-Module-Public-Cloud-12-2024-584 is not security or has no CVEs. patches: SUSE-2024-584,SUSE-SLE-Module-Public-Cloud-12-2024-584 SKIP SUSE-RU-2024:0588-1 as openSUSE-SLE-15.5-2024-588 is not security or has no CVEs. patches: SUSE-2024-588,SUSE-SLE-Micro-5.5-2024-588,SUSE-SLE-Module-Basesystem-15-SP5-2024-588,openSUSE-SLE-15.5-2024-588 SKIP SUSE-RU-2024:0598-1 as openSUSE-SLE-15.5-2024-598 is not security or has no CVEs. patches: SUSE-2024-598,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-598,openSUSE-SLE-15.5-2024-598 SKIP SUSE-RU-2024:0600-1 as SUSE-SLE-Manager-Tools-For-Micro-5-2024-600 is not security or has no CVEs. patches: SUSE-2024-600,SUSE-SLE-Manager-Tools-15-2024-600,SUSE-SLE-Manager-Tools-For-Micro-5-2024-600 SKIP SUSE-RU-2024:0606-1 as openSUSE-SLE-15.5-2024-606 is not security or has no CVEs. patches: SUSE-2024-606,SUSE-SLE-Product-HA-15-SP5-2024-606,openSUSE-SLE-15.5-2024-606 SKIP SUSE-RU-2024:0609-1 as openSUSE-SLE-15.5-2024-609 is not security or has no CVEs. patches: SUSE-2024-609,SUSE-SLE-Micro-5.5-2024-609,SUSE-SLE-Module-Basesystem-15-SP5-2024-609,SUSE-SLE-Module-Server-Applications-15-SP5-2024-609,openSUSE-SLE-15.5-2024-609 SKIP SUSE-RU-2024:0610-1 as openSUSE-Leap-Micro-5.4-2024-610 is not security or has no CVEs. patches: SUSE-2024-610,SUSE-SLE-Micro-5.4-2024-610,openSUSE-Leap-Micro-5.4-2024-610 SKIP SUSE-RU-2024:0614-1 as openSUSE-SLE-15.5-2024-614 is not security or has no CVEs. patches: SUSE-2024-614,SUSE-SLE-Micro-5.4-2024-614,SUSE-SLE-Micro-5.5-2024-614,SUSE-SLE-Module-Basesystem-15-SP5-2024-614,SUSE-SLE-Module-Development-Tools-15-SP5-2024-614,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-614,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-614,SUSE-SLE-Module-Python3-15-SP5-2024-614,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-614,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-614,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-614,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-614,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-614,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-614,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-614,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-614,openSUSE-Leap-Micro-5.4-2024-614,openSUSE-SLE-15.5-2024-614 SKIP SUSE-RU-2024:0615-1 as openSUSE-SLE-15.5-2024-615 is not security or has no CVEs. patches: SUSE-2024-615,SUSE-SLE-Micro-5.3-2024-615,SUSE-SLE-Micro-5.4-2024-615,SUSE-SLE-Micro-5.5-2024-615,SUSE-SLE-Module-Basesystem-15-SP5-2024-615,SUSE-SUSE-MicroOS-5.1-2024-615,SUSE-SUSE-MicroOS-5.2-2024-615,openSUSE-Leap-Micro-5.3-2024-615,openSUSE-Leap-Micro-5.4-2024-615,openSUSE-SLE-15.5-2024-615 SKIP SUSE-RU-2024:0615-2 as SUSE-SLE-Micro-5.5-2024-615 is not security or has no CVEs. patches: SUSE-2024-615,SUSE-SLE-Micro-5.5-2024-615 SKIP SUSE-RU-2024:0616-1 as openSUSE-SLE-15.5-2024-616 is not security or has no CVEs. patches: SUSE-2024-616,SUSE-SLE-Module-Basesystem-15-SP5-2024-616,openSUSE-SLE-15.5-2024-616 SKIP SUSE-RU-2024:0617-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-617 is not security or has no CVEs. patches: SUSE-2024-617,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-617,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-617,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-617,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-617,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-617,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-617,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-617 SKIP SUSE-RU-2024:0618-1 as openSUSE-SLE-15.5-2024-618 is not security or has no CVEs. patches: SUSE-2024-618,SUSE-SLE-Product-HA-15-SP5-2024-618,openSUSE-SLE-15.5-2024-618 SKIP SUSE-RU-2024:0625-1 as openSUSE-SLE-15.5-2024-625 is not security or has no CVEs. patches: SUSE-2024-625,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-625,openSUSE-SLE-15.5-2024-625 SKIP SUSE-RU-2024:0626-1 as openSUSE-SLE-15.5-2024-626 is not security or has no CVEs. patches: SUSE-2024-626,SUSE-SLE-Module-Basesystem-15-SP5-2024-626,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-626,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-626,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-626,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-626,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-626,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-626,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-626,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-626,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-626,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-626,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-626,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-626,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-626,SUSE-Storage-7.1-2024-626,openSUSE-SLE-15.5-2024-626 SKIP SUSE-RU-2024:0627-1 as openSUSE-SLE-15.5-2024-627 is not security or has no CVEs. patches: SUSE-2024-627,SUSE-SLE-Micro-5.5-2024-627,SUSE-SLE-Module-Basesystem-15-SP5-2024-627,openSUSE-SLE-15.5-2024-627 SKIP SUSE-RU-2024:0627-2 as SUSE-SLE-Micro-5.5-2024-627 is not security or has no CVEs. patches: SUSE-2024-627,SUSE-SLE-Micro-5.5-2024-627 SKIP SUSE-RU-2024:0628-1 as openSUSE-Leap-Micro-5.4-2024-628 is not security or has no CVEs. patches: SUSE-2024-628,SUSE-SLE-Micro-5.3-2024-628,SUSE-SLE-Micro-5.4-2024-628,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-628,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-628,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-628,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-628,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-628,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-628,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-628,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-628,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-628,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-628,SUSE-SUSE-MicroOS-5.1-2024-628,SUSE-SUSE-MicroOS-5.2-2024-628,SUSE-Storage-7.1-2024-628,openSUSE-Leap-Micro-5.3-2024-628,openSUSE-Leap-Micro-5.4-2024-628 SKIP SUSE-RU-2024:0629-1 as openSUSE-SLE-15.5-2024-629 is not security or has no CVEs. patches: SUSE-2024-629,SUSE-SLE-Micro-5.5-2024-629,SUSE-SLE-Module-Server-Applications-15-SP5-2024-629,openSUSE-SLE-15.5-2024-629 SKIP SUSE-RU-2024:0629-2 as SUSE-SLE-Micro-5.5-2024-629 is not security or has no CVEs. patches: SUSE-2024-629,SUSE-SLE-Micro-5.5-2024-629 SKIP SUSE-RU-2024:0630-1 as openSUSE-SLE-15.5-2024-630 is not security or has no CVEs. patches: SUSE-2024-630,SUSE-SLE-Micro-5.3-2024-630,SUSE-SLE-Micro-5.4-2024-630,SUSE-SLE-Micro-5.5-2024-630,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-630,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-630,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-630,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-630,openSUSE-Leap-Micro-5.3-2024-630,openSUSE-Leap-Micro-5.4-2024-630,openSUSE-SLE-15.5-2024-630 SKIP SUSE-RU-2024:0631-1 as openSUSE-SLE-15.5-2024-631 is not security or has no CVEs. patches: SUSE-2024-631,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-631,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-631,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-631,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-631,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-631,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-631,openSUSE-SLE-15.5-2024-631 SKIP SUSE-RU-2024:0632-1 as SUSE-Storage-7.1-2024-632 is not security or has no CVEs. patches: SUSE-2024-632,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-632,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-632,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-632,SUSE-Storage-7.1-2024-632 SKIP SUSE-RU-2024:0633-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-633 is not security or has no CVEs. patches: SUSE-2024-633,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-633,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-633,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-633 SKIP SUSE-RU-2024:0634-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-634 is not security or has no CVEs. patches: SUSE-2024-634,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-634,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-634,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-634,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-634,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-634,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-634,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-634 SKIP SUSE-RU-2024:0635-1 as openSUSE-SLE-15.5-2024-635 is not security or has no CVEs. patches: SUSE-2024-635,SUSE-SLE-Module-Basesystem-15-SP5-2024-635,SUSE-SLE-Module-Legacy-15-SP5-2024-635,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-635,SUSE-SLE-Module-Server-Applications-15-SP5-2024-635,openSUSE-SLE-15.5-2024-635 SKIP SUSE-RU-2024:0636-1 as SUSE-SLE-SERVER-12-SP5-2024-636 is not security or has no CVEs. patches: SUSE-2024-636,SUSE-SLE-SDK-12-SP5-2024-636,SUSE-SLE-SERVER-12-SP5-2024-636 SKIP SUSE-RU-2024:0637-1 as openSUSE-SLE-15.5-2024-637 is not security or has no CVEs. patches: SUSE-2024-637,SUSE-SLE-Micro-5.5-2024-637,SUSE-SLE-Module-Basesystem-15-SP5-2024-637,openSUSE-SLE-15.5-2024-637 SKIP SUSE-RU-2024:0637-2 as SUSE-SLE-Micro-5.5-2024-637 is not security or has no CVEs. patches: SUSE-2024-637,SUSE-SLE-Micro-5.5-2024-637 SKIP SUSE-RU-2024:0640-1 as SUSE-SLE-SERVER-12-SP5-2024-640 is not security or has no CVEs. patches: SUSE-2024-640,SUSE-SLE-SERVER-12-SP5-2024-640 SKIP SUSE-RU-2024:0641-1 as openSUSE-SLE-15.5-2024-641 is not security or has no CVEs. patches: SUSE-2024-641,SUSE-SLE-Module-Basesystem-15-SP5-2024-641,SUSE-SLE-Module-Development-Tools-15-SP5-2024-641,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-641,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-641,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-641,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-641,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-641,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-641,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-641,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-641,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-641,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-641,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-641,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-641,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-641,SUSE-Storage-7.1-2024-641,openSUSE-SLE-15.5-2024-641 SKIP SUSE-RU-2024:0642-1 as openSUSE-Leap-Micro-5.3-2024-642 is not security or has no CVEs. patches: SUSE-2024-642,SUSE-SLE-Micro-5.3-2024-642,openSUSE-Leap-Micro-5.3-2024-642 SKIP SUSE-RU-2024:0645-1 as openSUSE-SLE-15.5-2024-645 is not security or has no CVEs. patches: SUSE-2024-645,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-645,openSUSE-SLE-15.5-2024-645 SKIP SUSE-RU-2024:0651-1 as openSUSE-SLE-15.5-2024-651 is not security or has no CVEs. patches: SUSE-2024-651,SUSE-SLE-Micro-5.3-2024-651,SUSE-SLE-Micro-5.4-2024-651,SUSE-SLE-Micro-5.5-2024-651,SUSE-SLE-Module-Basesystem-15-SP5-2024-651,SUSE-SLE-Module-Python3-15-SP5-2024-651,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-651,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-651,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-651,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-651,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-651,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-651,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-651,openSUSE-Leap-Micro-5.3-2024-651,openSUSE-Leap-Micro-5.4-2024-651,openSUSE-SLE-15.5-2024-651 SKIP SUSE-RU-2024:0651-2 as SUSE-SLE-Micro-5.5-2024-651 is not security or has no CVEs. patches: SUSE-2024-651,SUSE-SLE-Micro-5.5-2024-651 SKIP SUSE-RU-2024:0717-1 as openSUSE-SLE-15.5-2024-717 is not security or has no CVEs. patches: SUSE-2024-717,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-717,SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-717,openSUSE-SLE-15.5-2024-717 SKIP SUSE-RU-2024:0718-1 as openSUSE-SLE-15.5-2024-718 is not security or has no CVEs. patches: SUSE-2024-718,SUSE-SLE-Micro-5.5-2024-718,SUSE-SLE-Module-Containers-15-SP5-2024-718,openSUSE-SLE-15.5-2024-718 SKIP SUSE-RU-2024:0719-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2024-719 is not security or has no CVEs. patches: SUSE-2024-719,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-719 SKIP SUSE-RU-2024:0720-1 as openSUSE-SLE-15.5-2024-720 is not security or has no CVEs. patches: SUSE-2024-720,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-720,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-720,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-720,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-720,openSUSE-SLE-15.5-2024-720 SKIP SUSE-RU-2024:0721-1 as SUSE-SLE-SAP-12-SP5-2024-721 is not security or has no CVEs. patches: SUSE-2024-721,SUSE-SLE-SAP-12-SP5-2024-721 SKIP SUSE-RU-2024:0722-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2024-722 is not security or has no CVEs. patches: SUSE-2024-722,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-722 SKIP SUSE-RU-2024:0723-1 as openSUSE-SLE-15.5-2024-723 is not security or has no CVEs. patches: SUSE-2024-723,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-723,openSUSE-SLE-15.5-2024-723 SKIP SUSE-RU-2024:0724-1 as openSUSE-SLE-15.5-2024-724 is not security or has no CVEs. patches: SUSE-2024-724,SUSE-SLE-Module-Server-Applications-15-SP5-2024-724,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-724,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-724,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-724,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-724,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-724,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-724,openSUSE-SLE-15.5-2024-724 SKIP SUSE-RU-2024:0725-1 as openSUSE-SLE-15.5-2024-725 is not security or has no CVEs. patches: SUSE-2024-725,SUSE-SLE-Micro-5.3-2024-725,SUSE-SLE-Micro-5.4-2024-725,SUSE-SLE-Micro-5.5-2024-725,SUSE-SLE-Module-Basesystem-15-SP5-2024-725,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-725,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-725,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-725,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-725,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-725,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-725,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-725,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-725,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-725,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-725,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-725,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-725,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-725,SUSE-SUSE-MicroOS-5.1-2024-725,SUSE-SUSE-MicroOS-5.2-2024-725,SUSE-Storage-7.1-2024-725,openSUSE-Leap-Micro-5.3-2024-725,openSUSE-Leap-Micro-5.4-2024-725,openSUSE-SLE-15.5-2024-725 SKIP SUSE-RU-2024:0725-2 as SUSE-SLE-Micro-5.5-2024-725 is not security or has no CVEs. patches: SUSE-2024-725,SUSE-SLE-Micro-5.5-2024-725 SKIP SUSE-RU-2024:0734-1 as openSUSE-SLE-15.5-2024-734 is not security or has no CVEs. patches: SUSE-2024-734,SUSE-SLE-Module-Containers-15-SP5-2024-734,SUSE-SLE-Module-Development-Tools-15-SP5-2024-734,openSUSE-SLE-15.5-2024-734 SKIP SUSE-RU-2024:0735-1 as openSUSE-SLE-15.5-2024-735 is not security or has no CVEs. patches: SUSE-2024-735,SUSE-SLE-Micro-5.3-2024-735,SUSE-SLE-Micro-5.4-2024-735,SUSE-SLE-Micro-5.5-2024-735,SUSE-SLE-Module-Basesystem-15-SP5-2024-735,SUSE-SLE-Module-Development-Tools-15-SP5-2024-735,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-735,SUSE-SUSE-MicroOS-5.2-2024-735,openSUSE-Leap-Micro-5.3-2024-735,openSUSE-Leap-Micro-5.4-2024-735,openSUSE-SLE-15.5-2024-735 SKIP SUSE-RU-2024:0735-2 as SUSE-SLE-Micro-5.5-2024-735 is not security or has no CVEs. patches: SUSE-2024-735,SUSE-SLE-Micro-5.5-2024-735 SKIP SUSE-RU-2024:0736-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-736 is not security or has no CVEs. patches: SUSE-2024-736,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-736 SKIP SUSE-RU-2024:0737-1 as openSUSE-SLE-15.5-2024-737 is not security or has no CVEs. patches: SUSE-2024-737,SUSE-SLE-Manager-Tools-15-2024-737,SUSE-SLE-Manager-Tools-For-Micro-5-2024-737,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-737,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-737,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-737,openSUSE-SLE-15.5-2024-737 SKIP SUSE-RU-2024:0739-1 as openSUSE-SLE-15.5-2024-739 is not security or has no CVEs. patches: SUSE-2024-739,SUSE-SLE-Module-Basesystem-15-SP5-2024-739,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-739,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-739,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-739,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-739,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-739,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-739,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-739,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-739,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-739,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-739,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-739,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-739,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-739,SUSE-Storage-7.1-2024-739,openSUSE-SLE-15.5-2024-739 SKIP SUSE-RU-2024:0741-1 as openSUSE-SLE-15.5-2024-741 is not security or has no CVEs. patches: SUSE-2024-741,SUSE-SLE-Micro-5.5-2024-741,SUSE-SLE-Module-Basesystem-15-SP5-2024-741,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-741,SUSE-SLE-Product-WE-15-SP5-2024-741,openSUSE-SLE-15.5-2024-741 SKIP SUSE-RU-2024:0744-1 as openSUSE-SLE-15.5-2024-744 is not security or has no CVEs. patches: SUSE-2024-744,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-744,openSUSE-SLE-15.5-2024-744 SKIP SUSE-RU-2024:0745-1 as SUSE-SLE-Manager-Tools-15-BETA-2024-745 is not security or has no CVEs. patches: SUSE-2024-745,SUSE-SLE-Manager-Tools-15-BETA-2024-745 SKIP SUSE-RU-2024:0746-1 as SUSE-SLE-Manager-Tools-12-BETA-2024-746 is not security or has no CVEs. patches: SUSE-2024-746,SUSE-SLE-Manager-Tools-12-BETA-2024-746 SKIP SUSE-RU-2024:0747-1 as SUSE-EL-9-CLIENT-TOOLS-BETA-2024-747 is not security or has no CVEs. patches: SUSE-2024-747,SUSE-EL-9-CLIENT-TOOLS-BETA-2024-747 ERROR: notice SUSE-RU-2024:0750-1 has no valid patches out of: SUSE-2024-750,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-750 ERROR: notice SUSE-RU-2024:0751-1 has no valid patches out of: SUSE-2024-751,SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-751 ERROR: notice SUSE-RU-2024:0752-1 has no valid patches out of: SUSE-2024-752,SUSE-Debian-12-CLIENT-TOOLS-BETA-2024-752 ERROR: notice SUSE-RU-2024:0753-1 has no valid patches out of: SUSE-2024-753,SUSE-Debian-11-CLIENT-TOOLS-BETA-2024-753 SKIP SUSE-RU-2024:0756-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2024-756 is not security or has no CVEs. patches: SUSE-2024-756,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-756,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-756,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-756 SKIP SUSE-RU-2024:0760-1 as openSUSE-SLE-15.5-2024-760 is not security or has no CVEs. patches: SUSE-2024-760,SUSE-SLE-Micro-5.3-2024-760,SUSE-SLE-Micro-5.4-2024-760,SUSE-SLE-Micro-5.5-2024-760,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-760,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-760,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-760,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-760,openSUSE-Leap-Micro-5.3-2024-760,openSUSE-Leap-Micro-5.4-2024-760,openSUSE-SLE-15.5-2024-760 SKIP SUSE-RU-2024:0761-1 as SUSE-SLE-Module-Public-Cloud-12-2024-761 is not security or has no CVEs. patches: SUSE-2024-761,SUSE-SLE-Module-Public-Cloud-12-2024-761 SKIP SUSE-RU-2024:0762-1 as SUSE-SLE-Micro-5.5-2024-762 is not security or has no CVEs. patches: SUSE-2024-762,SUSE-SLE-Micro-5.5-2024-762 SKIP SUSE-RU-2024:0766-1 as openSUSE-SLE-15.5-2024-766 is not security or has no CVEs. patches: SUSE-2024-766,SUSE-SLE-Micro-5.3-2024-766,SUSE-SLE-Micro-5.4-2024-766,SUSE-SLE-Micro-5.5-2024-766,SUSE-SLE-Module-Basesystem-15-SP5-2024-766,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-766,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-766,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-766,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-766,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-766,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-766,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-766,openSUSE-Leap-Micro-5.3-2024-766,openSUSE-Leap-Micro-5.4-2024-766,openSUSE-SLE-15.5-2024-766 SKIP SUSE-RU-2024:0766-2 as SUSE-SLE-Micro-5.5-2024-766 is not security or has no CVEs. patches: SUSE-2024-766,SUSE-SLE-Micro-5.5-2024-766 SKIP SUSE-RU-2024:0767-1 as SUSE-SLE-SDK-12-SP5-2024-767 is not security or has no CVEs. patches: SUSE-2024-767,SUSE-SLE-SDK-12-SP5-2024-767 SKIP SUSE-RU-2024:0768-1 as SUSE-SLE-SDK-12-SP5-2024-768 is not security or has no CVEs. patches: SUSE-2024-768,SUSE-SLE-SDK-12-SP5-2024-768 SKIP SUSE-RU-2024:0775-1 as SUSE-SLE-Micro-5.5-2024-775 is not security or has no CVEs. patches: SUSE-2024-775,SUSE-SLE-Micro-5.5-2024-775 SKIP SUSE-RU-2024:0776-1 as SUSE-SLE-Module-Public-Cloud-12-2024-776 is not security or has no CVEs. patches: SUSE-2024-776,SUSE-SLE-Module-Public-Cloud-12-2024-776 SKIP SUSE-RU-2024:0778-1 as openSUSE-SLE-15.5-2024-778 is not security or has no CVEs. patches: SUSE-2024-778,SUSE-SLE-Module-Basesystem-15-SP5-2024-778,openSUSE-SLE-15.5-2024-778 SKIP SUSE-RU-2024:0781-1 as openSUSE-SLE-15.5-2024-781 is not security or has no CVEs. patches: SUSE-2024-781,SUSE-SLE-Micro-5.3-2024-781,SUSE-SLE-Micro-5.4-2024-781,SUSE-SLE-Micro-5.5-2024-781,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-781,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-781,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-781,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-781,openSUSE-Leap-Micro-5.3-2024-781,openSUSE-Leap-Micro-5.4-2024-781,openSUSE-SLE-15.5-2024-781 SKIP SUSE-RU-2024:0787-1 as SUSE-SLE-SAP-12-SP5-2024-787 is not security or has no CVEs. patches: SUSE-2024-787,SUSE-SLE-SAP-12-SP5-2024-787 SKIP SUSE-RU-2024:0788-1 as openSUSE-SLE-15.5-2024-788 is not security or has no CVEs. patches: SUSE-2024-788,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-788,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-788,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-788,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-788,openSUSE-SLE-15.5-2024-788 SKIP SUSE-RU-2024:0789-1 as openSUSE-SLE-15.5-2024-789 is not security or has no CVEs. patches: SUSE-2024-789,SUSE-SLE-Module-Development-Tools-15-SP5-2024-789,openSUSE-SLE-15.5-2024-789 SKIP SUSE-RU-2024:0790-1 as SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-790 is not security or has no CVEs. patches: SUSE-2024-790,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-790 SKIP SUSE-RU-2024:0791-1 as SUSE-SLE-SERVER-12-SP5-2024-791 is not security or has no CVEs. patches: SUSE-2024-791,SUSE-SLE-SERVER-12-SP5-2024-791 SKIP SUSE-RU-2024:0792-1 as openSUSE-SLE-15.5-2024-792 is not security or has no CVEs. patches: SUSE-2024-792,SUSE-SLE-Micro-5.3-2024-792,SUSE-SLE-Micro-5.4-2024-792,SUSE-SLE-Micro-5.5-2024-792,SUSE-SLE-Module-Basesystem-15-SP5-2024-792,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-792,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-792,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-792,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-792,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-792,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-792,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-792,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-792,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-792,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-792,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-792,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-792,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-792,SUSE-SUSE-MicroOS-5.1-2024-792,SUSE-SUSE-MicroOS-5.2-2024-792,SUSE-Storage-7.1-2024-792,openSUSE-Leap-Micro-5.3-2024-792,openSUSE-Leap-Micro-5.4-2024-792,openSUSE-SLE-15.5-2024-792 SKIP SUSE-RU-2024:0792-2 as SUSE-SLE-Micro-5.5-2024-792 is not security or has no CVEs. patches: SUSE-2024-792,SUSE-SLE-Micro-5.5-2024-792 SKIP SUSE-RU-2024:0802-1 as openSUSE-Leap-Micro-5.4-2024-802 is not security or has no CVEs. patches: SUSE-2024-802,SUSE-SLE-Micro-5.3-2024-802,SUSE-SLE-Micro-5.4-2024-802,openSUSE-Leap-Micro-5.3-2024-802,openSUSE-Leap-Micro-5.4-2024-802 SKIP SUSE-RU-2024:0802-2 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-802 is not security or has no CVEs. patches: SUSE-2024-802,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-802,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-802,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-802,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-802,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-802,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-802,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-802 SKIP SUSE-RU-2024:0805-1 as openSUSE-SLE-15.5-2024-805 is not security or has no CVEs. patches: SUSE-2024-805,SUSE-SLE-Module-Basesystem-15-SP5-2024-805,openSUSE-SLE-15.5-2024-805 SKIP SUSE-RU-2024:0809-1 as openSUSE-SLE-15.5-2024-809 is not security or has no CVEs. patches: SUSE-2024-809,SUSE-SLE-Module-HPC-15-SP5-2024-809,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-809,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-809,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-809,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-809,openSUSE-SLE-15.5-2024-809 SKIP SUSE-RU-2024:0810-1 as SUSE-SLE-Module-HPC-12-2024-810 is not security or has no CVEs. patches: SUSE-2024-810,SUSE-SLE-Module-HPC-12-2024-810 SKIP SUSE-RU-2024:0816-1 as openSUSE-SLE-15.5-2024-816 is not security or has no CVEs. patches: SUSE-2024-816,SUSE-SLE-Module-Legacy-15-SP5-2024-816,openSUSE-SLE-15.5-2024-816 SKIP SUSE-RU-2024:0821-1 as openSUSE-SLE-15.5-2024-821 is not security or has no CVEs. patches: SUSE-2024-821,openSUSE-SLE-15.5-2024-821 SKIP SUSE-RU-2024:0822-1 as openSUSE-SLE-15.5-2024-822 is not security or has no CVEs. patches: SUSE-2024-822,SUSE-SLE-Product-HA-15-SP5-2024-822,openSUSE-SLE-15.5-2024-822 SKIP SUSE-RU-2024:0823-1 as openSUSE-SLE-15.5-2024-823 is not security or has no CVEs. patches: SUSE-2024-823,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-823,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-823,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-823,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-823,openSUSE-SLE-15.5-2024-823 SKIP SUSE-RU-2024:0826-1 as openSUSE-SLE-15.5-2024-826 is not security or has no CVEs. patches: SUSE-2024-826,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-826,openSUSE-SLE-15.5-2024-826 SKIP SUSE-RU-2024:0827-1 as openSUSE-SLE-15.5-2024-827 is not security or has no CVEs. patches: SUSE-2024-827,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-827,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-827,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-827,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-827,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-827,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-827,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-827,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-827,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-827,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-827,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-827,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-827,SUSE-Storage-7.1-2024-827,openSUSE-SLE-15.5-2024-827 SKIP SUSE-RU-2024:0828-1 as openSUSE-SLE-15.5-2024-828 is not security or has no CVEs. patches: SUSE-2024-828,SUSE-SLE-Module-Development-Tools-15-SP5-2024-828,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-828,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-828,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-828,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-828,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-828,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-828,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-828,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-828,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-828,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-828,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-828,SUSE-Storage-7.1-2024-828,openSUSE-SLE-15.5-2024-828 SKIP SUSE-RU-2024:0836-1 as openSUSE-SLE-15.5-2024-836 is not security or has no CVEs. patches: SUSE-2024-836,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-836,SUSE-SLE-Product-WE-15-SP5-2024-836,openSUSE-SLE-15.5-2024-836 SKIP SUSE-RU-2024:0837-1 as openSUSE-Leap-Micro-5.4-2024-837 is not security or has no CVEs. patches: SUSE-2024-837,SUSE-SLE-Micro-5.4-2024-837,openSUSE-Leap-Micro-5.4-2024-837 SKIP SUSE-RU-2024:0838-1 as openSUSE-Leap-Micro-5.4-2024-838 is not security or has no CVEs. patches: SUSE-2024-838,SUSE-SLE-Micro-5.3-2024-838,SUSE-SLE-Micro-5.4-2024-838,openSUSE-Leap-Micro-5.3-2024-838,openSUSE-Leap-Micro-5.4-2024-838 SKIP SUSE-RU-2024:0843-1 as SUSE-SLE-SERVER-12-SP5-2024-843 is not security or has no CVEs. patches: SUSE-2024-843,SUSE-SLE-SDK-12-SP5-2024-843,SUSE-SLE-SERVER-12-SP5-2024-843 SKIP SUSE-RU-2024:0844-1 as openSUSE-SLE-15.5-2024-844 is not security or has no CVEs. patches: SUSE-2024-844,SUSE-SLE-Micro-5.3-2024-844,SUSE-SLE-Micro-5.4-2024-844,SUSE-SLE-Micro-5.5-2024-844,SUSE-SLE-Module-Basesystem-15-SP5-2024-844,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-844,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-844,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-844,openSUSE-Leap-Micro-5.3-2024-844,openSUSE-Leap-Micro-5.4-2024-844,openSUSE-SLE-15.5-2024-844 SKIP SUSE-RU-2024:0845-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-845 is not security or has no CVEs. patches: SUSE-2024-845,SUSE-SLE-INSTALLER-15-SP4-2024-845,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-845 SKIP SUSE-RU-2024:0846-1 as SUSE-SLE-Micro-5.5-2024-846 is not security or has no CVEs. patches: SUSE-2024-846,SUSE-SLE-Micro-5.5-2024-846 SKIP SUSE-RU-2024:0846-2 as SUSE-SLE-Micro-5.5-2024-846 is not security or has no CVEs. patches: SUSE-2024-846,SUSE-SLE-Micro-5.5-2024-846 SKIP SUSE-RU-2024:0848-1 as openSUSE-SLE-15.5-2024-848 is not security or has no CVEs. patches: SUSE-2024-848,openSUSE-SLE-15.5-2024-848 SKIP SUSE-RU-2024:0849-1 as openSUSE-SLE-15.5-2024-849 is not security or has no CVEs. patches: SUSE-2024-849,SUSE-SLE-Micro-5.5-2024-849,SUSE-SLE-Module-Basesystem-15-SP5-2024-849,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-849,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-849,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-849,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-849,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-849,SUSE-SLE-Module-Server-Applications-15-SP5-2024-849,openSUSE-SLE-15.5-2024-849 SKIP SUSE-RU-2024:0849-2 as SUSE-SLE-Micro-5.5-2024-849 is not security or has no CVEs. patches: SUSE-2024-849,SUSE-SLE-Micro-5.5-2024-849 SKIP SUSE-RU-2024:0853-1 as openSUSE-SLE-15.5-2024-853 is not security or has no CVEs. patches: SUSE-2024-853,SUSE-SLE-Module-Basesystem-15-SP5-2024-853,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-853,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-853,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-853,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-853,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-853,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-853,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-853,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-853,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-853,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-853,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-853,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-853,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-853,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-853,SUSE-SUSE-MicroOS-5.1-2024-853,SUSE-SUSE-MicroOS-5.2-2024-853,SUSE-Storage-7.1-2024-853,openSUSE-SLE-15.5-2024-853 SKIP SUSE-RU-2024:0854-1 as SUSE-2024-854 is not security or has no CVEs. patches: SUSE-2024-854 SKIP SUSE-RU-2024:0859-1 as openSUSE-SLE-15.5-2024-859 is not security or has no CVEs. patches: SUSE-2024-859,openSUSE-SLE-15.5-2024-859 SKIP SUSE-RU-2024:0861-1 as openSUSE-SLE-15.5-2024-861 is not security or has no CVEs. patches: SUSE-2024-861,SUSE-SLE-Micro-5.3-2024-861,SUSE-SLE-Micro-5.4-2024-861,SUSE-SLE-Micro-5.5-2024-861,SUSE-SLE-Module-Basesystem-15-SP5-2024-861,SUSE-SLE-Module-Development-Tools-15-SP5-2024-861,SUSE-SUSE-MicroOS-5.2-2024-861,openSUSE-Leap-Micro-5.3-2024-861,openSUSE-Leap-Micro-5.4-2024-861,openSUSE-SLE-15.5-2024-861 SKIP SUSE-RU-2024:0865-1 as openSUSE-SLE-15.5-2024-865 is not security or has no CVEs. patches: SUSE-2024-865,SUSE-SLE-Micro-5.5-2024-865,SUSE-SLE-Module-Basesystem-15-SP5-2024-865,openSUSE-SLE-15.5-2024-865 SKIP SUSE-RU-2024:0866-1 as SUSE-SLE-Product-HA-15-SP4-2024-866 is not security or has no CVEs. patches: SUSE-2024-866,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-866,SUSE-SLE-Product-HA-15-SP3-2024-866,SUSE-SLE-Product-HA-15-SP4-2024-866 SKIP SUSE-RU-2024:0867-1 as openSUSE-SLE-15.5-2024-867 is not security or has no CVEs. patches: SUSE-2024-867,SUSE-SLE-Product-HA-15-SP5-2024-867,openSUSE-SLE-15.5-2024-867 SKIP SUSE-RU-2024:0868-1 as openSUSE-SLE-15.5-2024-868 is not security or has no CVEs. patches: SUSE-2024-868,SUSE-SLE-Micro-5.5-2024-868,SUSE-SLE-Module-Basesystem-15-SP5-2024-868,SUSE-SLE-Module-Development-Tools-15-SP5-2024-868,openSUSE-SLE-15.5-2024-868 SKIP SUSE-RU-2024:0869-1 as openSUSE-SLE-15.5-2024-869 is not security or has no CVEs. patches: SUSE-2024-869,SUSE-SLE-Micro-5.3-2024-869,SUSE-SLE-Micro-5.4-2024-869,SUSE-SLE-Micro-5.5-2024-869,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-869,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-869,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-869,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-869,openSUSE-Leap-Micro-5.3-2024-869,openSUSE-Leap-Micro-5.4-2024-869,openSUSE-SLE-15.5-2024-869 SKIP SUSE-RU-2024:0872-1 as openSUSE-SLE-15.5-2024-872 is not security or has no CVEs. patches: SUSE-2024-872,SUSE-SLE-Module-Live-Patching-15-SP2-2024-872,SUSE-SLE-Module-Live-Patching-15-SP3-2024-872,SUSE-SLE-Module-Live-Patching-15-SP4-2024-872,SUSE-SLE-Module-Live-Patching-15-SP5-2024-872,openSUSE-SLE-15.5-2024-872 SKIP SUSE-RU-2024:0873-1 as SUSE-SLE-Live-Patching-12-SP5-2024-873 is not security or has no CVEs. patches: SUSE-2024-873,SUSE-SLE-Live-Patching-12-2024-873,SUSE-SLE-Live-Patching-12-SP5-2024-873 SKIP SUSE-RU-2024:0878-1 as openSUSE-SLE-15.5-2024-878 is not security or has no CVEs. patches: SUSE-2024-878,SUSE-SLE-Micro-5.5-2024-878,SUSE-SLE-Module-Basesystem-15-SP5-2024-878,SUSE-SLE-Module-Server-Applications-15-SP5-2024-878,openSUSE-SLE-15.5-2024-878 SKIP SUSE-RU-2024:0879-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-879 is not security or has no CVEs. patches: SUSE-2024-879,SUSE-SLE-Module-Basesystem-15-SP5-2024-879 SKIP SUSE-RU-2024:0880-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-880 is not security or has no CVEs. patches: SUSE-2024-880,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-880,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-880,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-880,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-880,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-880,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-880,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-880 SKIP SUSE-RU-2024:0881-1 as openSUSE-SLE-15.5-2024-881 is not security or has no CVEs. patches: SUSE-2024-881,SUSE-SLE-INSTALLER-15-SP5-2024-881,SUSE-SLE-Module-Basesystem-15-SP5-2024-881,openSUSE-SLE-15.5-2024-881 SKIP SUSE-RU-2024:0883-1 as SUSE-SLE-SERVER-12-SP5-2024-883 is not security or has no CVEs. patches: SUSE-2024-883,SUSE-SLE-SERVER-12-SP5-2024-883 SKIP SUSE-RU-2024:0886-1 as SUSE-SLE-SAP-12-SP5-2024-886 is not security or has no CVEs. patches: SUSE-2024-886,SUSE-SLE-SAP-12-SP5-2024-886 SKIP SUSE-RU-2024:0887-1 as openSUSE-SLE-15.5-2024-887 is not security or has no CVEs. patches: SUSE-2024-887,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-887,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-887,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-887,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-887,openSUSE-SLE-15.5-2024-887 SKIP SUSE-RU-2024:0888-1 as openSUSE-SLE-15.5-2024-888 is not security or has no CVEs. patches: SUSE-2024-888,SUSE-SLE-Product-HA-15-SP5-2024-888,openSUSE-SLE-15.5-2024-888 SKIP SUSE-RU-2024:0895-1 as openSUSE-SLE-15.5-2024-895 is not security or has no CVEs. patches: SUSE-2024-895,SUSE-SLE-Micro-5.5-2024-895,SUSE-SLE-Module-Basesystem-15-SP5-2024-895,openSUSE-SLE-15.5-2024-895 SKIP SUSE-RU-2024:0896-1 as SUSE-SUSE-MicroOS-5.2-2024-896 is not security or has no CVEs. patches: SUSE-2024-896,SUSE-SUSE-MicroOS-5.1-2024-896,SUSE-SUSE-MicroOS-5.2-2024-896 SKIP SUSE-RU-2024:0897-1 as SUSE-SLE-SERVER-12-SP5-2024-897 is not security or has no CVEs. patches: SUSE-2024-897,SUSE-SLE-SERVER-12-SP5-2024-897 SKIP SUSE-RU-2024:0903-1 as openSUSE-SLE-15.5-2024-903 is not security or has no CVEs. patches: SUSE-2024-903,SUSE-SLE-Micro-5.5-2024-903,SUSE-SLE-Module-Basesystem-15-SP5-2024-903,openSUSE-SLE-15.5-2024-903 SKIP SUSE-RU-2024:0903-2 as SUSE-SLE-Micro-5.5-2024-903 is not security or has no CVEs. patches: SUSE-2024-903,SUSE-SLE-Micro-5.5-2024-903 SKIP SUSE-RU-2024:0904-1 as openSUSE-SLE-15.5-2024-904 is not security or has no CVEs. patches: SUSE-2024-904,SUSE-SLE-Micro-5.3-2024-904,SUSE-SLE-Micro-5.4-2024-904,SUSE-SLE-Micro-5.5-2024-904,SUSE-SLE-Module-Basesystem-15-SP5-2024-904,SUSE-SUSE-MicroOS-5.1-2024-904,SUSE-SUSE-MicroOS-5.2-2024-904,openSUSE-Leap-Micro-5.3-2024-904,openSUSE-Leap-Micro-5.4-2024-904,openSUSE-SLE-15.5-2024-904 SKIP SUSE-RU-2024:0905-1 as SUSE-SLE-SAP-12-SP5-2024-905 is not security or has no CVEs. patches: SUSE-2024-905,SUSE-SLE-SAP-12-SP5-2024-905 SKIP SUSE-RU-2024:0906-1 as openSUSE-SLE-15.5-2024-906 is not security or has no CVEs. patches: SUSE-2024-906,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-906,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-906,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-906,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-906,openSUSE-SLE-15.5-2024-906 SKIP SUSE-RU-2024:0907-1 as openSUSE-SLE-15.5-2024-907 is not security or has no CVEs. patches: SUSE-2024-907,SUSE-SLE-Micro-5.3-2024-907,SUSE-SLE-Micro-5.4-2024-907,SUSE-SLE-Micro-5.5-2024-907,SUSE-SLE-Module-Basesystem-15-SP5-2024-907,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-907,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-907,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-907,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-907,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-907,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-907,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-907,openSUSE-Leap-Micro-5.3-2024-907,openSUSE-Leap-Micro-5.4-2024-907,openSUSE-SLE-15.5-2024-907 SKIP SUSE-RU-2024:0907-2 as SUSE-SLE-Micro-5.5-2024-907 is not security or has no CVEs. patches: SUSE-2024-907,SUSE-SLE-Micro-5.5-2024-907 SKIP SUSE-RU-2024:0909-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-909 is not security or has no CVEs. patches: SUSE-2024-909,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-909 SKIP SUSE-RU-2024:0911-1 as openSUSE-SLE-15.5-2024-911 is not security or has no CVEs. patches: SUSE-2024-911,SUSE-SLE-Module-Server-Applications-15-SP5-2024-911,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-911,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-911,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-911,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-911,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-911,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-911,openSUSE-SLE-15.5-2024-911 SKIP SUSE-RU-2024:0913-1 as SUSE-SLE-SERVER-12-SP5-2024-913 is not security or has no CVEs. patches: SUSE-2024-913,SUSE-SLE-SERVER-12-SP5-2024-913 SKIP SUSE-RU-2024:0914-1 as openSUSE-SLE-15.5-2024-914 is not security or has no CVEs. patches: SUSE-2024-914,SUSE-SLE-Micro-5.3-2024-914,SUSE-SLE-Module-Basesystem-15-SP5-2024-914,openSUSE-Leap-Micro-5.3-2024-914,openSUSE-SLE-15.5-2024-914 SKIP SUSE-RU-2024:0918-1 as SUSE-SLE-SERVER-12-SP5-2024-918 is not security or has no CVEs. patches: SUSE-2024-918,SUSE-SLE-SDK-12-SP5-2024-918,SUSE-SLE-SERVER-12-SP5-2024-918 SKIP SUSE-RU-2024:0919-1 as openSUSE-SLE-15.5-2024-919 is not security or has no CVEs. patches: SUSE-2024-919,SUSE-SLE-Module-Basesystem-15-SP5-2024-919,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-919,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-919,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-919,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-919,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-919,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-919,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-919,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-919,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-919,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-919,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-919,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-919,SUSE-Storage-7.1-2024-919,openSUSE-SLE-15.5-2024-919 SKIP SUSE-RU-2024:0929-1 as openSUSE-SLE-15.5-2024-929 is not security or has no CVEs. patches: SUSE-2024-929,SUSE-SLE-Micro-5.3-2024-929,SUSE-SLE-Micro-5.4-2024-929,SUSE-SLE-Micro-5.5-2024-929,SUSE-SLE-Module-Basesystem-15-SP5-2024-929,openSUSE-Leap-Micro-5.3-2024-929,openSUSE-Leap-Micro-5.4-2024-929,openSUSE-SLE-15.5-2024-929 SKIP SUSE-RU-2024:0930-1 as SUSE-Storage-7.1-2024-930 is not security or has no CVEs. patches: SUSE-2024-930,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-930,SUSE-SLE-Product-SLES-15-SP3-ERICSSON-2024-930,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-930,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-930,SUSE-Storage-7.1-2024-930 SKIP SUSE-RU-2024:0931-1 as SUSE-SLE-SERVER-12-SP5-2024-931 is not security or has no CVEs. patches: SUSE-2024-931,SUSE-SLE-SDK-12-SP5-2024-931,SUSE-SLE-SERVER-12-SP5-2024-931 SKIP SUSE-RU-2024:0932-1 as SUSE-SLE-SERVER-12-SP5-2024-932 is not security or has no CVEs. patches: SUSE-2024-932,SUSE-SLE-SERVER-12-SP5-2024-932 SKIP SUSE-RU-2024:0933-1 as openSUSE-SLE-15.5-2024-933 is not security or has no CVEs. patches: SUSE-2024-933,SUSE-SLE-Module-Development-Tools-15-SP5-2024-933,openSUSE-SLE-15.5-2024-933 SKIP SUSE-RU-2024:0938-1 as openSUSE-SLE-15.5-2024-938 is not security or has no CVEs. patches: SUSE-2024-938,SUSE-SLE-Module-Server-Applications-15-SP5-2024-938,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-938,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-938,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-938,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-938,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-938,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-938,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-938,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-938,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-938,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-938,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-938,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-938,SUSE-Storage-7.1-2024-938,openSUSE-SLE-15.5-2024-938 SKIP SUSE-RU-2024:0940-1 as SUSE-SUSE-MicroOS-5.1-2024-940 is not security or has no CVEs. patches: SUSE-2024-940,SUSE-SUSE-MicroOS-5.1-2024-940 SKIP SUSE-RU-2024:0941-1 as SUSE-SUSE-MicroOS-5.2-2024-941 is not security or has no CVEs. patches: SUSE-2024-941,SUSE-SUSE-MicroOS-5.2-2024-941 SKIP SUSE-RU-2024:0942-1 as openSUSE-Leap-Micro-5.4-2024-942 is not security or has no CVEs. patches: SUSE-2024-942,SUSE-SLE-Micro-5.3-2024-942,SUSE-SLE-Micro-5.4-2024-942,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-942,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-942,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-942,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-942,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-942,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-942,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-942,openSUSE-Leap-Micro-5.3-2024-942,openSUSE-Leap-Micro-5.4-2024-942 SKIP SUSE-RU-2024:0943-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-943 is not security or has no CVEs. patches: SUSE-2024-943,SUSE-SLE-Micro-5.5-2024-943,SUSE-SLE-Module-Basesystem-15-SP5-2024-943 SKIP SUSE-RU-2024:0944-1 as SUSE-Storage-7.1-2024-944 is not security or has no CVEs. patches: SUSE-2024-944,SUSE-SLE-INSTALLER-15-SP2-2024-944,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-944,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-944,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-944,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-944,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-944,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-944,SUSE-Storage-7.1-2024-944 SKIP SUSE-RU-2024:0945-1 as SUSE-SLE-SERVER-12-SP5-2024-945 is not security or has no CVEs. patches: SUSE-2024-945,SUSE-SLE-SERVER-12-SP5-2024-945 SKIP SUSE-RU-2024:0948-1 as openSUSE-SLE-15.5-2024-948 is not security or has no CVEs. patches: SUSE-2024-948,SUSE-SLE-Module-Basesystem-15-SP5-2024-948,openSUSE-SLE-15.5-2024-948 SKIP SUSE-RU-2024:0949-1 as openSUSE-SLE-15.5-2024-949 is not security or has no CVEs. patches: SUSE-2024-949,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-949,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-949,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-949,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-949,openSUSE-SLE-15.5-2024-949 SKIP SUSE-RU-2024:0950-1 as openSUSE-SLE-15.5-2024-950 is not security or has no CVEs. patches: SUSE-2024-950,SUSE-SLE-Module-HPC-15-SP5-2024-950,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-950,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-950,openSUSE-SLE-15.5-2024-950 SKIP SUSE-RU-2024:0950-2 as openSUSE-SLE-15.6-2024-950 is not security or has no CVEs. patches: SUSE-2024-950,SUSE-SLE-Module-HPC-15-SP6-2024-950,openSUSE-SLE-15.6-2024-950 SKIP SUSE-RU-2024:0951-1 as SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-951 is not security or has no CVEs. patches: SUSE-2024-951,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-951 SKIP SUSE-RU-2024:0952-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-952 is not security or has no CVEs. patches: SUSE-2024-952,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-952,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-952,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-952,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-952,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-952,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-952,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-952 SKIP SUSE-RU-2024:0953-1 as SUSE-Storage-7.1-2024-953 is not security or has no CVEs. patches: SUSE-2024-953,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-953,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-953,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-953,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-953,SUSE-Storage-7.1-2024-953 SKIP SUSE-RU-2024:0954-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-954 is not security or has no CVEs. patches: SUSE-2024-954,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-954,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-954,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-954,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-954 SKIP SUSE-RU-2024:0955-1 as openSUSE-SLE-15.5-2024-955 is not security or has no CVEs. patches: SUSE-2024-955,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-955,SUSE-SLE-Module-Server-Applications-15-SP5-2024-955,openSUSE-SLE-15.5-2024-955 SKIP SUSE-RU-2024:0956-1 as openSUSE-SLE-15.5-2024-956 is not security or has no CVEs. patches: SUSE-2024-956,SUSE-SLE-Module-Basesystem-15-SP5-2024-956,openSUSE-SLE-15.5-2024-956 SKIP SUSE-RU-2024:0958-1 as SUSE-SLE-Module-Public-Cloud-12-2024-958 is not security or has no CVEs. patches: SUSE-2024-958,SUSE-SLE-Module-Public-Cloud-12-2024-958 SKIP SUSE-RU-2024:0959-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-959 is not security or has no CVEs. patches: SUSE-2024-959,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-959,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-959,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-959 SKIP SUSE-RU-2024:0960-1 as openSUSE-SLE-15.5-2024-960 is not security or has no CVEs. patches: SUSE-2024-960,SUSE-SLE-Micro-5.5-2024-960,SUSE-SLE-Module-Basesystem-15-SP5-2024-960,SUSE-SLE-Module-Development-Tools-15-SP5-2024-960,openSUSE-SLE-15.5-2024-960 SKIP SUSE-RU-2024:0962-1 as SUSE-SLE-Micro-5.5-2024-962 is not security or has no CVEs. patches: SUSE-2024-962,SUSE-SLE-Micro-5.5-2024-962 SKIP SUSE-RU-2024:0967-1 as openSUSE-SLE-15.5-2024-967 is not security or has no CVEs. patches: SUSE-2024-967,SUSE-SLE-INSTALLER-15-SP5-2024-967,SUSE-SLE-Module-Basesystem-15-SP5-2024-967,openSUSE-SLE-15.5-2024-967 SKIP SUSE-RU-2024:0968-1 as SUSE-Storage-7.1-2024-968 is not security or has no CVEs. patches: SUSE-2024-968,SUSE-SLE-INSTALLER-15-SP3-2024-968,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-968,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-968,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-968,SUSE-Storage-7.1-2024-968 SKIP SUSE-RU-2024:0969-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-969 is not security or has no CVEs. patches: SUSE-2024-969,SUSE-SLE-INSTALLER-15-SP4-2024-969,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-969,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-969,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-969,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-969,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-969,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-969,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-969 SKIP SUSE-RU-2024:0978-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-978 is not security or has no CVEs. patches: SUSE-2024-978,SUSE-SLE-INSTALLER-15-SP2-2024-978,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-978,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-978,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-978 SKIP SUSE-RU-2024:0979-1 as openSUSE-SLE-15.5-2024-979 is not security or has no CVEs. patches: SUSE-2024-979,SUSE-SLE-Product-HA-15-SP2-2024-979,SUSE-SLE-Product-HA-15-SP3-2024-979,SUSE-SLE-Product-HA-15-SP4-2024-979,SUSE-SLE-Product-HA-15-SP5-2024-979,openSUSE-SLE-15.5-2024-979 SKIP SUSE-RU-2024:0980-1 as openSUSE-SLE-15.5-2024-980 is not security or has no CVEs. patches: SUSE-2024-980,SUSE-SLE-Micro-5.3-2024-980,SUSE-SLE-Micro-5.4-2024-980,SUSE-SLE-Micro-5.5-2024-980,SUSE-SLE-Module-Basesystem-15-SP5-2024-980,SUSE-SUSE-MicroOS-5.1-2024-980,SUSE-SUSE-MicroOS-5.2-2024-980,openSUSE-Leap-Micro-5.3-2024-980,openSUSE-Leap-Micro-5.4-2024-980,openSUSE-SLE-15.5-2024-980 SKIP SUSE-RU-2024:0980-2 as SUSE-SLE-Micro-5.5-2024-980 is not security or has no CVEs. patches: SUSE-2024-980,SUSE-SLE-Micro-5.5-2024-980 SKIP SUSE-RU-2024:0981-1 as SUSE-SLE-Module-Containers-12-2024-981 is not security or has no CVEs. patches: SUSE-2024-981,SUSE-SLE-Module-Containers-12-2024-981 SKIP SUSE-RU-2024:0982-1 as openSUSE-SLE-15.5-2024-982 is not security or has no CVEs. patches: SUSE-2024-982,SUSE-SLE-Micro-5.3-2024-982,SUSE-SLE-Micro-5.4-2024-982,SUSE-SLE-Micro-5.5-2024-982,SUSE-SLE-Module-Basesystem-15-SP5-2024-982,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-982,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-982,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-982,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-982,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-982,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-982,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-982,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-982,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-982,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-982,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-982,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-982,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-982,SUSE-Storage-7.1-2024-982,openSUSE-Leap-Micro-5.3-2024-982,openSUSE-Leap-Micro-5.4-2024-982,openSUSE-SLE-15.5-2024-982 SKIP SUSE-RU-2024:0982-2 as SUSE-SLE-Micro-5.5-2024-982 is not security or has no CVEs. patches: SUSE-2024-982,SUSE-SLE-Micro-5.5-2024-982 SKIP SUSE-RU-2024:0984-1 as openSUSE-SLE-15.5-2024-984 is not security or has no CVEs. patches: SUSE-2024-984,SUSE-SLE-Micro-5.3-2024-984,SUSE-SLE-Micro-5.4-2024-984,SUSE-SLE-Micro-5.5-2024-984,SUSE-SLE-Module-Containers-15-SP5-2024-984,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-984,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-984,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-984,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-984,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-984,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-984,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-984,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-984,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-984,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-984,SUSE-SUSE-MicroOS-5.1-2024-984,SUSE-SUSE-MicroOS-5.2-2024-984,SUSE-Storage-7.1-2024-984,openSUSE-Leap-Micro-5.3-2024-984,openSUSE-Leap-Micro-5.4-2024-984,openSUSE-SLE-15.5-2024-984 SKIP SUSE-RU-2024:0984-2 as openSUSE-SLE-15.6-2024-984 is not security or has no CVEs. patches: SUSE-2024-984,SUSE-SLE-Module-Containers-15-SP6-2024-984,openSUSE-SLE-15.6-2024-984 SKIP SUSE-RU-2024:0984-3 as SUSE-SLE-Micro-5.5-2024-984 is not security or has no CVEs. patches: SUSE-2024-984,SUSE-SLE-Micro-5.5-2024-984 SKIP SUSE-RU-2024:0985-1 as openSUSE-SLE-15.5-2024-985 is not security or has no CVEs. patches: SUSE-2024-985,SUSE-SLE-Micro-5.3-2024-985,SUSE-SLE-Micro-5.4-2024-985,SUSE-SLE-Micro-5.5-2024-985,SUSE-SLE-Module-Development-Tools-15-SP5-2024-985,SUSE-SUSE-MicroOS-5.1-2024-985,SUSE-SUSE-MicroOS-5.2-2024-985,openSUSE-Leap-Micro-5.3-2024-985,openSUSE-Leap-Micro-5.4-2024-985,openSUSE-SLE-15.5-2024-985 SKIP SUSE-RU-2024:0988-1 as SUSE-SLE-Module-Live-Patching-15-SP5-2024-988 is not security or has no CVEs. patches: SUSE-2024-988,SUSE-SLE-Module-Live-Patching-15-SP5-2024-988 SKIP SUSE-RU-2024:0994-1 as openSUSE-SLE-15.5-2024-994 is not security or has no CVEs. patches: SUSE-2024-994,SUSE-SLE-Module-Server-Applications-15-SP5-2024-994,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-994,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-994,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-994,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-994,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-994,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-994,openSUSE-SLE-15.5-2024-994 SKIP SUSE-RU-2024:0996-1 as SUSE-SLE-SERVER-12-SP5-2024-996 is not security or has no CVEs. patches: SUSE-2024-996,SUSE-SLE-SDK-12-SP5-2024-996,SUSE-SLE-SERVER-12-SP5-2024-996 SKIP SUSE-RU-2024:1004-1 as openSUSE-SLE-15.5-2024-1004 is not security or has no CVEs. patches: SUSE-2024-1004,SUSE-SLE-Module-HPC-15-SP5-2024-1004,openSUSE-SLE-15.5-2024-1004 SKIP SUSE-RU-2024:1010-1 as openSUSE-SLE-15.5-2024-1010 is not security or has no CVEs. patches: SUSE-2024-1010,SUSE-SLE-Micro-5.3-2024-1010,SUSE-SLE-Micro-5.4-2024-1010,SUSE-SLE-Micro-5.5-2024-1010,SUSE-SLE-Module-Basesystem-15-SP5-2024-1010,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1010,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1010,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1010,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1010,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1010,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1010,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1010,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1010,openSUSE-Leap-Micro-5.3-2024-1010,openSUSE-Leap-Micro-5.4-2024-1010,openSUSE-SLE-15.5-2024-1010 SKIP SUSE-RU-2024:1010-2 as SUSE-SLE-Micro-5.5-2024-1010 is not security or has no CVEs. patches: SUSE-2024-1010,SUSE-SLE-Micro-5.5-2024-1010 SKIP SUSE-RU-2024:1011-1 as SUSE-SLE-SERVER-12-SP5-2024-1011 is not security or has no CVEs. patches: SUSE-2024-1011,SUSE-SLE-SERVER-12-SP5-2024-1011 SKIP SUSE-RU-2024:1012-1 as openSUSE-SLE-15.5-2024-1012 is not security or has no CVEs. patches: SUSE-2024-1012,SUSE-SLE-INSTALLER-15-SP5-2024-1012,SUSE-SLE-Module-Basesystem-15-SP5-2024-1012,openSUSE-SLE-15.5-2024-1012 SKIP SUSE-RU-2024:1013-1 as openSUSE-SLE-15.5-2024-1013 is not security or has no CVEs. patches: SUSE-2024-1013,SUSE-SLE-Micro-5.5-2024-1013,SUSE-SLE-Module-Basesystem-15-SP5-2024-1013,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1013,openSUSE-SLE-15.5-2024-1013 SKIP SUSE-RU-2024:1015-1 as openSUSE-SLE-15.5-2024-1015 is not security or has no CVEs. patches: SUSE-2024-1015,SUSE-SLE-Micro-5.3-2024-1015,SUSE-SLE-Micro-5.4-2024-1015,SUSE-SLE-Micro-5.5-2024-1015,SUSE-SLE-Module-Basesystem-15-SP5-2024-1015,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1015,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1015,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1015,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1015,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1015,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1015,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1015,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1015,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1015,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1015,SUSE-SUSE-MicroOS-5.1-2024-1015,SUSE-SUSE-MicroOS-5.2-2024-1015,SUSE-Storage-7.1-2024-1015,openSUSE-Leap-Micro-5.3-2024-1015,openSUSE-Leap-Micro-5.4-2024-1015,openSUSE-SLE-15.5-2024-1015 SKIP SUSE-RU-2024:1015-2 as SUSE-SLE-Micro-5.5-2024-1015 is not security or has no CVEs. patches: SUSE-2024-1015,SUSE-SLE-Micro-5.5-2024-1015 SKIP SUSE-RU-2024:1055-1 as SUSE-SLE-Module-Live-Patching-15-SP5-2024-1055 is not security or has no CVEs. patches: SUSE-2024-1055,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1055 SKIP SUSE-RU-2024:1062-1 as SUSE-SLE-SERVER-12-SP5-2024-1062 is not security or has no CVEs. patches: SUSE-2024-1062,SUSE-SLE-SDK-12-SP5-2024-1062,SUSE-SLE-SERVER-12-SP5-2024-1062 SKIP SUSE-RU-2024:1076-1 as openSUSE-SLE-15.5-2024-1076 is not security or has no CVEs. patches: SUSE-2024-1076,SUSE-SLE-Micro-5.4-2024-1076,SUSE-SLE-Micro-5.5-2024-1076,SUSE-SLE-Module-Basesystem-15-SP5-2024-1076,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1076,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1076,SUSE-SLE-Product-WE-15-SP5-2024-1076,openSUSE-Leap-Micro-5.4-2024-1076,openSUSE-SLE-15.5-2024-1076 SKIP SUSE-RU-2024:1077-1 as openSUSE-SLE-15.5-2024-1077 is not security or has no CVEs. patches: SUSE-2024-1077,SUSE-SLE-Micro-5.5-2024-1077,SUSE-SLE-Module-Basesystem-15-SP5-2024-1077,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1077,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1077,openSUSE-SLE-15.5-2024-1077 SKIP SUSE-RU-2024:1080-1 as openSUSE-SLE-15.5-2024-1080 is not security or has no CVEs. patches: SUSE-2024-1080,SUSE-SLE-Micro-5.3-2024-1080,SUSE-SLE-Micro-5.4-2024-1080,SUSE-SLE-Micro-5.5-2024-1080,SUSE-SLE-Module-Basesystem-15-SP5-2024-1080,openSUSE-Leap-Micro-5.3-2024-1080,openSUSE-Leap-Micro-5.4-2024-1080,openSUSE-SLE-15.5-2024-1080 SKIP SUSE-RU-2024:1081-1 as openSUSE-SLE-15.5-2024-1081 is not security or has no CVEs. patches: SUSE-2024-1081,SUSE-SLE-Micro-5.5-2024-1081,SUSE-SLE-Module-Basesystem-15-SP5-2024-1081,openSUSE-SLE-15.5-2024-1081 SKIP SUSE-RU-2024:1081-2 as SUSE-SLE-Micro-5.5-2024-1081 is not security or has no CVEs. patches: SUSE-2024-1081,SUSE-SLE-Micro-5.5-2024-1081 SKIP SUSE-RU-2024:1082-1 as openSUSE-SLE-15.5-2024-1082 is not security or has no CVEs. patches: SUSE-2024-1082,SUSE-SLE-Micro-5.5-2024-1082,SUSE-SLE-Module-Basesystem-15-SP5-2024-1082,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1082,SUSE-SLE-Product-WE-15-SP5-2024-1082,openSUSE-SLE-15.5-2024-1082 SKIP SUSE-RU-2024:1082-2 as SUSE-SLE-Micro-5.5-2024-1082 is not security or has no CVEs. patches: SUSE-2024-1082,SUSE-SLE-Micro-5.5-2024-1082 SKIP SUSE-RU-2024:1084-1 as SUSE-SLE-Module-Public-Cloud-12-2024-1084 is not security or has no CVEs. patches: SUSE-2024-1084,SUSE-SLE-Module-Public-Cloud-12-2024-1084 SKIP SUSE-RU-2024:1085-1 as openSUSE-SLE-15.5-2024-1085 is not security or has no CVEs. patches: SUSE-2024-1085,SUSE-SLE-Micro-5.3-2024-1085,SUSE-SLE-Micro-5.4-2024-1085,SUSE-SLE-Micro-5.5-2024-1085,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1085,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1085,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1085,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1085,openSUSE-Leap-Micro-5.3-2024-1085,openSUSE-Leap-Micro-5.4-2024-1085,openSUSE-SLE-15.5-2024-1085 SKIP SUSE-RU-2024:1087-1 as openSUSE-SLE-15.5-2024-1087 is not security or has no CVEs. patches: SUSE-2024-1087,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1087,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1087,SUSE-SLE-Product-WE-15-SP5-2024-1087,openSUSE-SLE-15.5-2024-1087 SKIP SUSE-RU-2024:1088-1 as SUSE-SLE-Module-Development-Tools-15-SP5-2024-1088 is not security or has no CVEs. patches: SUSE-2024-1088,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1088 SKIP SUSE-RU-2024:1089-1 as openSUSE-SLE-15.5-2024-1089 is not security or has no CVEs. patches: SUSE-2024-1089,SUSE-SLE-Module-Basesystem-15-SP5-2024-1089,openSUSE-SLE-15.5-2024-1089 SKIP SUSE-RU-2024:1090-1 as SUSE-SLE-SERVER-12-SP5-2024-1090 is not security or has no CVEs. patches: SUSE-2024-1090,SUSE-SLE-SERVER-12-SP5-2024-1090 SKIP SUSE-RU-2024:1091-1 as openSUSE-SLE-15.5-2024-1091 is not security or has no CVEs. patches: SUSE-2024-1091,SUSE-SLE-Micro-5.4-2024-1091,SUSE-SLE-Micro-5.5-2024-1091,SUSE-SLE-Module-Basesystem-15-SP5-2024-1091,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1091,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1091,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1091,SUSE-SLE-Module-Python3-15-SP5-2024-1091,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1091,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1091,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1091,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1091,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1091,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1091,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1091,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1091,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1091,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1091,openSUSE-Leap-Micro-5.4-2024-1091,openSUSE-SLE-15.5-2024-1091 SKIP SUSE-RU-2024:1091-2 as SUSE-SLE-Micro-5.5-2024-1091 is not security or has no CVEs. patches: SUSE-2024-1091,SUSE-SLE-Micro-5.5-2024-1091 SKIP SUSE-RU-2024:1104-1 as openSUSE-SLE-15.5-2024-1104 is not security or has no CVEs. patches: SUSE-2024-1104,SUSE-SLE-Micro-5.3-2024-1104,SUSE-SLE-Micro-5.4-2024-1104,SUSE-SLE-Micro-5.5-2024-1104,SUSE-SLE-Module-Containers-15-SP5-2024-1104,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1104,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1104,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1104,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1104,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1104,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1104,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1104,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1104,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1104,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1104,SUSE-SUSE-MicroOS-5.1-2024-1104,SUSE-SUSE-MicroOS-5.2-2024-1104,SUSE-Storage-7.1-2024-1104,openSUSE-Leap-Micro-5.3-2024-1104,openSUSE-Leap-Micro-5.4-2024-1104,openSUSE-SLE-15.5-2024-1104 SKIP SUSE-RU-2024:1107-1 as SUSE-SLE-Module-Containers-12-2024-1107 is not security or has no CVEs. patches: SUSE-2024-1107,SUSE-SLE-Module-Containers-12-2024-1107 SKIP SUSE-RU-2024:1108-1 as openSUSE-SLE-15.5-2024-1108 is not security or has no CVEs. patches: SUSE-2024-1108,SUSE-SLE-Module-Basesystem-15-SP5-2024-1108,openSUSE-SLE-15.5-2024-1108 SKIP SUSE-RU-2024:1112-1 as openSUSE-SLE-15.5-2024-1112 is not security or has no CVEs. patches: SUSE-2024-1112,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1112,openSUSE-SLE-15.5-2024-1112 SKIP SUSE-RU-2024:1116-1 as openSUSE-SLE-15.5-2024-1116 is not security or has no CVEs. patches: SUSE-2024-1116,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1116,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1116,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1116,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1116,openSUSE-SLE-15.5-2024-1116 SKIP SUSE-RU-2024:1117-1 as SUSE-SLE-Module-Public-Cloud-12-2024-1117 is not security or has no CVEs. patches: SUSE-2024-1117,SUSE-SLE-Module-Public-Cloud-12-2024-1117 SKIP SUSE-RU-2024:1123-1 as SUSE-SLE-SERVER-12-SP5-2024-1123 is not security or has no CVEs. patches: SUSE-2024-1123,SUSE-SLE-SERVER-12-SP5-2024-1123 SKIP SUSE-RU-2024:1126-1 as SUSE-Storage-7.1-2024-1126 is not security or has no CVEs. patches: SUSE-2024-1126,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1126,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1126,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1126,SUSE-SUSE-MicroOS-5.1-2024-1126,SUSE-SUSE-MicroOS-5.2-2024-1126,SUSE-Storage-7.1-2024-1126 SKIP SUSE-RU-2024:1127-1 as openSUSE-SLE-15.5-2024-1127 is not security or has no CVEs. patches: SUSE-2024-1127,SUSE-SLE-Micro-5.5-2024-1127,SUSE-SLE-Module-Basesystem-15-SP5-2024-1127,openSUSE-SLE-15.5-2024-1127 SKIP SUSE-RU-2024:1128-1 as openSUSE-Leap-Micro-5.4-2024-1128 is not security or has no CVEs. patches: SUSE-2024-1128,SUSE-SLE-Micro-5.3-2024-1128,SUSE-SLE-Micro-5.4-2024-1128,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1128,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1128,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1128,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1128,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1128,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1128,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1128,openSUSE-Leap-Micro-5.3-2024-1128,openSUSE-Leap-Micro-5.4-2024-1128 SKIP SUSE-RU-2024:1155-1 as SUSE-Storage-7.1-2024-1155 is not security or has no CVEs. patches: SUSE-2024-1155,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1155,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1155,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1155,SUSE-Storage-7.1-2024-1155 SKIP SUSE-RU-2024:1159-1 as openSUSE-SLE-15.5-2024-1159 is not security or has no CVEs. patches: SUSE-2024-1159,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1159,openSUSE-SLE-15.5-2024-1159 SKIP SUSE-RU-2024:1168-1 as SUSE-SLE-WE-12-SP5-2024-1168 is not security or has no CVEs. patches: SUSE-2024-1168,SUSE-SLE-SDK-12-SP5-2024-1168,SUSE-SLE-WE-12-SP5-2024-1168 SKIP SUSE-RU-2024:1173-1 as openSUSE-SLE-15.5-2024-1173 is not security or has no CVEs. patches: SUSE-2024-1173,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1173,openSUSE-SLE-15.5-2024-1173 SKIP SUSE-RU-2024:1175-1 as openSUSE-SLE-15.5-2024-1175 is not security or has no CVEs. patches: SUSE-2024-1175,SUSE-SLE-Micro-5.5-2024-1175,SUSE-SLE-Module-Basesystem-15-SP5-2024-1175,openSUSE-SLE-15.5-2024-1175 SKIP SUSE-RU-2024:1175-2 as SUSE-SLE-Micro-5.5-2024-1175 is not security or has no CVEs. patches: SUSE-2024-1175,SUSE-SLE-Micro-5.5-2024-1175 SKIP SUSE-RU-2024:1176-1 as openSUSE-SLE-15.5-2024-1176 is not security or has no CVEs. patches: SUSE-2024-1176,SUSE-SLE-Manager-Tools-15-2024-1176,SUSE-SLE-Micro-5.3-2024-1176,SUSE-SLE-Micro-5.4-2024-1176,SUSE-SLE-Micro-5.5-2024-1176,SUSE-SLE-Module-Basesystem-15-SP5-2024-1176,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1176,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1176,SUSE-SUSE-MicroOS-5.2-2024-1176,openSUSE-Leap-Micro-5.3-2024-1176,openSUSE-Leap-Micro-5.4-2024-1176,openSUSE-SLE-15.5-2024-1176 SKIP SUSE-RU-2024:1176-2 as SUSE-SLE-Micro-5.5-2024-1176 is not security or has no CVEs. patches: SUSE-2024-1176,SUSE-SLE-Micro-5.5-2024-1176 SKIP SUSE-RU-2024:1177-1 as openSUSE-Leap-Micro-5.4-2024-1177 is not security or has no CVEs. patches: SUSE-2024-1177,SUSE-SLE-Micro-5.3-2024-1177,SUSE-SLE-Micro-5.4-2024-1177,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1177,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1177,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1177,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1177,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1177,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1177,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1177,openSUSE-Leap-Micro-5.3-2024-1177,openSUSE-Leap-Micro-5.4-2024-1177 SKIP SUSE-RU-2024:1178-1 as openSUSE-SLE-15.5-2024-1178 is not security or has no CVEs. patches: SUSE-2024-1178,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1178,openSUSE-SLE-15.5-2024-1178 SKIP SUSE-RU-2024:1180-1 as openSUSE-SLE-15.5-2024-1180 is not security or has no CVEs. patches: SUSE-2024-1180,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1180,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1180,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1180,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1180,SUSE-SUSE-MicroOS-5.2-2024-1180,openSUSE-SLE-15.5-2024-1180 SKIP SUSE-RU-2024:1191-1 as openSUSE-SLE-15.5-2024-1191 is not security or has no CVEs. patches: SUSE-2024-1191,SUSE-SLE-Module-Basesystem-15-SP5-2024-1191,openSUSE-SLE-15.5-2024-1191 SKIP SUSE-RU-2024:1194-1 as SUSE-2024-1194 is not security or has no CVEs. patches: SUSE-2024-1194 SKIP SUSE-RU-2024:1195-1 as openSUSE-SLE-15.5-2024-1195 is not security or has no CVEs. patches: SUSE-2024-1195,openSUSE-SLE-15.5-2024-1195 SKIP SUSE-RU-2024:1197-1 as openSUSE-SLE-15.5-2024-1197 is not security or has no CVEs. patches: SUSE-2024-1197,SUSE-SLE-Micro-5.5-2024-1197,SUSE-SLE-Module-Basesystem-15-SP5-2024-1197,openSUSE-SLE-15.5-2024-1197 SKIP SUSE-RU-2024:1197-2 as SUSE-SLE-Micro-5.5-2024-1197 is not security or has no CVEs. patches: SUSE-2024-1197,SUSE-SLE-Micro-5.5-2024-1197 SKIP SUSE-RU-2024:1200-1 as openSUSE-SLE-15.5-2024-1200 is not security or has no CVEs. patches: SUSE-2024-1200,SUSE-SLE-Module-Basesystem-15-SP5-2024-1200,SUSE-SLE-Module-Legacy-15-SP5-2024-1200,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1200,openSUSE-SLE-15.5-2024-1200 SKIP SUSE-RU-2024:1201-1 as openSUSE-SLE-15.5-2024-1201 is not security or has no CVEs. patches: SUSE-2024-1201,SUSE-SLE-Micro-5.3-2024-1201,SUSE-SLE-Micro-5.4-2024-1201,SUSE-SLE-Micro-5.5-2024-1201,SUSE-SLE-Module-Basesystem-15-SP5-2024-1201,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1201,openSUSE-Leap-Micro-5.3-2024-1201,openSUSE-Leap-Micro-5.4-2024-1201,openSUSE-SLE-15.5-2024-1201 SKIP SUSE-RU-2024:1206-1 as openSUSE-SLE-15.5-2024-1206 is not security or has no CVEs. patches: SUSE-2024-1206,SUSE-SLE-Micro-5.4-2024-1206,SUSE-SLE-Micro-5.5-2024-1206,SUSE-SLE-Module-Basesystem-15-SP5-2024-1206,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1206,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1206,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1206,SUSE-SLE-Module-Python3-15-SP5-2024-1206,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1206,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1206,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1206,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1206,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1206,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1206,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1206,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1206,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1206,openSUSE-Leap-Micro-5.4-2024-1206,openSUSE-SLE-15.5-2024-1206 SKIP SUSE-RU-2024:1231-1 as openSUSE-SLE-15.5-2024-1231 is not security or has no CVEs. patches: SUSE-2024-1231,SUSE-SLE-Micro-5.3-2024-1231,SUSE-SLE-Micro-5.4-2024-1231,SUSE-SLE-Micro-5.5-2024-1231,SUSE-SLE-Module-Basesystem-15-SP5-2024-1231,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1231,SUSE-SUSE-MicroOS-5.1-2024-1231,SUSE-SUSE-MicroOS-5.2-2024-1231,openSUSE-Leap-Micro-5.3-2024-1231,openSUSE-Leap-Micro-5.4-2024-1231,openSUSE-SLE-15.5-2024-1231 SKIP SUSE-RU-2024:1253-1 as openSUSE-SLE-15.5-2024-1253 is not security or has no CVEs. patches: SUSE-2024-1253,SUSE-SLE-INSTALLER-15-SP2-2024-1253,SUSE-SLE-INSTALLER-15-SP3-2024-1253,SUSE-SLE-INSTALLER-15-SP4-2024-1253,SUSE-SLE-INSTALLER-15-SP5-2024-1253,SUSE-SLE-Micro-5.3-2024-1253,SUSE-SLE-Micro-5.4-2024-1253,SUSE-SLE-Micro-5.5-2024-1253,SUSE-SLE-Module-Basesystem-15-SP5-2024-1253,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1253,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1253,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1253,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1253,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1253,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1253,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1253,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1253,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1253,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1253,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1253,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1253,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1253,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1253,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1253,SUSE-SUSE-MicroOS-5.1-2024-1253,SUSE-SUSE-MicroOS-5.2-2024-1253,SUSE-Storage-7.1-2024-1253,openSUSE-Leap-Micro-5.3-2024-1253,openSUSE-Leap-Micro-5.4-2024-1253,openSUSE-SLE-15.5-2024-1253 SKIP SUSE-RU-2024:1254-1 as SUSE-SUSE-MicroOS-5.1-2024-1254 is not security or has no CVEs. patches: SUSE-2024-1254,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1254,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1254,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1254,SUSE-SUSE-MicroOS-5.1-2024-1254 SKIP SUSE-RU-2024:1255-1 as openSUSE-SLE-15.5-2024-1255 is not security or has no CVEs. patches: SUSE-2024-1255,SUSE-SLE-Micro-5.5-2024-1255,SUSE-SLE-Module-Basesystem-15-SP5-2024-1255,openSUSE-SLE-15.5-2024-1255 SKIP SUSE-RU-2024:1272-1 as SUSE-Elemental-5.5-2024-1272 is not security or has no CVEs. patches: SUSE-2024-1272,SUSE-Elemental-5.5-2024-1272 SKIP SUSE-RU-2024:1279-1 as openSUSE-SLE-15.5-2024-1279 is not security or has no CVEs. patches: SUSE-2024-1279,SUSE-SLE-Micro-5.3-2024-1279,SUSE-SLE-Micro-5.4-2024-1279,SUSE-SLE-Micro-5.5-2024-1279,SUSE-SLE-Module-Basesystem-15-SP5-2024-1279,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1279,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1279,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1279,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1279,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1279,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1279,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1279,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1279,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1279,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1279,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1279,SUSE-SUSE-MicroOS-5.2-2024-1279,SUSE-Storage-7.1-2024-1279,openSUSE-Leap-Micro-5.3-2024-1279,openSUSE-Leap-Micro-5.4-2024-1279,openSUSE-SLE-15.5-2024-1279 SKIP SUSE-RU-2024:1281-1 as openSUSE-SLE-15.5-2024-1281 is not security or has no CVEs. patches: SUSE-2024-1281,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1281,openSUSE-SLE-15.5-2024-1281 SKIP SUSE-RU-2024:1282-1 as SUSE-SLE-HA-12-SP5-2024-1282 is not security or has no CVEs. patches: SUSE-2024-1282,SUSE-SLE-HA-12-SP5-2024-1282 SKIP SUSE-RU-2024:1284-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1284 is not security or has no CVEs. patches: SUSE-2024-1284,SUSE-SLE-INSTALLER-15-SP4-2024-1284,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1284,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1284,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1284,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1284,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1284,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1284,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1284 SKIP SUSE-RU-2024:1284-2 as SUSE-SLE-INSTALLER-15-SP4-2024-1284 is not security or has no CVEs. patches: SUSE-2024-1284,SUSE-SLE-INSTALLER-15-SP4-2024-1284 SKIP SUSE-RU-2024:1285-1 as SUSE-Storage-7.1-2024-1285 is not security or has no CVEs. patches: SUSE-2024-1285,SUSE-SLE-INSTALLER-15-SP3-2024-1285,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1285,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1285,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1285,SUSE-SUSE-MicroOS-5.1-2024-1285,SUSE-SUSE-MicroOS-5.2-2024-1285,SUSE-Storage-7.1-2024-1285 SKIP SUSE-RU-2024:1286-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1286 is not security or has no CVEs. patches: SUSE-2024-1286,SUSE-SLE-INSTALLER-15-SP4-2024-1286,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1286,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1286,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1286,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1286 SKIP SUSE-RU-2024:1302-1 as openSUSE-SLE-15.5-2024-1302 is not security or has no CVEs. patches: SUSE-2024-1302,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1302,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1302,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1302,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1302,SUSE-SUSE-MicroOS-5.2-2024-1302,openSUSE-SLE-15.5-2024-1302 SKIP SUSE-RU-2024:1314-1 as openSUSE-SLE-15.5-2024-1314 is not security or has no CVEs. patches: SUSE-2024-1314,SUSE-SLE-Module-Basesystem-15-SP5-2024-1314,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1314,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1314,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1314,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1314,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1314,openSUSE-SLE-15.5-2024-1314 SKIP SUSE-RU-2024:1315-1 as openSUSE-SLE-15.5-2024-1315 is not security or has no CVEs. patches: SUSE-2024-1315,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1315,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1315,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1315,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1315,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1315,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1315,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1315,openSUSE-SLE-15.5-2024-1315 SKIP SUSE-RU-2024:1316-1 as openSUSE-SLE-15.5-2024-1316 is not security or has no CVEs. patches: SUSE-2024-1316,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1316,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1316,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1316,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1316,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1316,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1316,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1316,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1316,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1316,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1316,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1316,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1316,SUSE-Storage-7.1-2024-1316,openSUSE-SLE-15.5-2024-1316 SKIP SUSE-RU-2024:1323-1 as SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1323 is not security or has no CVEs. patches: SUSE-2024-1323,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1323 SKIP SUSE-RU-2024:1324-1 as openSUSE-SLE-15.5-2024-1324 is not security or has no CVEs. patches: SUSE-2024-1324,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1324,openSUSE-SLE-15.5-2024-1324 SKIP SUSE-RU-2024:1325-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1325 is not security or has no CVEs. patches: SUSE-2024-1325,SUSE-SLE-Micro-5.3-2024-1325,SUSE-SLE-Micro-5.4-2024-1325,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1325,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1325,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1325,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1325,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1325,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1325,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1325 SKIP SUSE-RU-2024:1326-1 as openSUSE-SLE-15.5-2024-1326 is not security or has no CVEs. patches: SUSE-2024-1326,SUSE-SLE-Micro-5.5-2024-1326,SUSE-SLE-Module-Basesystem-15-SP5-2024-1326,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1326,openSUSE-SLE-15.5-2024-1326 SKIP SUSE-RU-2024:1327-1 as openSUSE-SLE-15.5-2024-1327 is not security or has no CVEs. patches: SUSE-2024-1327,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1327,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1327,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1327,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1327,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1327,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1327,openSUSE-SLE-15.5-2024-1327 SKIP SUSE-RU-2024:1328-1 as openSUSE-SLE-15.5-2024-1328 is not security or has no CVEs. patches: SUSE-2024-1328,SUSE-SLE-Product-HA-15-SP5-2024-1328,openSUSE-SLE-15.5-2024-1328 SKIP SUSE-RU-2024:1329-1 as SUSE-SLE-Product-HA-15-SP3-2024-1329 is not security or has no CVEs. patches: SUSE-2024-1329,SUSE-SLE-Product-HA-15-SP3-2024-1329 SKIP SUSE-RU-2024:1330-1 as SUSE-SLE-Product-HA-15-SP4-2024-1330 is not security or has no CVEs. patches: SUSE-2024-1330,SUSE-SLE-Product-HA-15-SP4-2024-1330 SKIP SUSE-RU-2024:1331-1 as openSUSE-SLE-15.5-2024-1331 is not security or has no CVEs. patches: SUSE-2024-1331,SUSE-SLE-Micro-5.5-2024-1331,SUSE-SLE-Module-Basesystem-15-SP5-2024-1331,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1331,openSUSE-SLE-15.5-2024-1331 SKIP SUSE-RU-2024:1331-2 as SUSE-SLE-Micro-5.5-2024-1331 is not security or has no CVEs. patches: SUSE-2024-1331,SUSE-SLE-Micro-5.5-2024-1331 SKIP SUSE-RU-2024:1333-1 as openSUSE-SLE-15.5-2024-1333 is not security or has no CVEs. patches: SUSE-2024-1333,SUSE-SLE-Micro-5.5-2024-1333,SUSE-SLE-Module-Basesystem-15-SP5-2024-1333,SUSE-SLE-Product-HA-15-SP5-2024-1333,openSUSE-SLE-15.5-2024-1333 SKIP SUSE-RU-2024:1333-2 as SUSE-SLE-Micro-5.5-2024-1333 is not security or has no CVEs. patches: SUSE-2024-1333,SUSE-SLE-Micro-5.5-2024-1333 SKIP SUSE-RU-2024:1334-1 as SUSE-SLE-SERVER-12-SP5-2024-1334 is not security or has no CVEs. patches: SUSE-2024-1334,SUSE-SLE-SERVER-12-SP5-2024-1334 SKIP SUSE-RU-2024:1335-1 as SUSE-Storage-7.1-2024-1335 is not security or has no CVEs. patches: SUSE-2024-1335,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1335,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1335,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1335,SUSE-SUSE-MicroOS-5.1-2024-1335,SUSE-SUSE-MicroOS-5.2-2024-1335,SUSE-Storage-7.1-2024-1335 SKIP SUSE-RU-2024:1336-1 as openSUSE-SLE-15.5-2024-1336 is not security or has no CVEs. patches: SUSE-2024-1336,SUSE-SLE-Micro-5.5-2024-1336,SUSE-SLE-Module-Basesystem-15-SP5-2024-1336,openSUSE-SLE-15.5-2024-1336 SKIP SUSE-RU-2024:1337-1 as openSUSE-Leap-Micro-5.4-2024-1337 is not security or has no CVEs. patches: SUSE-2024-1337,SUSE-SLE-Micro-5.3-2024-1337,SUSE-SLE-Micro-5.4-2024-1337,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1337,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1337,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1337,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1337,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1337,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1337,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1337,openSUSE-Leap-Micro-5.3-2024-1337,openSUSE-Leap-Micro-5.4-2024-1337 SKIP SUSE-RU-2024:1341-1 as openSUSE-SLE-15.5-2024-1341 is not security or has no CVEs. patches: SUSE-2024-1341,SUSE-SLE-Micro-5.3-2024-1341,SUSE-SLE-Micro-5.4-2024-1341,SUSE-SLE-Micro-5.5-2024-1341,SUSE-SLE-Module-Basesystem-15-SP5-2024-1341,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1341,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1341,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1341,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1341,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1341,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1341,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1341,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1341,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1341,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1341,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1341,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1341,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1341,SUSE-SUSE-MicroOS-5.1-2024-1341,SUSE-SUSE-MicroOS-5.2-2024-1341,SUSE-Storage-7.1-2024-1341,openSUSE-Leap-Micro-5.3-2024-1341,openSUSE-Leap-Micro-5.4-2024-1341,openSUSE-SLE-15.5-2024-1341 SKIP SUSE-RU-2024:1341-2 as SUSE-SLE-Micro-5.5-2024-1341 is not security or has no CVEs. patches: SUSE-2024-1341,SUSE-SLE-Micro-5.5-2024-1341 SKIP SUSE-RU-2024:1342-1 as openSUSE-SLE-15.5-2024-1342 is not security or has no CVEs. patches: SUSE-2024-1342,SUSE-SLE-Micro-5.3-2024-1342,SUSE-SLE-Micro-5.4-2024-1342,SUSE-SLE-Micro-5.5-2024-1342,SUSE-SLE-Module-Basesystem-15-SP5-2024-1342,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1342,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1342,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1342,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1342,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1342,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1342,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1342,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1342,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1342,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1342,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1342,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1342,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1342,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1342,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1342,SUSE-SUSE-MicroOS-5.1-2024-1342,SUSE-SUSE-MicroOS-5.2-2024-1342,SUSE-Storage-7.1-2024-1342,openSUSE-Leap-Micro-5.3-2024-1342,openSUSE-Leap-Micro-5.4-2024-1342,openSUSE-SLE-15.5-2024-1342 SKIP SUSE-RU-2024:1342-2 as SUSE-SLE-Micro-5.5-2024-1342 is not security or has no CVEs. patches: SUSE-2024-1342,SUSE-SLE-Micro-5.5-2024-1342 SKIP SUSE-RU-2024:1342-3 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1342 is not security or has no CVEs. patches: SUSE-2024-1342,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1342,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1342,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1342 SKIP SUSE-RU-2024:1342-4 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1342 is not security or has no CVEs. patches: SUSE-2024-1342,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1342,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1342,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1342 SKIP SUSE-RU-2024:1343-1 as openSUSE-SLE-15.5-2024-1343 is not security or has no CVEs. patches: SUSE-2024-1343,SUSE-SLE-Module-Basesystem-15-SP5-2024-1343,openSUSE-SLE-15.5-2024-1343 SKIP SUSE-RU-2024:1343-2 as SUSE-SLE-Micro-5.5-2024-1343 is not security or has no CVEs. patches: SUSE-2024-1343,SUSE-SLE-Micro-5.5-2024-1343 SKIP SUSE-RU-2024:1344-1 as openSUSE-SLE-15.5-2024-1344 is not security or has no CVEs. patches: SUSE-2024-1344,SUSE-SLE-INSTALLER-15-SP4-2024-1344,SUSE-SLE-INSTALLER-15-SP5-2024-1344,SUSE-SLE-Micro-5.3-2024-1344,SUSE-SLE-Micro-5.4-2024-1344,SUSE-SLE-Micro-5.5-2024-1344,SUSE-SLE-Module-Basesystem-15-SP5-2024-1344,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1344,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1344,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1344,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1344,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1344,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1344,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1344,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1344,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1344,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1344,SUSE-SLE-Product-WE-15-SP5-2024-1344,openSUSE-Leap-Micro-5.3-2024-1344,openSUSE-Leap-Micro-5.4-2024-1344,openSUSE-SLE-15.5-2024-1344 SKIP SUSE-RU-2024:1348-1 as openSUSE-SLE-15.5-2024-1348 is not security or has no CVEs. patches: SUSE-2024-1348,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1348,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1348,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1348,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1348,openSUSE-SLE-15.5-2024-1348 SKIP SUSE-RU-2024:1349-1 as SUSE-SLE-Module-Public-Cloud-12-2024-1349 is not security or has no CVEs. patches: SUSE-2024-1349,SUSE-SLE-Module-Public-Cloud-12-2024-1349 SKIP SUSE-RU-2024:1352-1 as openSUSE-SLE-15.5-2024-1352 is not security or has no CVEs. patches: SUSE-2024-1352,SUSE-SLE-Micro-5.5-2024-1352,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1352,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1352,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1352,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1352,openSUSE-SLE-15.5-2024-1352 SKIP SUSE-RU-2024:1353-1 as SUSE-SLE-Module-Toolchain-12-2024-1353 is not security or has no CVEs. patches: SUSE-2024-1353,SUSE-SLE-Module-Toolchain-12-2024-1353 SKIP SUSE-RU-2024:1366-1 as openSUSE-SLE-15.5-2024-1366 is not security or has no CVEs. patches: SUSE-2024-1366,SUSE-SLE-Micro-5.3-2024-1366,SUSE-SLE-Micro-5.4-2024-1366,SUSE-SLE-Micro-5.5-2024-1366,SUSE-SLE-Module-Basesystem-15-SP5-2024-1366,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1366,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1366,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1366,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1366,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1366,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1366,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1366,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1366,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1366,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1366,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1366,SUSE-SUSE-MicroOS-5.1-2024-1366,SUSE-SUSE-MicroOS-5.2-2024-1366,SUSE-Storage-7.1-2024-1366,openSUSE-Leap-Micro-5.3-2024-1366,openSUSE-Leap-Micro-5.4-2024-1366,openSUSE-SLE-15.5-2024-1366 SKIP SUSE-RU-2024:1366-2 as SUSE-SLE-Micro-5.5-2024-1366 is not security or has no CVEs. patches: SUSE-2024-1366,SUSE-SLE-Micro-5.5-2024-1366 SKIP SUSE-RU-2024:1369-1 as SUSE-SLE-SERVER-12-SP5-2024-1369 is not security or has no CVEs. patches: SUSE-2024-1369,SUSE-SLE-SDK-12-SP5-2024-1369,SUSE-SLE-SERVER-12-SP5-2024-1369 SKIP SUSE-RU-2024:1370-1 as openSUSE-SLE-15.5-2024-1370 is not security or has no CVEs. patches: SUSE-2024-1370,SUSE-SLE-Module-Basesystem-15-SP5-2024-1370,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1370,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1370,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1370,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1370,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1370,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1370,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1370,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1370,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1370,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1370,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1370,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1370,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1370,SUSE-Storage-7.1-2024-1370,openSUSE-SLE-15.5-2024-1370 SKIP SUSE-RU-2024:1371-1 as openSUSE-SLE-15.5-2024-1371 is not security or has no CVEs. patches: SUSE-2024-1371,SUSE-SLE-Micro-5.3-2024-1371,SUSE-SLE-Micro-5.4-2024-1371,SUSE-SLE-Micro-5.5-2024-1371,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1371,SUSE-SUSE-MicroOS-5.1-2024-1371,SUSE-SUSE-MicroOS-5.2-2024-1371,openSUSE-Leap-Micro-5.3-2024-1371,openSUSE-Leap-Micro-5.4-2024-1371,openSUSE-SLE-15.5-2024-1371 SKIP SUSE-RU-2024:1371-2 as SUSE-SLE-Micro-5.5-2024-1371 is not security or has no CVEs. patches: SUSE-2024-1371,SUSE-SLE-Micro-5.5-2024-1371 SKIP SUSE-RU-2024:1372-1 as openSUSE-SLE-15.5-2024-1372 is not security or has no CVEs. patches: SUSE-2024-1372,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1372,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1372,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1372,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1372,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1372,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1372,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1372,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1372,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1372,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1372,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1372,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1372,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1372,SUSE-Storage-7.1-2024-1372,openSUSE-SLE-15.5-2024-1372 SKIP SUSE-RU-2024:1374-1 as SUSE-SLE-SERVER-12-SP5-2024-1374 is not security or has no CVEs. patches: SUSE-2024-1374,SUSE-SLE-SERVER-12-SP5-2024-1374 SKIP SUSE-RU-2024:1378-1 as SUSE-SLE-SERVER-12-SP5-2024-1378 is not security or has no CVEs. patches: SUSE-2024-1378,SUSE-SLE-SDK-12-SP5-2024-1378,SUSE-SLE-SERVER-12-SP5-2024-1378 SKIP SUSE-RU-2024:1392-1 as openSUSE-SLE-15.5-2024-1392 is not security or has no CVEs. patches: SUSE-2024-1392,SUSE-SLE-Module-Basesystem-15-SP5-2024-1392,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1392,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1392,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1392,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1392,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1392,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1392,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1392,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1392,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1392,openSUSE-SLE-15.5-2024-1392 SKIP SUSE-RU-2024:1393-1 as openSUSE-SLE-15.5-2024-1393 is not security or has no CVEs. patches: SUSE-2024-1393,SUSE-SLE-Module-Basesystem-15-SP5-2024-1393,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1393,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1393,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1393,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1393,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1393,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1393,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1393,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1393,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1393,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1393,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1393,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1393,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1393,SUSE-Storage-7.1-2024-1393,openSUSE-SLE-15.5-2024-1393 SKIP SUSE-RU-2024:1397-1 as openSUSE-Leap-Micro-5.4-2024-1397 is not security or has no CVEs. patches: SUSE-2024-1397,SUSE-SLE-Micro-5.3-2024-1397,SUSE-SLE-Micro-5.4-2024-1397,SUSE-SLE-Micro-5.5-2024-1397,SUSE-SLE-Module-Basesystem-15-SP5-2024-1397,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1397,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1397,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1397,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1397,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1397,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1397,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1397,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1397,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1397,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1397,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1397,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1397,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1397,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1397,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1397,SUSE-Storage-7.1-2024-1397,openSUSE-Leap-Micro-5.3-2024-1397,openSUSE-Leap-Micro-5.4-2024-1397 SKIP SUSE-RU-2024:1398-1 as openSUSE-SLE-15.5-2024-1398 is not security or has no CVEs. patches: SUSE-2024-1398,SUSE-SLE-Micro-5.3-2024-1398,SUSE-SLE-Micro-5.4-2024-1398,SUSE-SLE-Micro-5.5-2024-1398,SUSE-SLE-Module-Basesystem-15-SP5-2024-1398,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1398,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1398,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1398,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1398,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1398,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1398,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1398,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1398,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1398,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1398,SUSE-SUSE-MicroOS-5.1-2024-1398,SUSE-SUSE-MicroOS-5.2-2024-1398,SUSE-Storage-7.1-2024-1398,openSUSE-Leap-Micro-5.3-2024-1398,openSUSE-Leap-Micro-5.4-2024-1398,openSUSE-SLE-15.5-2024-1398 SKIP SUSE-RU-2024:1398-2 as SUSE-SLE-Micro-5.5-2024-1398 is not security or has no CVEs. patches: SUSE-2024-1398,SUSE-SLE-Micro-5.5-2024-1398 SKIP SUSE-RU-2024:1399-1 as SUSE-SLE-SERVER-12-SP5-2024-1399 is not security or has no CVEs. patches: SUSE-2024-1399,SUSE-SLE-SDK-12-SP5-2024-1399,SUSE-SLE-SERVER-12-SP5-2024-1399 SKIP SUSE-RU-2024:1412-1 as openSUSE-SLE-15.5-2024-1412 is not security or has no CVEs. patches: SUSE-2024-1412,SUSE-SLE-Module-Basesystem-15-SP5-2024-1412,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1412,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1412,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1412,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1412,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1412,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1412,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1412,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1412,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1412,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1412,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1412,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1412,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1412,SUSE-Storage-7.1-2024-1412,openSUSE-SLE-15.5-2024-1412 ERROR: notice SUSE-RU-2024:1420-1 has no valid patches out of: SUSE-2024-1420,SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-1420 ERROR: notice SUSE-RU-2024:1421-1 has no valid patches out of: SUSE-2024-1421,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-1421 SKIP SUSE-RU-2024:1424-1 as SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1424 is not security or has no CVEs. patches: SUSE-2024-1424,SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1424 ERROR: notice SUSE-RU-2024:1425-1 has no valid patches out of: SUSE-2024-1425,SUSE-Debian-12-CLIENT-TOOLS-BETA-2024-1425 ERROR: notice SUSE-RU-2024:1426-1 has no valid patches out of: SUSE-2024-1426,SUSE-Debian-11-CLIENT-TOOLS-BETA-2024-1426 SKIP SUSE-RU-2024:1429-1 as openSUSE-SLE-15.5-2024-1429 is not security or has no CVEs. patches: SUSE-2024-1429,SUSE-SLE-Micro-5.3-2024-1429,SUSE-SLE-Micro-5.4-2024-1429,SUSE-SLE-Micro-5.5-2024-1429,SUSE-SLE-Module-Basesystem-15-SP5-2024-1429,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1429,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1429,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1429,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1429,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1429,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1429,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1429,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1429,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1429,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1429,SUSE-SUSE-MicroOS-5.1-2024-1429,SUSE-SUSE-MicroOS-5.2-2024-1429,SUSE-Storage-7.1-2024-1429,openSUSE-Leap-Micro-5.3-2024-1429,openSUSE-Leap-Micro-5.4-2024-1429,openSUSE-SLE-15.5-2024-1429 SKIP SUSE-RU-2024:1429-2 as SUSE-SLE-Micro-5.5-2024-1429 is not security or has no CVEs. patches: SUSE-2024-1429,SUSE-SLE-Micro-5.5-2024-1429 SKIP SUSE-RU-2024:1431-1 as SUSE-2024-1431 is not security or has no CVEs. patches: SUSE-2024-1431 SKIP SUSE-RU-2024:1432-1 as openSUSE-SLE-15.5-2024-1432 is not security or has no CVEs. patches: SUSE-2024-1432,openSUSE-SLE-15.5-2024-1432 SKIP SUSE-RU-2024:1433-1 as SUSE-Storage-7.1-2024-1433 is not security or has no CVEs. patches: SUSE-2024-1433,SUSE-SLE-INSTALLER-15-SP2-2024-1433,SUSE-SLE-INSTALLER-15-SP3-2024-1433,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1433,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1433,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1433,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1433,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1433,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1433,SUSE-SUSE-MicroOS-5.1-2024-1433,SUSE-SUSE-MicroOS-5.2-2024-1433,SUSE-Storage-7.1-2024-1433 SKIP SUSE-RU-2024:1434-1 as SUSE-Storage-7.1-2024-1434 is not security or has no CVEs. patches: SUSE-2024-1434,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1434,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1434,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1434,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1434,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1434,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1434,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1434,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1434,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1434,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1434,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1434,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1434,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1434,SUSE-SUSE-MicroOS-5.1-2024-1434,SUSE-SUSE-MicroOS-5.2-2024-1434,SUSE-Storage-7.1-2024-1434 SKIP SUSE-RU-2024:1436-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1436 is not security or has no CVEs. patches: SUSE-2024-1436,SUSE-SLE-Micro-5.3-2024-1436,SUSE-SLE-Micro-5.4-2024-1436,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1436,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1436,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1436,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1436,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1436,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1436,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1436 SKIP SUSE-RU-2024:1441-1 as openSUSE-SLE-15.5-2024-1441 is not security or has no CVEs. patches: SUSE-2024-1441,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1441,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1441,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1441,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1441,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1441,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1441,openSUSE-SLE-15.5-2024-1441 SKIP SUSE-RU-2024:1442-1 as openSUSE-SLE-15.5-2024-1442 is not security or has no CVEs. patches: SUSE-2024-1442,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1442,openSUSE-SLE-15.5-2024-1442 SKIP SUSE-RU-2024:1443-1 as openSUSE-SLE-15.5-2024-1443 is not security or has no CVEs. patches: SUSE-2024-1443,SUSE-SLE-Module-Basesystem-15-SP5-2024-1443,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1443,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1443,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1443,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1443,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1443,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1443,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1443,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1443,openSUSE-SLE-15.5-2024-1443 SKIP SUSE-RU-2024:1449-1 as openSUSE-SLE-15.5-2024-1449 is not security or has no CVEs. patches: SUSE-2024-1449,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1449,openSUSE-SLE-15.5-2024-1449 SKIP SUSE-RU-2024:1455-1 as SUSE-SLE-SERVER-12-SP5-2024-1455 is not security or has no CVEs. patches: SUSE-2024-1455,SUSE-SLE-SERVER-12-SP5-2024-1455 SKIP SUSE-RU-2024:1456-1 as SUSE-SLE-SERVER-12-SP5-2024-1456 is not security or has no CVEs. patches: SUSE-2024-1456,SUSE-SLE-SDK-12-SP5-2024-1456,SUSE-SLE-SERVER-12-SP5-2024-1456 SKIP SUSE-RU-2024:1457-1 as openSUSE-SLE-15.5-2024-1457 is not security or has no CVEs. patches: SUSE-2024-1457,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1457,openSUSE-SLE-15.5-2024-1457 SKIP SUSE-RU-2024:1458-1 as openSUSE-SLE-15.5-2024-1458 is not security or has no CVEs. patches: SUSE-2024-1458,SUSE-SLE-Micro-5.5-2024-1458,SUSE-SLE-Module-Basesystem-15-SP5-2024-1458,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1458,openSUSE-SLE-15.5-2024-1458 SKIP SUSE-RU-2024:1458-2 as SUSE-SLE-Micro-5.5-2024-1458 is not security or has no CVEs. patches: SUSE-2024-1458,SUSE-SLE-Micro-5.5-2024-1458 SKIP SUSE-RU-2024:1459-1 as openSUSE-Leap-Micro-5.4-2024-1459 is not security or has no CVEs. patches: SUSE-2024-1459,SUSE-SLE-Micro-5.3-2024-1459,SUSE-SLE-Micro-5.4-2024-1459,SUSE-SUSE-MicroOS-5.1-2024-1459,SUSE-SUSE-MicroOS-5.2-2024-1459,openSUSE-Leap-Micro-5.3-2024-1459,openSUSE-Leap-Micro-5.4-2024-1459 SKIP SUSE-RU-2024:1460-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1460 is not security or has no CVEs. patches: SUSE-2024-1460,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1460,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1460 SKIP SUSE-RU-2024:1467-1 as openSUSE-SLE-15.5-2024-1467 is not security or has no CVEs. patches: SUSE-2024-1467,SUSE-SLE-Module-Basesystem-15-SP5-2024-1467,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1467,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1467,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1467,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1467,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1467,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1467,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1467,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1467,SUSE-SLE-Product-WE-15-SP5-2024-1467,openSUSE-SLE-15.5-2024-1467 SKIP SUSE-RU-2024:1471-1 as openSUSE-SLE-15.5-2024-1471 is not security or has no CVEs. patches: SUSE-2024-1471,SUSE-SLE-INSTALLER-15-SP4-2024-1471,SUSE-SLE-INSTALLER-15-SP5-2024-1471,SUSE-SLE-Micro-5.3-2024-1471,SUSE-SLE-Micro-5.4-2024-1471,SUSE-SLE-Micro-5.5-2024-1471,SUSE-SLE-Module-Basesystem-15-SP5-2024-1471,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1471,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1471,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1471,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1471,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1471,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1471,openSUSE-Leap-Micro-5.3-2024-1471,openSUSE-Leap-Micro-5.4-2024-1471,openSUSE-SLE-15.5-2024-1471 SKIP SUSE-RU-2024:1472-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1472 is not security or has no CVEs. patches: SUSE-2024-1472,SUSE-SLE-INSTALLER-15-SP4-2024-1472,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1472,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1472,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1472,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1472,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1472,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1472,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1472 SKIP SUSE-RU-2024:1473-1 as openSUSE-SLE-15.5-2024-1473 is not security or has no CVEs. patches: SUSE-2024-1473,SUSE-SLE-Module-Basesystem-15-SP5-2024-1473,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1473,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1473,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1473,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1473,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1473,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1473,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1473,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1473,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1473,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1473,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1473,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1473,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1473,SUSE-Storage-7.1-2024-1473,openSUSE-SLE-15.5-2024-1473 SKIP SUSE-RU-2024:1474-1 as openSUSE-SLE-15.5-2024-1474 is not security or has no CVEs. patches: SUSE-2024-1474,SUSE-SLE-Micro-5.3-2024-1474,SUSE-SLE-Micro-5.4-2024-1474,SUSE-SLE-Micro-5.5-2024-1474,SUSE-SLE-Module-Basesystem-15-SP5-2024-1474,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1474,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1474,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1474,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1474,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1474,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1474,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1474,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1474,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1474,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1474,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1474,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1474,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1474,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1474,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1474,SUSE-SUSE-MicroOS-5.2-2024-1474,SUSE-Storage-7.1-2024-1474,openSUSE-Leap-Micro-5.3-2024-1474,openSUSE-Leap-Micro-5.4-2024-1474,openSUSE-SLE-15.5-2024-1474 SKIP SUSE-RU-2024:1476-1 as openSUSE-SLE-15.5-2024-1476 is not security or has no CVEs. patches: SUSE-2024-1476,SUSE-SLE-Micro-5.3-2024-1476,SUSE-SLE-Micro-5.4-2024-1476,SUSE-SLE-Micro-5.5-2024-1476,SUSE-SLE-Module-Basesystem-15-SP5-2024-1476,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1476,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1476,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1476,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1476,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1476,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1476,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1476,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1476,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1476,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1476,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1476,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1476,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1476,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1476,SUSE-SUSE-MicroOS-5.2-2024-1476,SUSE-Storage-7.1-2024-1476,openSUSE-Leap-Micro-5.3-2024-1476,openSUSE-Leap-Micro-5.4-2024-1476,openSUSE-SLE-15.5-2024-1476 SKIP SUSE-RU-2024:1476-2 as openSUSE-SLE-15.6-2024-1476 is not security or has no CVEs. patches: SUSE-2024-1476,openSUSE-SLE-15.6-2024-1476 SKIP SUSE-RU-2024:1477-1 as openSUSE-SLE-15.5-2024-1477 is not security or has no CVEs. patches: SUSE-2024-1477,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1477,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1477,openSUSE-SLE-15.5-2024-1477 SKIP SUSE-RU-2024:1478-1 as SUSE-SLE-Module-Public-Cloud-12-2024-1478 is not security or has no CVEs. patches: SUSE-2024-1478,SUSE-SLE-Module-Public-Cloud-12-2024-1478 SKIP SUSE-RU-2024:1479-1 as openSUSE-SLE-15.5-2024-1479 is not security or has no CVEs. patches: SUSE-2024-1479,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1479,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1479,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1479,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1479,openSUSE-SLE-15.5-2024-1479 ERROR: notice SUSE-RU-2024:1481-1 has no valid patches out of: SUSE-2024-1481,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1481,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1481,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1481,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1481,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1481,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1481,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1481 ERROR: notice SUSE-RU-2024:1481-2 has no valid patches out of: SUSE-2024-1481,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1481,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1481,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1481,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1481,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1481,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1481,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1481 ERROR: notice SUSE-RU-2024:1482-1 has no valid patches out of: SUSE-2024-1482,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1482,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1482,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1482,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1482 ERROR: notice SUSE-RU-2024:1482-2 has no valid patches out of: SUSE-2024-1482,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-1482,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1482,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1482,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1482 ERROR: notice SUSE-RU-2024:1483-1 has no valid patches out of: SUSE-2024-1483,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1483,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1483,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1483,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1483,SUSE-Storage-7.1-2024-1483 ERROR: notice SUSE-RU-2024:1483-2 has no valid patches out of: SUSE-2024-1483,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-1483,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1483,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1483,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1483,SUSE-Storage-7.1-2024-1483 ERROR: notice SUSE-RU-2024:1484-1 has no valid patches out of: SUSE-2024-1484,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1484,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1484,openSUSE-SLE-15.5-2024-1484 ERROR: notice SUSE-RU-2024:1484-2 has no valid patches out of: SUSE-2024-1484,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1484,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1484,openSUSE-SLE-15.5-2024-1484 SKIP SUSE-RU-2024:1485-1 as openSUSE-SLE-15.5-2024-1485 is not security or has no CVEs. patches: SUSE-2024-1485,SUSE-SLE-Micro-5.3-2024-1485,SUSE-SLE-Module-Basesystem-15-SP5-2024-1485,SUSE-SLE-Module-Legacy-15-SP5-2024-1485,openSUSE-Leap-Micro-5.3-2024-1485,openSUSE-SLE-15.5-2024-1485 SKIP SUSE-RU-2024:1487-1 as openSUSE-SLE-15.5-2024-1487 is not security or has no CVEs. patches: SUSE-2024-1487,SUSE-SLE-Micro-5.3-2024-1487,SUSE-SLE-Micro-5.4-2024-1487,SUSE-SLE-Micro-5.5-2024-1487,SUSE-SLE-Module-Basesystem-15-SP5-2024-1487,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1487,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1487,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1487,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1487,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1487,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1487,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1487,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1487,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1487,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1487,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1487,SUSE-SUSE-MicroOS-5.2-2024-1487,SUSE-Storage-7.1-2024-1487,openSUSE-Leap-Micro-5.3-2024-1487,openSUSE-Leap-Micro-5.4-2024-1487,openSUSE-SLE-15.5-2024-1487 SKIP SUSE-RU-2024:1488-1 as SUSE-Storage-7.1-2024-1488 is not security or has no CVEs. patches: SUSE-2024-1488,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1488,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1488,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1488,SUSE-SUSE-MicroOS-5.1-2024-1488,SUSE-Storage-7.1-2024-1488 SKIP SUSE-RU-2024:1496-1 as SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1496 is not security or has no CVEs. patches: SUSE-2024-1496,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1496,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1496 SKIP SUSE-RU-2024:1503-1 as openSUSE-SLE-15.5-2024-1503 is not security or has no CVEs. patches: SUSE-2024-1503,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1503,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1503,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1503,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1503,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1503,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1503,openSUSE-SLE-15.5-2024-1503 SKIP SUSE-RU-2024:1503-2 as openSUSE-SLE-15.6-2024-1503 is not security or has no CVEs. patches: SUSE-2024-1503,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1503,openSUSE-SLE-15.6-2024-1503 SKIP SUSE-RU-2024:1504-1 as SUSE-Storage-7.1-2024-1504 is not security or has no CVEs. patches: SUSE-2024-1504,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1504,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1504,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1504,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1504,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1504,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1504,SUSE-Storage-7.1-2024-1504 ERROR: notice SUSE-RU-2024:1512-1 has no valid patches out of: SUSE-2024-1512,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-1512 ERROR: notice SUSE-RU-2024:1513-1 has no valid patches out of: SUSE-2024-1513,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-1513 SKIP SUSE-RU-2024:1516-1 as SUSE-EL-9-CLIENT-TOOLS-2024-1516 is not security or has no CVEs. patches: SUSE-2024-1516,SUSE-EL-9-CLIENT-TOOLS-2024-1516 SKIP SUSE-RU-2024:1526-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1526 is not security or has no CVEs. patches: SUSE-2024-1526,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1526,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1526,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1526 SKIP SUSE-RU-2024:1527-1 as SUSE-Storage-7.1-2024-1527 is not security or has no CVEs. patches: SUSE-2024-1527,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1527,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1527,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1527,SUSE-SUSE-MicroOS-5.1-2024-1527,SUSE-SUSE-MicroOS-5.2-2024-1527,SUSE-Storage-7.1-2024-1527 SKIP SUSE-RU-2024:1528-1 as openSUSE-Leap-Micro-5.4-2024-1528 is not security or has no CVEs. patches: SUSE-2024-1528,SUSE-SLE-Micro-5.3-2024-1528,SUSE-SLE-Micro-5.4-2024-1528,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1528,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1528,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1528,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1528,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1528,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1528,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1528,openSUSE-Leap-Micro-5.3-2024-1528,openSUSE-Leap-Micro-5.4-2024-1528 SKIP SUSE-RU-2024:1529-1 as openSUSE-SLE-15.5-2024-1529 is not security or has no CVEs. patches: SUSE-2024-1529,SUSE-SLE-Micro-5.5-2024-1529,SUSE-SLE-Module-Basesystem-15-SP5-2024-1529,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1529,SUSE-SLE-Module-Transactional-Server-15-SP5-2024-1529,openSUSE-SLE-15.5-2024-1529 SKIP SUSE-RU-2024:1531-1 as openSUSE-SLE-15.5-2024-1531 is not security or has no CVEs. patches: SUSE-2024-1531,SUSE-SLE-Manager-Tools-15-2024-1531,SUSE-SLE-Manager-Tools-15-BETA-2024-1531,SUSE-SLE-Manager-Tools-For-Micro-5-2024-1531,SUSE-SLE-Module-Basesystem-15-SP5-2024-1531,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1531,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1531,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1531,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1531,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1531,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1531,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1531,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1531,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1531,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1531,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1531,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1531,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1531,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1531,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1531,SUSE-Storage-7.1-2024-1531,openSUSE-SLE-15.5-2024-1531 SKIP SUSE-RU-2024:1531-2 as openSUSE-SLE-15.6-2024-1531 is not security or has no CVEs. patches: SUSE-2024-1531,SUSE-SLE-Module-Basesystem-15-SP6-2024-1531,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1531,openSUSE-SLE-15.6-2024-1531 SKIP SUSE-RU-2024:1538-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1538 is not security or has no CVEs. patches: SUSE-2024-1538,SUSE-SLE-Micro-5.3-2024-1538,SUSE-SLE-Micro-5.4-2024-1538,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1538,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1538,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1538,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1538,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1538,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1538,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1538 SKIP SUSE-RU-2024:1543-1 as SUSE-SLE-SERVER-12-SP5-2024-1543 is not security or has no CVEs. patches: SUSE-2024-1543,SUSE-SLE-SDK-12-SP5-2024-1543,SUSE-SLE-SERVER-12-SP5-2024-1543 SKIP SUSE-RU-2024:1564-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1564 is not security or has no CVEs. patches: SUSE-2024-1564,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1564,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1564,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1564 SKIP SUSE-RU-2024:1565-1 as openSUSE-SLE-15.5-2024-1565 is not security or has no CVEs. patches: SUSE-2024-1565,SUSE-SLE-Module-Basesystem-15-SP5-2024-1565,SUSE-SLE-Module-Legacy-15-SP5-2024-1565,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1565,openSUSE-SLE-15.5-2024-1565 SKIP SUSE-RU-2024:1566-1 as openSUSE-SLE-15.5-2024-1566 is not security or has no CVEs. patches: SUSE-2024-1566,SUSE-SLE-Micro-5.5-2024-1566,SUSE-SLE-Module-Containers-15-SP5-2024-1566,openSUSE-SLE-15.5-2024-1566 SKIP SUSE-RU-2024:1566-2 as openSUSE-SLE-15.6-2024-1566 is not security or has no CVEs. patches: SUSE-2024-1566,SUSE-SLE-Module-Containers-15-SP6-2024-1566,openSUSE-SLE-15.6-2024-1566 SKIP SUSE-RU-2024:1566-3 as SUSE-SLE-Micro-5.5-2024-1566 is not security or has no CVEs. patches: SUSE-2024-1566,SUSE-SLE-Micro-5.5-2024-1566 SKIP SUSE-RU-2024:1567-1 as openSUSE-Leap-Micro-5.4-2024-1567 is not security or has no CVEs. patches: SUSE-2024-1567,SUSE-SLE-Micro-5.3-2024-1567,SUSE-SLE-Micro-5.4-2024-1567,SUSE-SUSE-MicroOS-5.1-2024-1567,SUSE-SUSE-MicroOS-5.2-2024-1567,SUSE-Storage-7.1-2024-1567,openSUSE-Leap-Micro-5.3-2024-1567,openSUSE-Leap-Micro-5.4-2024-1567 SKIP SUSE-RU-2024:1575-1 as openSUSE-SLE-15.5-2024-1575 is not security or has no CVEs. patches: SUSE-2024-1575,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1575,openSUSE-SLE-15.5-2024-1575 SKIP SUSE-RU-2024:1576-1 as openSUSE-SLE-15.5-2024-1576 is not security or has no CVEs. patches: SUSE-2024-1576,SUSE-SLE-Micro-5.5-2024-1576,SUSE-SLE-Module-Basesystem-15-SP5-2024-1576,openSUSE-SLE-15.5-2024-1576 SKIP SUSE-RU-2024:1576-2 as SUSE-SLE-Micro-5.5-2024-1576 is not security or has no CVEs. patches: SUSE-2024-1576,SUSE-SLE-Micro-5.5-2024-1576 SKIP SUSE-RU-2024:1600-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1600 is not security or has no CVEs. patches: SUSE-2024-1600,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1600,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1600,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1600 SKIP SUSE-RU-2024:1601-1 as SUSE-Storage-7.1-2024-1601 is not security or has no CVEs. patches: SUSE-2024-1601,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1601,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1601,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1601,SUSE-SUSE-MicroOS-5.1-2024-1601,SUSE-SUSE-MicroOS-5.2-2024-1601,SUSE-Storage-7.1-2024-1601 SKIP SUSE-RU-2024:1602-1 as openSUSE-SLE-15.6-2024-1602 is not security or has no CVEs. patches: SUSE-2024-1602,SUSE-SLE-Micro-5.5-2024-1602,SUSE-SLE-Module-Basesystem-15-SP5-2024-1602,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1602,SUSE-SLE-Module-Transactional-Server-15-SP5-2024-1602,openSUSE-SLE-15.5-2024-1602,openSUSE-SLE-15.6-2024-1602 SKIP SUSE-RU-2024:1603-1 as openSUSE-Leap-Micro-5.4-2024-1603 is not security or has no CVEs. patches: SUSE-2024-1603,SUSE-SLE-Micro-5.3-2024-1603,SUSE-SLE-Micro-5.4-2024-1603,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1603,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1603,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1603,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1603,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1603,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1603,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1603,openSUSE-Leap-Micro-5.3-2024-1603,openSUSE-Leap-Micro-5.4-2024-1603 SKIP SUSE-RU-2024:1604-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1604 is not security or has no CVEs. patches: SUSE-2024-1604,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1604 SKIP SUSE-RU-2024:1606-1 as openSUSE-SLE-15.5-2024-1606 is not security or has no CVEs. patches: SUSE-2024-1606,SUSE-SLE-Product-HA-15-SP5-2024-1606,openSUSE-SLE-15.5-2024-1606 SKIP SUSE-RU-2024:1611-1 as openSUSE-SLE-15.5-2024-1611 is not security or has no CVEs. patches: SUSE-2024-1611,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1611,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1611,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1611,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1611,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1611,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1611,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1611,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1611,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1611,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1611,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1611,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1611,SUSE-Storage-7.1-2024-1611,openSUSE-SLE-15.5-2024-1611 SKIP SUSE-RU-2024:1612-1 as openSUSE-SLE-15.5-2024-1612 is not security or has no CVEs. patches: SUSE-2024-1612,SUSE-SLE-Micro-5.5-2024-1612,SUSE-SLE-Module-Basesystem-15-SP5-2024-1612,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1612,openSUSE-SLE-15.5-2024-1612 SKIP SUSE-RU-2024:1613-1 as SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-1613 is not security or has no CVEs. patches: SUSE-2024-1613,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1613,SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-1613 SKIP SUSE-RU-2024:1614-1 as SUSE-SLE-SERVER-12-SP5-2024-1614 is not security or has no CVEs. patches: SUSE-2024-1614,SUSE-SLE-SERVER-12-SP5-2024-1614 SKIP SUSE-RU-2024:1617-1 as SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1617 is not security or has no CVEs. patches: SUSE-2024-1617,SUSE-EL-9-CLIENT-TOOLS-2024-1617,SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1617 SKIP SUSE-RU-2024:1620-1 as openSUSE-SLE-15.6-2024-1620 is not security or has no CVEs. patches: SUSE-2024-1620,SUSE-SLE-Manager-Tools-15-2024-1620,SUSE-SLE-Manager-Tools-15-BETA-2024-1620,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1620,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1620,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1620,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1620,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1620,openSUSE-SLE-15.5-2024-1620,openSUSE-SLE-15.6-2024-1620 SKIP SUSE-RU-2024:1623-1 as openSUSE-SLE-15.5-2024-1623 is not security or has no CVEs. patches: SUSE-2024-1623,SUSE-SLE-Micro-5.5-2024-1623,SUSE-SLE-Module-Basesystem-15-SP5-2024-1623,openSUSE-SLE-15.5-2024-1623 SKIP SUSE-RU-2024:1623-2 as SUSE-SLE-Micro-5.5-2024-1623 is not security or has no CVEs. patches: SUSE-2024-1623,SUSE-SLE-Micro-5.5-2024-1623 SKIP SUSE-RU-2024:1631-1 as openSUSE-SLE-15.5-2024-1631 is not security or has no CVEs. patches: SUSE-2024-1631,SUSE-SLE-Module-Basesystem-15-SP5-2024-1631,SUSE-SLE-Module-Basesystem-15-SP6-2024-1631,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1631,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1631,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1631,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1631,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1631,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1631,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1631,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1631,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1631,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1631,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1631,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1631,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1631,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1631,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1631,SUSE-Storage-7.1-2024-1631,openSUSE-SLE-15.5-2024-1631 SKIP SUSE-RU-2024:1632-1 as SUSE-SLE-Module-Development-Tools-15-SP5-2024-1632 is not security or has no CVEs. patches: SUSE-2024-1632,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1632 SKIP SUSE-RU-2024:1638-1 as openSUSE-SLE-15.5-2024-1638 is not security or has no CVEs. patches: SUSE-2024-1638,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1638,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1638,SUSE-SLE-Module-Python3-15-SP5-2024-1638,openSUSE-SLE-15.5-2024-1638 SKIP SUSE-RU-2024:1638-2 as openSUSE-SLE-15.6-2024-1638 is not security or has no CVEs. patches: SUSE-2024-1638,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1638,SUSE-SLE-Module-Python3-15-SP6-2024-1638,openSUSE-SLE-15.6-2024-1638 SKIP SUSE-RU-2024:1640-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1640 is not security or has no CVEs. patches: SUSE-2024-1640,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1640,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1640 SKIP SUSE-RU-2024:1640-2 as openSUSE-SLE-15.6-2024-1640 is not security or has no CVEs. patches: SUSE-2024-1640,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1640,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1640,openSUSE-SLE-15.5-2024-1640,openSUSE-SLE-15.6-2024-1640 SKIP SUSE-RU-2024:1649-1 as openSUSE-SLE-15.6-2024-1649 is not security or has no CVEs. patches: SUSE-2024-1649,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1649,openSUSE-SLE-15.5-2024-1649,openSUSE-SLE-15.6-2024-1649 SKIP SUSE-RU-2024:1654-1 as SUSE-SLE-SERVER-12-SP5-2024-1654 is not security or has no CVEs. patches: SUSE-2024-1654,SUSE-SLE-SDK-12-SP5-2024-1654,SUSE-SLE-SERVER-12-SP5-2024-1654 SKIP SUSE-RU-2024:1655-1 as SUSE-SLE-SERVER-12-SP5-2024-1655 is not security or has no CVEs. patches: SUSE-2024-1655,SUSE-SLE-SDK-12-SP5-2024-1655,SUSE-SLE-SERVER-12-SP5-2024-1655 SKIP SUSE-RU-2024:1656-1 as openSUSE-SLE-15.6-2024-1656 is not security or has no CVEs. patches: SUSE-2024-1656,openSUSE-SLE-15.5-2024-1656,openSUSE-SLE-15.6-2024-1656 SKIP SUSE-RU-2024:1660-1 as openSUSE-SLE-15.5-2024-1660 is not security or has no CVEs. patches: SUSE-2024-1660,SUSE-SLE-Micro-5.3-2024-1660,SUSE-SLE-Micro-5.4-2024-1660,SUSE-SLE-Micro-5.5-2024-1660,SUSE-SLE-Module-Basesystem-15-SP5-2024-1660,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1660,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1660,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1660,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1660,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1660,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1660,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1660,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1660,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1660,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1660,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1660,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1660,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1660,SUSE-SUSE-MicroOS-5.1-2024-1660,SUSE-SUSE-MicroOS-5.2-2024-1660,SUSE-Storage-7.1-2024-1660,openSUSE-Leap-Micro-5.3-2024-1660,openSUSE-Leap-Micro-5.4-2024-1660,openSUSE-SLE-15.5-2024-1660 SKIP SUSE-RU-2024:1660-2 as SUSE-SLE-Micro-5.5-2024-1660 is not security or has no CVEs. patches: SUSE-2024-1660,SUSE-SLE-Micro-5.5-2024-1660 SKIP SUSE-RU-2024:1662-1 as SUSE-SLE-SERVER-12-SP5-2024-1662 is not security or has no CVEs. patches: SUSE-2024-1662,SUSE-SLE-SDK-12-SP5-2024-1662,SUSE-SLE-SERVER-12-SP5-2024-1662 SKIP SUSE-RU-2024:1665-1 as openSUSE-SLE-15.5-2024-1665 is not security or has no CVEs. patches: SUSE-2024-1665,SUSE-SLE-Micro-5.3-2024-1665,SUSE-SLE-Micro-5.4-2024-1665,SUSE-SLE-Micro-5.5-2024-1665,SUSE-SLE-Module-Basesystem-15-SP5-2024-1665,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1665,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1665,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1665,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1665,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1665,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1665,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1665,openSUSE-Leap-Micro-5.3-2024-1665,openSUSE-Leap-Micro-5.4-2024-1665,openSUSE-SLE-15.5-2024-1665 SKIP SUSE-RU-2024:1665-2 as openSUSE-SLE-15.6-2024-1665 is not security or has no CVEs. patches: SUSE-2024-1665,SUSE-SLE-Module-Basesystem-15-SP6-2024-1665,openSUSE-SLE-15.6-2024-1665 SKIP SUSE-RU-2024:1665-3 as SUSE-SLE-Micro-5.5-2024-1665 is not security or has no CVEs. patches: SUSE-2024-1665,SUSE-SLE-Micro-5.5-2024-1665 SKIP SUSE-RU-2024:1666-1 as SUSE-Storage-7.1-2024-1666 is not security or has no CVEs. patches: SUSE-2024-1666,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1666,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1666,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1666,SUSE-SUSE-MicroOS-5.1-2024-1666,SUSE-SUSE-MicroOS-5.2-2024-1666,SUSE-Storage-7.1-2024-1666 SKIP SUSE-RU-2024:1668-1 as SUSE-2024-1668 is not security or has no CVEs. patches: SUSE-2024-1668 SKIP SUSE-RU-2024:1671-1 as openSUSE-SLE-15.5-2024-1671 is not security or has no CVEs. patches: SUSE-2024-1671,SUSE-SLE-Micro-5.3-2024-1671,SUSE-SLE-Micro-5.4-2024-1671,SUSE-SLE-Micro-5.5-2024-1671,SUSE-SLE-Module-Basesystem-15-SP5-2024-1671,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1671,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1671,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1671,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1671,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1671,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1671,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1671,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1671,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1671,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1671,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1671,SUSE-SUSE-MicroOS-5.1-2024-1671,SUSE-SUSE-MicroOS-5.2-2024-1671,SUSE-Storage-7.1-2024-1671,openSUSE-Leap-Micro-5.3-2024-1671,openSUSE-Leap-Micro-5.4-2024-1671,openSUSE-SLE-15.5-2024-1671 SKIP SUSE-RU-2024:1710-1 as SUSE-SLE-Module-Public-Cloud-12-2024-1710 is not security or has no CVEs. patches: SUSE-2024-1710,SUSE-SLE-Module-Public-Cloud-12-2024-1710 SKIP SUSE-RU-2024:1761-1 as openSUSE-SLE-15.6-2024-1761 is not security or has no CVEs. patches: SUSE-2024-1761,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1761,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1761,openSUSE-SLE-15.5-2024-1761,openSUSE-SLE-15.6-2024-1761 SKIP SUSE-RU-2024:1763-1 as openSUSE-SLE-15.6-2024-1763 is not security or has no CVEs. patches: SUSE-2024-1763,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1763,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1763,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1763,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1763,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1763,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1763,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1763,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1763,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1763,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1763,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1763,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1763,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1763,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1763,SUSE-Storage-7.1-2024-1763,openSUSE-SLE-15.5-2024-1763,openSUSE-SLE-15.6-2024-1763 SKIP SUSE-RU-2024:1764-1 as openSUSE-SLE-15.5-2024-1764 is not security or has no CVEs. patches: SUSE-2024-1764,SUSE-SLE-Module-Basesystem-15-SP5-2024-1764,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1764,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1764,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1764,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1764,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1764,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1764,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1764,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1764,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1764,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1764,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1764,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1764,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1764,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1764,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1764,SUSE-Storage-7.1-2024-1764,openSUSE-SLE-15.5-2024-1764 SKIP SUSE-RU-2024:1764-2 as openSUSE-SLE-15.6-2024-1764 is not security or has no CVEs. patches: SUSE-2024-1764,openSUSE-SLE-15.6-2024-1764 SKIP SUSE-RU-2024:1769-1 as SUSE-Elemental-5.5-2024-1769 is not security or has no CVEs. patches: SUSE-2024-1769,SUSE-Elemental-5.5-2024-1769 SKIP SUSE-RU-2024:1772-1 as SUSE-SLE-SERVER-12-SP5-2024-1772 is not security or has no CVEs. patches: SUSE-2024-1772,SUSE-SLE-SERVER-12-SP5-2024-1772 SKIP SUSE-RU-2024:1776-1 as openSUSE-SLE-15.5-2024-1776 is not security or has no CVEs. patches: SUSE-2024-1776,openSUSE-SLE-15.5-2024-1776 SKIP SUSE-RU-2024:1778-1 as openSUSE-SLE-15.5-2024-1778 is not security or has no CVEs. patches: SUSE-2024-1778,SUSE-SLE-Module-Basesystem-15-SP5-2024-1778,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1778,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1778,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1778,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1778,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1778,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1778,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1778,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1778,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1778,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1778,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1778,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1778,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1778,SUSE-Storage-7.1-2024-1778,openSUSE-SLE-15.5-2024-1778 SKIP SUSE-RU-2024:1779-1 as openSUSE-SLE-15.5-2024-1779 is not security or has no CVEs. patches: SUSE-2024-1779,SUSE-SLE-Module-Basesystem-15-SP5-2024-1779,openSUSE-SLE-15.5-2024-1779 SKIP SUSE-RU-2024:1781-1 as openSUSE-SLE-15.5-2024-1781 is not security or has no CVEs. patches: SUSE-2024-1781,SUSE-SLE-Product-HA-15-SP5-2024-1781,openSUSE-SLE-15.5-2024-1781 SKIP SUSE-RU-2024:1782-1 as SUSE-SLE-Product-HA-15-SP4-2024-1782 is not security or has no CVEs. patches: SUSE-2024-1782,SUSE-SLE-Product-HA-15-SP4-2024-1782 SKIP SUSE-RU-2024:1783-1 as SUSE-SLE-Product-HA-15-SP3-2024-1783 is not security or has no CVEs. patches: SUSE-2024-1783,SUSE-SLE-Product-HA-15-SP2-2024-1783,SUSE-SLE-Product-HA-15-SP3-2024-1783 SKIP SUSE-RU-2024:1784-1 as SUSE-SLE-SDK-12-SP5-2024-1784 is not security or has no CVEs. patches: SUSE-2024-1784,SUSE-SLE-HA-12-SP5-2024-1784,SUSE-SLE-SDK-12-SP5-2024-1784 SKIP SUSE-RU-2024:1785-1 as openSUSE-SLE-15.6-2024-1785 is not security or has no CVEs. patches: SUSE-2024-1785,SUSE-SLE-Module-Live-Patching-15-SP4-2024-1785,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1785,SUSE-SLE-Module-Live-Patching-15-SP6-2024-1785,openSUSE-SLE-15.5-2024-1785,openSUSE-SLE-15.6-2024-1785 SKIP SUSE-RU-2024:1786-1 as openSUSE-SLE-15.5-2024-1786 is not security or has no CVEs. patches: SUSE-2024-1786,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1786,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1786,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1786,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1786,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1786,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1786,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1786,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1786,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1786,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1786,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1786,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1786,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1786,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1786,SUSE-Storage-7.1-2024-1786,openSUSE-SLE-15.5-2024-1786 SKIP SUSE-RU-2024:1790-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-1790 is not security or has no CVEs. patches: SUSE-2024-1790,SUSE-SLE-Module-Basesystem-15-SP5-2024-1790 SKIP SUSE-RU-2024:1791-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1791 is not security or has no CVEs. patches: SUSE-2024-1791,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1791,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1791,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1791,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1791,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1791,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1791,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1791 SKIP SUSE-RU-2024:1792-1 as SUSE-Storage-7.1-2024-1792 is not security or has no CVEs. patches: SUSE-2024-1792,SUSE-SLE-INSTALLER-15-SP2-2024-1792,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1792,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1792,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1792,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1792,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1792,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1792,SUSE-Storage-7.1-2024-1792 SKIP SUSE-RU-2024:1794-1 as openSUSE-SLE-15.6-2024-1794 is not security or has no CVEs. patches: SUSE-2024-1794,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1794,openSUSE-SLE-15.5-2024-1794,openSUSE-SLE-15.6-2024-1794 SKIP SUSE-RU-2024:1794-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1794 is not security or has no CVEs. patches: SUSE-2024-1794,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1794 SKIP SUSE-RU-2024:1795-1 as openSUSE-SLE-15.5-2024-1795 is not security or has no CVEs. patches: SUSE-2024-1795,SUSE-SLE-Module-Legacy-15-SP5-2024-1795,openSUSE-SLE-15.5-2024-1795 SKIP SUSE-RU-2024:1796-1 as openSUSE-SLE-15.5-2024-1796 is not security or has no CVEs. patches: SUSE-2024-1796,SUSE-SLE-Micro-5.5-2024-1796,SUSE-SLE-Module-Basesystem-15-SP5-2024-1796,openSUSE-SLE-15.5-2024-1796 SKIP SUSE-RU-2024:1796-2 as SUSE-SLE-Micro-5.5-2024-1796 is not security or has no CVEs. patches: SUSE-2024-1796,SUSE-SLE-Micro-5.5-2024-1796 SKIP SUSE-RU-2024:1797-1 as openSUSE-SLE-15.5-2024-1797 is not security or has no CVEs. patches: SUSE-2024-1797,SUSE-SLE-Micro-5.3-2024-1797,SUSE-SLE-Micro-5.4-2024-1797,SUSE-SLE-Micro-5.5-2024-1797,SUSE-SLE-Module-Basesystem-15-SP5-2024-1797,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1797,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1797,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1797,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1797,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1797,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1797,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1797,openSUSE-Leap-Micro-5.3-2024-1797,openSUSE-Leap-Micro-5.4-2024-1797,openSUSE-SLE-15.5-2024-1797 SKIP SUSE-RU-2024:1797-2 as SUSE-SLE-Micro-5.5-2024-1797 is not security or has no CVEs. patches: SUSE-2024-1797,SUSE-SLE-Micro-5.5-2024-1797 SKIP SUSE-RU-2024:1798-1 as openSUSE-SLE-15.6-2024-1798 is not security or has no CVEs. patches: SUSE-2024-1798,SUSE-SLE-Micro-5.5-2024-1798,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1798,openSUSE-SLE-15.5-2024-1798,openSUSE-SLE-15.6-2024-1798 SKIP SUSE-RU-2024:1799-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-1799 is not security or has no CVEs. patches: SUSE-2024-1799,SUSE-SLE-Micro-5.5-2024-1799,SUSE-SLE-Module-Basesystem-15-SP5-2024-1799 SKIP SUSE-RU-2024:1800-1 as SUSE-SUSE-MicroOS-5.1-2024-1800 is not security or has no CVEs. patches: SUSE-2024-1800,SUSE-SUSE-MicroOS-5.1-2024-1800 SKIP SUSE-RU-2024:1802-1 as openSUSE-SLE-15.5-2024-1802 is not security or has no CVEs. patches: SUSE-2024-1802,SUSE-SLE-Micro-5.3-2024-1802,SUSE-SLE-Micro-5.4-2024-1802,SUSE-SLE-Micro-5.5-2024-1802,SUSE-SLE-Module-Basesystem-15-SP5-2024-1802,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1802,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1802,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1802,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1802,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1802,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1802,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1802,openSUSE-Leap-Micro-5.3-2024-1802,openSUSE-Leap-Micro-5.4-2024-1802,openSUSE-SLE-15.5-2024-1802 SKIP SUSE-RU-2024:1802-2 as SUSE-SLE-Micro-5.5-2024-1802 is not security or has no CVEs. patches: SUSE-2024-1802,SUSE-SLE-Micro-5.5-2024-1802 SKIP SUSE-RU-2024:1809-1 as openSUSE-SLE-15.5-2024-1809 is not security or has no CVEs. patches: SUSE-2024-1809,SUSE-SLE-Micro-5.5-2024-1809,SUSE-SLE-Module-Basesystem-15-SP5-2024-1809,openSUSE-SLE-15.5-2024-1809 SKIP SUSE-RU-2024:1809-2 as SUSE-SLE-Module-Development-Tools-15-SP5-2024-1809 is not security or has no CVEs. patches: SUSE-2024-1809,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1809 SKIP SUSE-RU-2024:1809-3 as SUSE-SLE-Micro-5.5-2024-1809 is not security or has no CVEs. patches: SUSE-2024-1809,SUSE-SLE-Micro-5.5-2024-1809 SKIP SUSE-RU-2024:1810-1 as openSUSE-SLE-15.6-2024-1810 is not security or has no CVEs. patches: SUSE-2024-1810,SUSE-SLE-Micro-5.5-2024-1810,SUSE-SLE-Module-Basesystem-15-SP5-2024-1810,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1810,openSUSE-SLE-15.5-2024-1810,openSUSE-SLE-15.6-2024-1810 SKIP SUSE-RU-2024:1810-2 as SUSE-SLE-Micro-5.5-2024-1810 is not security or has no CVEs. patches: SUSE-2024-1810,SUSE-SLE-Micro-5.5-2024-1810 SKIP SUSE-RU-2024:1811-1 as SUSE-SUSE-MicroOS-5.2-2024-1811 is not security or has no CVEs. patches: SUSE-2024-1811,SUSE-SUSE-MicroOS-5.2-2024-1811 ERROR: notice SUSE-RU-2024:1817-1 has no valid patches out of: SUSE-2024-1817,SUSE-Debian-12-CLIENT-TOOLS-BETA-2024-1817 ERROR: notice SUSE-RU-2024:1818-1 has no valid patches out of: SUSE-2024-1818,SUSE-Debian-11-CLIENT-TOOLS-BETA-2024-1818 ERROR: notice SUSE-RU-2024:1819-1 has no valid patches out of: SUSE-2024-1819,SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-1819 ERROR: notice SUSE-RU-2024:1820-1 has no valid patches out of: SUSE-2024-1820,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-1820 SKIP SUSE-RU-2024:1821-1 as SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1821 is not security or has no CVEs. patches: SUSE-2024-1821,SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1821 SKIP SUSE-RU-2024:1824-1 as SUSE-SLE-SERVER-12-SP5-2024-1824 is not security or has no CVEs. patches: SUSE-2024-1824,SUSE-SLE-SERVER-12-SP5-2024-1824 SKIP SUSE-RU-2024:1826-1 as SUSE-Storage-7.1-2024-1826 is not security or has no CVEs. patches: SUSE-2024-1826,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1826,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1826,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1826,SUSE-SUSE-MicroOS-5.1-2024-1826,SUSE-SUSE-MicroOS-5.2-2024-1826,SUSE-Storage-7.1-2024-1826 SKIP SUSE-RU-2024:1827-1 as openSUSE-Leap-Micro-5.4-2024-1827 is not security or has no CVEs. patches: SUSE-2024-1827,SUSE-SLE-Micro-5.3-2024-1827,SUSE-SLE-Micro-5.4-2024-1827,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1827,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1827,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1827,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1827,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1827,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1827,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1827,openSUSE-Leap-Micro-5.3-2024-1827,openSUSE-Leap-Micro-5.4-2024-1827 SKIP SUSE-RU-2024:1828-1 as openSUSE-SLE-15.5-2024-1828 is not security or has no CVEs. patches: SUSE-2024-1828,SUSE-SLE-Micro-5.5-2024-1828,SUSE-SLE-Module-Basesystem-15-SP5-2024-1828,openSUSE-SLE-15.5-2024-1828 SKIP SUSE-RU-2024:1839-1 as SUSE-SLE-SERVER-12-SP5-2024-1839 is not security or has no CVEs. patches: SUSE-2024-1839,SUSE-SLE-SERVER-12-SP5-2024-1839 SKIP SUSE-RU-2024:1840-1 as SUSE-SLE-SERVER-12-SP5-2024-1840 is not security or has no CVEs. patches: SUSE-2024-1840,SUSE-SLE-SERVER-12-SP5-2024-1840 SKIP SUSE-RU-2024:1841-1 as SUSE-Elemental-5.5-2024-1841 is not security or has no CVEs. patches: SUSE-2024-1841,SUSE-Elemental-5.5-2024-1841 SKIP SUSE-RU-2024:1841-2 as SUSE-Elemental-5.5-2024-1841 is not security or has no CVEs. patches: SUSE-2024-1841,SUSE-Elemental-5.5-2024-1841 SKIP SUSE-RU-2024:1848-1 as openSUSE-SLE-15.5-2024-1848 is not security or has no CVEs. patches: SUSE-2024-1848,SUSE-SLE-Micro-5.3-2024-1848,SUSE-SLE-Micro-5.4-2024-1848,SUSE-SLE-Micro-5.5-2024-1848,SUSE-SLE-Module-Basesystem-15-SP5-2024-1848,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1848,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1848,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1848,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1848,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1848,SUSE-SUSE-MicroOS-5.1-2024-1848,SUSE-SUSE-MicroOS-5.2-2024-1848,SUSE-Storage-7.1-2024-1848,openSUSE-Leap-Micro-5.3-2024-1848,openSUSE-Leap-Micro-5.4-2024-1848,openSUSE-SLE-15.5-2024-1848 SKIP SUSE-RU-2024:1848-2 as SUSE-SLE-Micro-5.5-2024-1848 is not security or has no CVEs. patches: SUSE-2024-1848,SUSE-SLE-Micro-5.5-2024-1848 SKIP SUSE-RU-2024:1849-1 as openSUSE-SLE-15.6-2024-1849 is not security or has no CVEs. patches: SUSE-2024-1849,SUSE-SLE-Module-Basesystem-15-SP5-2024-1849,SUSE-SLE-Module-Basesystem-15-SP6-2024-1849,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1849,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1849,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1849,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1849,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1849,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1849,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1849,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1849,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1849,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1849,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1849,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1849,SUSE-SLE-Product-WE-15-SP5-2024-1849,SUSE-SLE-Product-WE-15-SP6-2024-1849,SUSE-Storage-7.1-2024-1849,openSUSE-SLE-15.5-2024-1849,openSUSE-SLE-15.6-2024-1849 SKIP SUSE-RU-2024:1850-1 as openSUSE-SLE-15.6-2024-1850 is not security or has no CVEs. patches: SUSE-2024-1850,SUSE-SLE-Module-Basesystem-15-SP6-2024-1850,openSUSE-SLE-15.6-2024-1850 SKIP SUSE-RU-2024:1851-1 as openSUSE-SLE-15.6-2024-1851 is not security or has no CVEs. patches: SUSE-2024-1851,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1851,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1851,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1851,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1851,openSUSE-SLE-15.5-2024-1851,openSUSE-SLE-15.6-2024-1851 SKIP SUSE-RU-2024:1852-1 as openSUSE-SLE-15.6-2024-1852 is not security or has no CVEs. patches: SUSE-2024-1852,SUSE-SLE-Module-Basesystem-15-SP6-2024-1852,openSUSE-SLE-15.6-2024-1852 SKIP SUSE-RU-2024:1873-1 as openSUSE-SLE-15.5-2024-1873 is not security or has no CVEs. patches: SUSE-2024-1873,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1873,openSUSE-SLE-15.5-2024-1873 SKIP SUSE-RU-2024:1875-1 as openSUSE-SLE-15.6-2024-1875 is not security or has no CVEs. patches: SUSE-2024-1875,SUSE-SLE-Module-HPC-15-SP5-2024-1875,SUSE-SLE-Module-HPC-15-SP6-2024-1875,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1875,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1875,openSUSE-SLE-15.5-2024-1875,openSUSE-SLE-15.6-2024-1875 SKIP SUSE-RU-2024:1876-1 as openSUSE-SLE-15.5-2024-1876 is not security or has no CVEs. patches: SUSE-2024-1876,SUSE-SLE-Micro-5.3-2024-1876,SUSE-SLE-Micro-5.4-2024-1876,SUSE-SLE-Micro-5.5-2024-1876,SUSE-SLE-Module-Basesystem-15-SP5-2024-1876,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1876,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1876,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1876,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1876,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1876,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1876,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1876,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1876,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1876,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1876,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1876,SUSE-SUSE-MicroOS-5.2-2024-1876,SUSE-Storage-7.1-2024-1876,openSUSE-Leap-Micro-5.3-2024-1876,openSUSE-Leap-Micro-5.4-2024-1876,openSUSE-SLE-15.5-2024-1876 SKIP SUSE-RU-2024:1876-2 as openSUSE-SLE-15.6-2024-1876 is not security or has no CVEs. patches: SUSE-2024-1876,SUSE-SLE-Module-Basesystem-15-SP6-2024-1876,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1876,openSUSE-SLE-15.6-2024-1876 SKIP SUSE-RU-2024:1876-3 as SUSE-SLE-Micro-5.5-2024-1876 is not security or has no CVEs. patches: SUSE-2024-1876,SUSE-SLE-Micro-5.5-2024-1876 SKIP SUSE-RU-2024:1877-1 as openSUSE-SLE-15.6-2024-1877 is not security or has no CVEs. patches: SUSE-2024-1877,SUSE-SLE-Module-Basesystem-15-SP5-2024-1877,SUSE-SLE-Module-Basesystem-15-SP6-2024-1877,openSUSE-SLE-15.5-2024-1877,openSUSE-SLE-15.6-2024-1877 SKIP SUSE-RU-2024:1878-1 as SUSE-SLE-SERVER-12-SP5-2024-1878 is not security or has no CVEs. patches: SUSE-2024-1878,SUSE-SLE-SERVER-12-SP5-2024-1878 SKIP SUSE-RU-2024:1879-1 as openSUSE-SLE-15.6-2024-1879 is not security or has no CVEs. patches: SUSE-2024-1879,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1879,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1879,openSUSE-SLE-15.5-2024-1879,openSUSE-SLE-15.6-2024-1879 SKIP SUSE-RU-2024:1883-1 as openSUSE-SLE-15.6-2024-1883 is not security or has no CVEs. patches: SUSE-2024-1883,SUSE-SLE-Micro-5.5-2024-1883,SUSE-SLE-Module-Basesystem-15-SP5-2024-1883,SUSE-SLE-Module-Basesystem-15-SP6-2024-1883,openSUSE-SLE-15.5-2024-1883,openSUSE-SLE-15.6-2024-1883 SKIP SUSE-RU-2024:1884-1 as openSUSE-SLE-15.6-2024-1884 is not security or has no CVEs. patches: SUSE-2024-1884,SUSE-SLE-Module-Basesystem-15-SP6-2024-1884,openSUSE-SLE-15.6-2024-1884 SKIP SUSE-RU-2024:1885-1 as openSUSE-SLE-15.6-2024-1885 is not security or has no CVEs. patches: SUSE-2024-1885,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1885,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1885,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1885,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1885,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1885,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1885,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1885,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1885,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1885,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1885,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1885,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1885,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1885,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1885,SUSE-Storage-7.1-2024-1885,openSUSE-SLE-15.5-2024-1885,openSUSE-SLE-15.6-2024-1885 SKIP SUSE-RU-2024:1887-1 as openSUSE-SLE-15.6-2024-1887 is not security or has no CVEs. patches: SUSE-2024-1887,SUSE-SLE-Module-Basesystem-15-SP6-2024-1887,openSUSE-SLE-15.6-2024-1887 SKIP SUSE-RU-2024:1888-1 as openSUSE-SLE-15.5-2024-1888 is not security or has no CVEs. patches: SUSE-2024-1888,SUSE-SLE-Micro-5.5-2024-1888,SUSE-SLE-Module-Basesystem-15-SP5-2024-1888,openSUSE-SLE-15.5-2024-1888 SKIP SUSE-RU-2024:1888-2 as SUSE-SLE-Micro-5.5-2024-1888 is not security or has no CVEs. patches: SUSE-2024-1888,SUSE-SLE-Micro-5.5-2024-1888 SKIP SUSE-RU-2024:1889-1 as SUSE-Storage-7.1-2024-1889 is not security or has no CVEs. patches: SUSE-2024-1889,SUSE-SLE-Module-Containers-15-SP5-2024-1889,SUSE-SLE-Module-Containers-15-SP6-2024-1889,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1889,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1889,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1889,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1889,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1889,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1889,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1889,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1889,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1889,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1889,SUSE-Storage-7.1-2024-1889 SKIP SUSE-RU-2024:1890-1 as openSUSE-SLE-15.6-2024-1890 is not security or has no CVEs. patches: SUSE-2024-1890,SUSE-SLE-Module-Basesystem-15-SP5-2024-1890,SUSE-SLE-Module-Basesystem-15-SP6-2024-1890,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1890,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1890,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1890,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1890,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1890,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1890,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1890,openSUSE-SLE-15.5-2024-1890,openSUSE-SLE-15.6-2024-1890 SKIP SUSE-RU-2024:1891-1 as openSUSE-SLE-15.6-2024-1891 is not security or has no CVEs. patches: SUSE-2024-1891,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1891,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1891,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-1891,openSUSE-SLE-15.6-2024-1891 SKIP SUSE-RU-2024:1897-1 as openSUSE-SLE-15.6-2024-1897 is not security or has no CVEs. patches: SUSE-2024-1897,SUSE-SLE-Module-Basesystem-15-SP6-2024-1897,SUSE-SLE-Module-Legacy-15-SP6-2024-1897,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1897,openSUSE-SLE-15.6-2024-1897 SKIP SUSE-RU-2024:1898-1 as openSUSE-Leap-Micro-5.4-2024-1898 is not security or has no CVEs. patches: SUSE-2024-1898,SUSE-SLE-Micro-5.3-2024-1898,SUSE-SLE-Micro-5.4-2024-1898,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1898,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1898,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1898,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1898,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1898,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1898,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1898,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1898,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1898,openSUSE-Leap-Micro-5.3-2024-1898,openSUSE-Leap-Micro-5.4-2024-1898 SKIP SUSE-RU-2024:1903-1 as SUSE-Storage-7.1-2024-1903 is not security or has no CVEs. patches: SUSE-2024-1903,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1903,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1903,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1903,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1903,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1903,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1903,SUSE-SUSE-MicroOS-5.1-2024-1903,SUSE-SUSE-MicroOS-5.2-2024-1903,SUSE-Storage-7.1-2024-1903 SKIP SUSE-RU-2024:1904-1 as openSUSE-SLE-15.6-2024-1904 is not security or has no CVEs. patches: SUSE-2024-1904,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1904,openSUSE-SLE-15.6-2024-1904 SKIP SUSE-RU-2024:1905-1 as openSUSE-SLE-15.6-2024-1905 is not security or has no CVEs. patches: SUSE-2024-1905,SUSE-SLE-Module-Basesystem-15-SP6-2024-1905,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1905,openSUSE-SLE-15.6-2024-1905 SKIP SUSE-RU-2024:1912-1 as openSUSE-SLE-15.6-2024-1912 is not security or has no CVEs. patches: SUSE-2024-1912,openSUSE-SLE-15.5-2024-1912,openSUSE-SLE-15.6-2024-1912 SKIP SUSE-RU-2024:1913-1 as SUSE-SLE-Module-Server-Applications-15-SP6-2024-1913 is not security or has no CVEs. patches: SUSE-2024-1913,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1913 SKIP SUSE-RU-2024:1914-1 as openSUSE-SLE-15.6-2024-1914 is not security or has no CVEs. patches: SUSE-2024-1914,SUSE-SLE-Module-Basesystem-15-SP5-2024-1914,SUSE-SLE-Module-Basesystem-15-SP6-2024-1914,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1914,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1914,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1914,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1914,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1914,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1914,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1914,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1914,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1914,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1914,SUSE-Storage-7.1-2024-1914,openSUSE-SLE-15.5-2024-1914,openSUSE-SLE-15.6-2024-1914 SKIP SUSE-RU-2024:1915-1 as openSUSE-SLE-15.6-2024-1915 is not security or has no CVEs. patches: SUSE-2024-1915,SUSE-SLE-Module-Basesystem-15-SP6-2024-1915,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1915,openSUSE-SLE-15.6-2024-1915 SKIP SUSE-RU-2024:1916-1 as openSUSE-SLE-15.6-2024-1916 is not security or has no CVEs. patches: SUSE-2024-1916,SUSE-SLE-Module-Live-Patching-15-SP2-2024-1916,SUSE-SLE-Module-Live-Patching-15-SP3-2024-1916,SUSE-SLE-Module-Live-Patching-15-SP4-2024-1916,SUSE-SLE-Module-Live-Patching-15-SP5-2024-1916,SUSE-SLE-Module-Live-Patching-15-SP6-2024-1916,openSUSE-SLE-15.5-2024-1916,openSUSE-SLE-15.6-2024-1916 SKIP SUSE-RU-2024:1917-1 as SUSE-SLE-Live-Patching-12-SP5-2024-1917 is not security or has no CVEs. patches: SUSE-2024-1917,SUSE-SLE-Live-Patching-12-2024-1917,SUSE-SLE-Live-Patching-12-SP5-2024-1917 SKIP SUSE-RU-2024:1918-1 as openSUSE-SLE-15.6-2024-1918 is not security or has no CVEs. patches: SUSE-2024-1918,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1918,SUSE-SLE-Module-Python3-15-SP5-2024-1918,SUSE-SLE-Module-Python3-15-SP6-2024-1918,openSUSE-SLE-15.5-2024-1918,openSUSE-SLE-15.6-2024-1918 SKIP SUSE-RU-2024:1919-1 as openSUSE-SLE-15.6-2024-1919 is not security or has no CVEs. patches: SUSE-2024-1919,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1919,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1919,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1919,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1919,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1919,openSUSE-SLE-15.5-2024-1919,openSUSE-SLE-15.6-2024-1919 SKIP SUSE-RU-2024:1921-1 as SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1921 is not security or has no CVEs. patches: SUSE-2024-1921,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1921,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1921 SKIP SUSE-RU-2024:1924-1 as openSUSE-SLE-15.6-2024-1924 is not security or has no CVEs. patches: SUSE-2024-1924,openSUSE-SLE-15.5-2024-1924,openSUSE-SLE-15.6-2024-1924 SKIP SUSE-RU-2024:1926-1 as SUSE-SLE-SAP-12-SP5-2024-1926 is not security or has no CVEs. patches: SUSE-2024-1926,SUSE-SLE-SAP-12-SP5-2024-1926 SKIP SUSE-RU-2024:1927-1 as openSUSE-SLE-15.6-2024-1927 is not security or has no CVEs. patches: SUSE-2024-1927,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1927,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1927,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1927,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1927,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1927,openSUSE-SLE-15.5-2024-1927,openSUSE-SLE-15.6-2024-1927 SKIP SUSE-RU-2024:1928-1 as openSUSE-SLE-15.6-2024-1928 is not security or has no CVEs. patches: SUSE-2024-1928,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1928,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1928,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1928,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1928,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1928,openSUSE-SLE-15.5-2024-1928,openSUSE-SLE-15.6-2024-1928 SKIP SUSE-RU-2024:1929-1 as SUSE-SLE-SAP-12-SP5-2024-1929 is not security or has no CVEs. patches: SUSE-2024-1929,SUSE-SLE-SAP-12-SP5-2024-1929 SKIP SUSE-RU-2024:1930-1 as openSUSE-SLE-15.6-2024-1930 is not security or has no CVEs. patches: SUSE-2024-1930,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1930,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1930,openSUSE-SLE-15.5-2024-1930,openSUSE-SLE-15.6-2024-1930 SKIP SUSE-RU-2024:1933-1 as openSUSE-SLE-15.5-2024-1933 is not security or has no CVEs. patches: SUSE-2024-1933,SUSE-SLE-Micro-5.5-2024-1933,SUSE-SLE-Module-Basesystem-15-SP5-2024-1933,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1933,openSUSE-SLE-15.5-2024-1933 SKIP SUSE-RU-2024:1933-2 as SUSE-SLE-Micro-5.5-2024-1933 is not security or has no CVEs. patches: SUSE-2024-1933,SUSE-SLE-Micro-5.5-2024-1933 SKIP SUSE-RU-2024:1934-1 as SUSE-2024-1934 is not security or has no CVEs. patches: SUSE-2024-1934 SKIP SUSE-RU-2024:1940-1 as openSUSE-Leap-Micro-5.4-2024-1940 is not security or has no CVEs. patches: SUSE-2024-1940,SUSE-SLE-Micro-5.3-2024-1940,SUSE-SLE-Micro-5.4-2024-1940,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1940,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1940,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1940,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1940,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1940,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1940,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1940,openSUSE-Leap-Micro-5.3-2024-1940,openSUSE-Leap-Micro-5.4-2024-1940 SKIP SUSE-RU-2024:1942-1 as openSUSE-SLE-15.6-2024-1942 is not security or has no CVEs. patches: SUSE-2024-1942,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1942,SUSE-SLE-Product-WE-15-SP6-2024-1942,openSUSE-SLE-15.6-2024-1942 SKIP SUSE-RU-2024:1951-1 as openSUSE-SLE-15.6-2024-1951 is not security or has no CVEs. patches: SUSE-2024-1951,SUSE-SLE-Module-Basesystem-15-SP6-2024-1951,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1951,openSUSE-SLE-15.6-2024-1951 SKIP SUSE-RU-2024:1952-1 as openSUSE-SLE-15.6-2024-1952 is not security or has no CVEs. patches: SUSE-2024-1952,SUSE-SLE-Module-Basesystem-15-SP6-2024-1952,openSUSE-SLE-15.6-2024-1952 SKIP SUSE-RU-2024:1953-1 as openSUSE-SLE-15.6-2024-1953 is not security or has no CVEs. patches: SUSE-2024-1953,SUSE-SLE-Manager-Tools-For-Micro-5-2024-1953,SUSE-SLE-Module-Basesystem-15-SP5-2024-1953,SUSE-SLE-Module-Basesystem-15-SP6-2024-1953,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1953,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1953,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1953,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1953,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1953,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1953,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1953,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1953,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1953,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1953,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1953,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1953,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1953,SUSE-Storage-7.1-2024-1953,openSUSE-SLE-15.5-2024-1953,openSUSE-SLE-15.6-2024-1953 SKIP SUSE-RU-2024:1954-1 as openSUSE-SLE-15.6-2024-1954 is not security or has no CVEs. patches: SUSE-2024-1954,SUSE-SLE-Module-Basesystem-15-SP6-2024-1954,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1954,openSUSE-SLE-15.6-2024-1954 SKIP SUSE-RU-2024:1955-1 as openSUSE-SLE-15.6-2024-1955 is not security or has no CVEs. patches: SUSE-2024-1955,SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-1955,openSUSE-SLE-15.5-2024-1955,openSUSE-SLE-15.6-2024-1955 SKIP SUSE-RU-2024:1956-1 as openSUSE-SLE-15.6-2024-1956 is not security or has no CVEs. patches: SUSE-2024-1956,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1956,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1956,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1956,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1956,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1956,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1956,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1956,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1956,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1956,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1956,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1956,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1956,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1956,SUSE-Storage-7.1-2024-1956,openSUSE-SLE-15.5-2024-1956,openSUSE-SLE-15.6-2024-1956 SKIP SUSE-RU-2024:1958-1 as openSUSE-SLE-15.6-2024-1958 is not security or has no CVEs. patches: SUSE-2024-1958,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1958,openSUSE-SLE-15.6-2024-1958 SKIP SUSE-RU-2024:1959-1 as openSUSE-SLE-15.6-2024-1959 is not security or has no CVEs. patches: SUSE-2024-1959,SUSE-SLE-Module-Basesystem-15-SP6-2024-1959,openSUSE-SLE-15.6-2024-1959 SKIP SUSE-RU-2024:1960-1 as SUSE-SLE-SERVER-12-SP5-2024-1960 is not security or has no CVEs. patches: SUSE-2024-1960,SUSE-SLE-SDK-12-SP5-2024-1960,SUSE-SLE-SERVER-12-SP5-2024-1960 SKIP SUSE-RU-2024:1964-1 as openSUSE-SLE-15.5-2024-1964 is not security or has no CVEs. patches: SUSE-2024-1964,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1964,openSUSE-SLE-15.5-2024-1964 SKIP SUSE-RU-2024:1965-1 as openSUSE-SLE-15.6-2024-1965 is not security or has no CVEs. patches: SUSE-2024-1965,SUSE-SLE-Module-Development-Tools-15-SP6-2024-1965,openSUSE-SLE-15.6-2024-1965 SKIP SUSE-RU-2024:1972-1 as SUSE-SLE-SERVER-12-SP5-2024-1972 is not security or has no CVEs. patches: SUSE-2024-1972,SUSE-SLE-SDK-12-SP5-2024-1972,SUSE-SLE-SERVER-12-SP5-2024-1972 SKIP SUSE-RU-2024:1993-1 as openSUSE-SLE-15.5-2024-1993 is not security or has no CVEs. patches: SUSE-2024-1993,SUSE-SLE-Micro-5.5-2024-1993,SUSE-SLE-Module-Basesystem-15-SP5-2024-1993,openSUSE-SLE-15.5-2024-1993 SKIP SUSE-RU-2024:1993-2 as SUSE-SLE-Micro-5.5-2024-1993 is not security or has no CVEs. patches: SUSE-2024-1993,SUSE-SLE-Micro-5.5-2024-1993 SKIP SUSE-RU-2024:1994-1 as openSUSE-SLE-15.6-2024-1994 is not security or has no CVEs. patches: SUSE-2024-1994,SUSE-SLE-Micro-5.5-2024-1994,SUSE-SLE-Module-Basesystem-15-SP5-2024-1994,SUSE-SLE-Module-Basesystem-15-SP6-2024-1994,openSUSE-SLE-15.5-2024-1994,openSUSE-SLE-15.6-2024-1994 SKIP SUSE-RU-2024:1994-2 as SUSE-SLE-Micro-5.5-2024-1994 is not security or has no CVEs. patches: SUSE-2024-1994,SUSE-SLE-Micro-5.5-2024-1994 SKIP SUSE-RU-2024:1995-1 as openSUSE-SLE-15.6-2024-1995 is not security or has no CVEs. patches: SUSE-2024-1995,SUSE-SLE-Module-Basesystem-15-SP5-2024-1995,SUSE-SLE-Module-Basesystem-15-SP6-2024-1995,SUSE-SLE-Module-Server-Applications-15-SP5-2024-1995,SUSE-SLE-Module-Server-Applications-15-SP6-2024-1995,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1995,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1995,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1995,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1995,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1995,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1995,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1995,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1995,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1995,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1995,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1995,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1995,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1995,SUSE-Storage-7.1-2024-1995,openSUSE-SLE-15.5-2024-1995,openSUSE-SLE-15.6-2024-1995 SKIP SUSE-RU-2024:1996-1 as openSUSE-SLE-15.6-2024-1996 is not security or has no CVEs. patches: SUSE-2024-1996,openSUSE-SLE-15.6-2024-1996 SKIP SUSE-RU-2024:1997-1 as openSUSE-SLE-15.6-2024-1997 is not security or has no CVEs. patches: SUSE-2024-1997,SUSE-SLE-Module-Basesystem-15-SP6-2024-1997,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1997,openSUSE-SLE-15.6-2024-1997 SKIP SUSE-RU-2024:1998-1 as openSUSE-SLE-15.6-2024-1998 is not security or has no CVEs. patches: SUSE-2024-1998,SUSE-SLE-INSTALLER-15-SP6-2024-1998,SUSE-SLE-Module-Basesystem-15-SP6-2024-1998,openSUSE-SLE-15.6-2024-1998 SKIP SUSE-RU-2024:1999-1 as openSUSE-SLE-15.5-2024-1999 is not security or has no CVEs. patches: SUSE-2024-1999,SUSE-SLE-INSTALLER-15-SP5-2024-1999,SUSE-SLE-Module-Basesystem-15-SP5-2024-1999,openSUSE-SLE-15.5-2024-1999 SKIP SUSE-RU-2024:2000-1 as openSUSE-SLE-15.6-2024-2000 is not security or has no CVEs. patches: SUSE-2024-2000,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2000,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2000,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2000,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2000,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2000,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2000,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2000,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2000,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2000,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2000,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2000,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2000,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2000,SUSE-Storage-7.1-2024-2000,openSUSE-SLE-15.5-2024-2000,openSUSE-SLE-15.6-2024-2000 SKIP SUSE-RU-2024:2004-1 as openSUSE-SLE-15.5-2024-2004 is not security or has no CVEs. patches: SUSE-2024-2004,SUSE-SLE-Module-Basesystem-15-SP5-2024-2004,openSUSE-SLE-15.5-2024-2004 SKIP SUSE-RU-2024:2006-1 as openSUSE-SLE-15.6-2024-2006 is not security or has no CVEs. patches: SUSE-2024-2006,SUSE-SLE-Module-Basesystem-15-SP6-2024-2006,openSUSE-SLE-15.6-2024-2006 SKIP SUSE-RU-2024:2007-1 as openSUSE-SLE-15.5-2024-2007 is not security or has no CVEs. patches: SUSE-2024-2007,SUSE-SLE-Module-Basesystem-15-SP5-2024-2007,openSUSE-SLE-15.5-2024-2007 SKIP SUSE-RU-2024:2013-1 as openSUSE-SLE-15.6-2024-2013 is not security or has no CVEs. patches: SUSE-2024-2013,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2013,openSUSE-SLE-15.6-2024-2013 SKIP SUSE-RU-2024:2014-1 as openSUSE-SLE-15.6-2024-2014 is not security or has no CVEs. patches: SUSE-2024-2014,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2014,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2014,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2014,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2014,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2014,openSUSE-SLE-15.5-2024-2014,openSUSE-SLE-15.6-2024-2014 SKIP SUSE-RU-2024:2015-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2015 is not security or has no CVEs. patches: SUSE-2024-2015,SUSE-SLE-Module-Public-Cloud-12-2024-2015 SKIP SUSE-RU-2024:2016-1 as openSUSE-SLE-15.6-2024-2016 is not security or has no CVEs. patches: SUSE-2024-2016,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2016,openSUSE-SLE-15.6-2024-2016 SKIP SUSE-RU-2024:2017-1 as openSUSE-Leap-Micro-5.3-2024-2017 is not security or has no CVEs. patches: SUSE-2024-2017,SUSE-SLE-Micro-5.3-2024-2017,openSUSE-Leap-Micro-5.3-2024-2017 SKIP SUSE-RU-2024:2018-1 as SUSE-SLE-Micro-5.5-2024-2018 is not security or has no CVEs. patches: SUSE-2024-2018,SUSE-SLE-Micro-5.5-2024-2018 SKIP SUSE-RU-2024:2018-2 as SUSE-SLE-Micro-5.5-2024-2018 is not security or has no CVEs. patches: SUSE-2024-2018,SUSE-SLE-Micro-5.5-2024-2018 SKIP SUSE-RU-2024:2021-1 as openSUSE-Leap-Micro-5.4-2024-2021 is not security or has no CVEs. patches: SUSE-2024-2021,SUSE-SLE-Micro-5.3-2024-2021,SUSE-SLE-Micro-5.4-2024-2021,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2021,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2021,openSUSE-Leap-Micro-5.3-2024-2021,openSUSE-Leap-Micro-5.4-2024-2021 SKIP SUSE-RU-2024:2022-1 as openSUSE-SLE-15.6-2024-2022 is not security or has no CVEs. patches: SUSE-2024-2022,SUSE-SLE-Micro-5.3-2024-2022,SUSE-SLE-Micro-5.4-2024-2022,SUSE-SLE-Micro-5.5-2024-2022,SUSE-SLE-Module-Basesystem-15-SP5-2024-2022,SUSE-SLE-Module-Basesystem-15-SP6-2024-2022,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2022,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2022,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2022,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2022,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2022,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2022,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2022,openSUSE-Leap-Micro-5.3-2024-2022,openSUSE-Leap-Micro-5.4-2024-2022,openSUSE-SLE-15.5-2024-2022,openSUSE-SLE-15.6-2024-2022 SKIP SUSE-RU-2024:2022-2 as SUSE-SLE-Micro-5.5-2024-2022 is not security or has no CVEs. patches: SUSE-2024-2022,SUSE-SLE-Micro-5.5-2024-2022 SKIP SUSE-RU-2024:2023-1 as openSUSE-SLE-15.5-2024-2023 is not security or has no CVEs. patches: SUSE-2024-2023,SUSE-SLE-Micro-5.3-2024-2023,SUSE-SLE-Micro-5.4-2024-2023,SUSE-SLE-Micro-5.5-2024-2023,SUSE-SLE-Module-Basesystem-15-SP5-2024-2023,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2023,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2023,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2023,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2023,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2023,openSUSE-Leap-Micro-5.3-2024-2023,openSUSE-Leap-Micro-5.4-2024-2023,openSUSE-SLE-15.5-2024-2023 SKIP SUSE-RU-2024:2023-2 as SUSE-SLE-Micro-5.5-2024-2023 is not security or has no CVEs. patches: SUSE-2024-2023,SUSE-SLE-Micro-5.5-2024-2023 SKIP SUSE-RU-2024:2024-1 as openSUSE-SLE-15.6-2024-2024 is not security or has no CVEs. patches: SUSE-2024-2024,SUSE-SLE-Micro-5.3-2024-2024,SUSE-SLE-Micro-5.4-2024-2024,SUSE-SLE-Micro-5.5-2024-2024,SUSE-SLE-Module-Basesystem-15-SP5-2024-2024,SUSE-SLE-Module-Basesystem-15-SP6-2024-2024,openSUSE-Leap-Micro-5.3-2024-2024,openSUSE-Leap-Micro-5.4-2024-2024,openSUSE-SLE-15.5-2024-2024,openSUSE-SLE-15.6-2024-2024 SKIP SUSE-RU-2024:2024-2 as SUSE-SLE-Micro-5.5-2024-2024 is not security or has no CVEs. patches: SUSE-2024-2024,SUSE-SLE-Micro-5.5-2024-2024 SKIP SUSE-RU-2024:2025-1 as openSUSE-Leap-Micro-5.4-2024-2025 is not security or has no CVEs. patches: SUSE-2024-2025,SUSE-SLE-Micro-5.4-2024-2025,openSUSE-Leap-Micro-5.4-2024-2025 SKIP SUSE-RU-2024:2034-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2034 is not security or has no CVEs. patches: SUSE-2024-2034,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2034,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2034,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2034,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2034,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2034,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2034 SKIP SUSE-RU-2024:2044-1 as openSUSE-SLE-15.6-2024-2044 is not security or has no CVEs. patches: SUSE-2024-2044,SUSE-SLE-Micro-5.5-2024-2044,SUSE-SLE-Module-Containers-15-SP5-2024-2044,SUSE-SLE-Module-Containers-15-SP6-2024-2044,openSUSE-SLE-15.5-2024-2044,openSUSE-SLE-15.6-2024-2044 SKIP SUSE-RU-2024:2044-2 as SUSE-SLE-Micro-5.5-2024-2044 is not security or has no CVEs. patches: SUSE-2024-2044,SUSE-SLE-Micro-5.5-2024-2044 SKIP SUSE-RU-2024:2046-1 as openSUSE-SLE-15.6-2024-2046 is not security or has no CVEs. patches: SUSE-2024-2046,SUSE-SLE-Module-Web-Scripting-15-SP6-2024-2046,openSUSE-SLE-15.6-2024-2046 SKIP SUSE-RU-2024:2048-1 as SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2048 is not security or has no CVEs. patches: SUSE-2024-2048,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-2048,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2048,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2048,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2048,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2048 SKIP SUSE-RU-2024:2053-1 as SUSE-SLE-SERVER-12-SP5-2024-2053 is not security or has no CVEs. patches: SUSE-2024-2053,SUSE-SLE-SERVER-12-SP5-2024-2053 SKIP SUSE-RU-2024:2055-1 as SUSE-2024-2055 is not security or has no CVEs. patches: SUSE-2024-2055,SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-2055 SKIP SUSE-RU-2024:2069-1 as SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2069 is not security or has no CVEs. patches: SUSE-2024-2069,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2069,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2069,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2069,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2069,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2069 SKIP SUSE-RU-2024:2070-1 as openSUSE-SLE-15.5-2024-2070 is not security or has no CVEs. patches: SUSE-2024-2070,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2070,openSUSE-SLE-15.5-2024-2070 SKIP SUSE-RU-2024:2071-1 as openSUSE-SLE-15.6-2024-2071 is not security or has no CVEs. patches: SUSE-2024-2071,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2071,openSUSE-SLE-15.6-2024-2071 SKIP SUSE-RU-2024:2072-1 as openSUSE-SLE-15.6-2024-2072 is not security or has no CVEs. patches: SUSE-2024-2072,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2072,openSUSE-SLE-15.6-2024-2072 SKIP SUSE-RU-2024:2075-1 as openSUSE-SLE-15.6-2024-2075 is not security or has no CVEs. patches: SUSE-2024-2075,SUSE-SLE-Module-Basesystem-15-SP6-2024-2075,openSUSE-SLE-15.6-2024-2075 SKIP SUSE-RU-2024:2079-1 as openSUSE-SLE-15.6-2024-2079 is not security or has no CVEs. patches: SUSE-2024-2079,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2079,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2079,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2079,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2079,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2079,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2079,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2079,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2079,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2079,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2079,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2079,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2079,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2079,SUSE-Storage-7.1-2024-2079,openSUSE-SLE-15.5-2024-2079,openSUSE-SLE-15.6-2024-2079 SKIP SUSE-RU-2024:2084-1 as openSUSE-SLE-15.6-2024-2084 is not security or has no CVEs. patches: SUSE-2024-2084,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2084,openSUSE-SLE-15.6-2024-2084 SKIP SUSE-RU-2024:2085-1 as openSUSE-SLE-15.5-2024-2085 is not security or has no CVEs. patches: SUSE-2024-2085,SUSE-SLE-Micro-5.3-2024-2085,SUSE-SLE-Micro-5.4-2024-2085,SUSE-SLE-Micro-5.5-2024-2085,SUSE-SLE-Module-Basesystem-15-SP5-2024-2085,SUSE-SLE-Module-Basesystem-15-SP6-2024-2085,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2085,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2085,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2085,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2085,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2085,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2085,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2085,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2085,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2085,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2085,SUSE-SUSE-MicroOS-5.1-2024-2085,SUSE-SUSE-MicroOS-5.2-2024-2085,SUSE-Storage-7.1-2024-2085,openSUSE-Leap-Micro-5.3-2024-2085,openSUSE-Leap-Micro-5.4-2024-2085,openSUSE-SLE-15.5-2024-2085 SKIP SUSE-RU-2024:2085-2 as SUSE-SLE-Micro-5.5-2024-2085 is not security or has no CVEs. patches: SUSE-2024-2085,SUSE-SLE-Micro-5.5-2024-2085 SKIP SUSE-RU-2024:2086-1 as openSUSE-SLE-15.6-2024-2086 is not security or has no CVEs. patches: SUSE-2024-2086,SUSE-SLE-INSTALLER-15-SP2-2024-2086,SUSE-SLE-INSTALLER-15-SP3-2024-2086,SUSE-SLE-INSTALLER-15-SP4-2024-2086,SUSE-SLE-INSTALLER-15-SP5-2024-2086,SUSE-SLE-Micro-5.3-2024-2086,SUSE-SLE-Micro-5.4-2024-2086,SUSE-SLE-Micro-5.5-2024-2086,SUSE-SLE-Module-Basesystem-15-SP5-2024-2086,SUSE-SLE-Module-Basesystem-15-SP6-2024-2086,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2086,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2086,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2086,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2086,SUSE-SUSE-MicroOS-5.1-2024-2086,SUSE-SUSE-MicroOS-5.2-2024-2086,openSUSE-Leap-Micro-5.3-2024-2086,openSUSE-Leap-Micro-5.4-2024-2086,openSUSE-SLE-15.5-2024-2086,openSUSE-SLE-15.6-2024-2086 SKIP SUSE-RU-2024:2087-1 as SUSE-SLE-SERVER-12-SP5-2024-2087 is not security or has no CVEs. patches: SUSE-2024-2087,SUSE-SLE-Module-Toolchain-12-2024-2087,SUSE-SLE-SERVER-12-SP5-2024-2087 SKIP SUSE-RU-2024:2104-1 as openSUSE-SLE-15.6-2024-2104 is not security or has no CVEs. patches: SUSE-2024-2104,SUSE-SLE-Module-Basesystem-15-SP6-2024-2104,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2104,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2104,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2104,SUSE-SLE-Module-Python3-15-SP6-2024-2104,openSUSE-SLE-15.6-2024-2104 SKIP SUSE-RU-2024:2118-1 as openSUSE-SLE-15.6-2024-2118 is not security or has no CVEs. patches: SUSE-2024-2118,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2118,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2118,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2118,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2118,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2118,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2118,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2118,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2118,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2118,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2118,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2118,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2118,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2118,SUSE-Storage-7.1-2024-2118,openSUSE-SLE-15.5-2024-2118,openSUSE-SLE-15.6-2024-2118 SKIP SUSE-RU-2024:2142-1 as openSUSE-SLE-15.6-2024-2142 is not security or has no CVEs. patches: SUSE-2024-2142,SUSE-SLE-Manager-Tools-For-Micro-5-2024-2142,SUSE-SLE-Module-Basesystem-15-SP5-2024-2142,SUSE-SLE-Module-Basesystem-15-SP6-2024-2142,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2142,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2142,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2142,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2142,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2142,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2142,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2142,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2142,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2142,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2142,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2142,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2142,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2142,SUSE-Storage-7.1-2024-2142,openSUSE-SLE-15.5-2024-2142,openSUSE-SLE-15.6-2024-2142 SKIP SUSE-RU-2024:2155-1 as openSUSE-SLE-15.6-2024-2155 is not security or has no CVEs. patches: SUSE-2024-2155,SUSE-SLE-Module-Basesystem-15-SP6-2024-2155,openSUSE-SLE-15.6-2024-2155 SKIP SUSE-RU-2024:2172-1 as openSUSE-SLE-15.6-2024-2172 is not security or has no CVEs. patches: SUSE-2024-2172,SUSE-SLE-Module-Basesystem-15-SP6-2024-2172,openSUSE-SLE-15.6-2024-2172 SKIP SUSE-RU-2024:2175-1 as SUSE-SLE-SERVER-12-SP5-2024-2175 is not security or has no CVEs. patches: SUSE-2024-2175,SUSE-SLE-SERVER-12-SP5-2024-2175 SKIP SUSE-RU-2024:2176-1 as openSUSE-SLE-15.5-2024-2176 is not security or has no CVEs. patches: SUSE-2024-2176,SUSE-SLE-INSTALLER-15-SP5-2024-2176,SUSE-SLE-Micro-5.4-2024-2176,SUSE-SLE-Micro-5.5-2024-2176,SUSE-SLE-Module-Basesystem-15-SP5-2024-2176,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2176,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2176,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2176,SUSE-SLE-Module-Python3-15-SP5-2024-2176,SUSE-SLE-Product-WE-15-SP5-2024-2176,openSUSE-SLE-15.5-2024-2176 SKIP SUSE-RU-2024:2176-2 as SUSE-SLE-Micro-5.5-2024-2176 is not security or has no CVEs. patches: SUSE-2024-2176,SUSE-SLE-Micro-5.5-2024-2176 SKIP SUSE-RU-2024:2177-1 as openSUSE-SLE-15.5-2024-2177 is not security or has no CVEs. patches: SUSE-2024-2177,SUSE-SLE-Micro-5.5-2024-2177,SUSE-SLE-Module-Basesystem-15-SP5-2024-2177,openSUSE-SLE-15.5-2024-2177 SKIP SUSE-RU-2024:2178-1 as openSUSE-SLE-15.6-2024-2178 is not security or has no CVEs. patches: SUSE-2024-2178,SUSE-SLE-Module-Basesystem-15-SP6-2024-2178,openSUSE-SLE-15.6-2024-2178 SKIP SUSE-RU-2024:2179-1 as openSUSE-SLE-15.6-2024-2179 is not security or has no CVEs. patches: SUSE-2024-2179,SUSE-SLE-Module-Basesystem-15-SP6-2024-2179,openSUSE-SLE-15.6-2024-2179 SKIP SUSE-RU-2024:2181-1 as SUSE-2024-2181 is not security or has no CVEs. patches: SUSE-2024-2181 SKIP SUSE-RU-2024:2188-1 as openSUSE-SLE-15.6-2024-2188 is not security or has no CVEs. patches: SUSE-2024-2188,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2188,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2188,openSUSE-SLE-15.5-2024-2188,openSUSE-SLE-15.6-2024-2188 SKIP SUSE-RU-2024:2192-1 as SUSE-SLE-Module-Server-Applications-15-SP6-2024-2192 is not security or has no CVEs. patches: SUSE-2024-2192,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2192 SKIP SUSE-RU-2024:2196-1 as openSUSE-Leap-Micro-5.4-2024-2196 is not security or has no CVEs. patches: SUSE-2024-2196,SUSE-SLE-Micro-5.3-2024-2196,SUSE-SLE-Micro-5.4-2024-2196,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2196,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2196,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2196,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2196,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2196,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2196,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2196,openSUSE-Leap-Micro-5.3-2024-2196,openSUSE-Leap-Micro-5.4-2024-2196 SKIP SUSE-RU-2024:2210-1 as SUSE-SLE-Product-HPC-15-SP6-2024-2210 is not security or has no CVEs. patches: SUSE-2024-2210,SUSE-SLE-Module-HPC-15-SP6-2024-2210,SUSE-SLE-Product-HPC-15-SP6-2024-2210 SKIP SUSE-RU-2024:2211-1 as SUSE-SLE-SERVER-12-SP5-2024-2211 is not security or has no CVEs. patches: SUSE-2024-2211,SUSE-SLE-SERVER-12-SP5-2024-2211 SKIP SUSE-RU-2024:2212-1 as openSUSE-SLE-15.6-2024-2212 is not security or has no CVEs. patches: SUSE-2024-2212,SUSE-SLE-Product-SLED-15-SP6-2024-2212,openSUSE-SLE-15.6-2024-2212 SKIP SUSE-RU-2024:2213-1 as SUSE-SLE-WE-12-SP5-2024-2213 is not security or has no CVEs. patches: SUSE-2024-2213,SUSE-SLE-SDK-12-SP5-2024-2213,SUSE-SLE-SERVER-12-SP5-2024-2213,SUSE-SLE-WE-12-SP5-2024-2213 SKIP SUSE-RU-2024:2214-1 as openSUSE-SLE-15.6-2024-2214 is not security or has no CVEs. patches: SUSE-2024-2214,SUSE-SLE-Module-Basesystem-15-SP6-2024-2214,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2214,openSUSE-SLE-15.6-2024-2214 SKIP SUSE-RU-2024:2215-1 as openSUSE-SLE-15.6-2024-2215 is not security or has no CVEs. patches: SUSE-2024-2215,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2215,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2215,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2215,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2215,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2215,SUSE-SUSE-MicroOS-5.2-2024-2215,openSUSE-SLE-15.5-2024-2215,openSUSE-SLE-15.6-2024-2215 SKIP SUSE-RU-2024:2222-1 as openSUSE-SLE-15.6-2024-2222 is not security or has no CVEs. patches: SUSE-2024-2222,SUSE-SLE-Micro-5.5-2024-2222,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2222,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2222,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2222,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2222,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2222,openSUSE-SLE-15.5-2024-2222,openSUSE-SLE-15.6-2024-2222 SKIP SUSE-RU-2024:2222-2 as SUSE-SLE-Micro-5.5-2024-2222 is not security or has no CVEs. patches: SUSE-2024-2222,SUSE-SLE-Micro-5.5-2024-2222 SKIP SUSE-RU-2024:2223-1 as SUSE-SLE-SERVER-12-SP5-2024-2223 is not security or has no CVEs. patches: SUSE-2024-2223,SUSE-SLE-SERVER-12-SP5-2024-2223 SKIP SUSE-RU-2024:2224-1 as openSUSE-SLE-15.6-2024-2224 is not security or has no CVEs. patches: SUSE-2024-2224,SUSE-SLE-Module-Legacy-15-SP5-2024-2224,SUSE-SLE-Module-Legacy-15-SP6-2024-2224,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2224,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2224,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2224,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2224,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2224,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2224,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2224,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2224,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2224,SUSE-Storage-7.1-2024-2224,openSUSE-SLE-15.5-2024-2224,openSUSE-SLE-15.6-2024-2224 SKIP SUSE-RU-2024:2225-1 as openSUSE-SLE-15.6-2024-2225 is not security or has no CVEs. patches: SUSE-2024-2225,SUSE-SLE-Module-Basesystem-15-SP6-2024-2225,openSUSE-SLE-15.6-2024-2225 SKIP SUSE-RU-2024:2226-1 as openSUSE-SLE-15.5-2024-2226 is not security or has no CVEs. patches: SUSE-2024-2226,SUSE-SLE-Module-Basesystem-15-SP5-2024-2226,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2226,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2226,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2226,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2226,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2226,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2226,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2226,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2226,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2226,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2226,openSUSE-SLE-15.5-2024-2226 SKIP SUSE-RU-2024:2227-1 as SUSE-Storage-7.1-2024-2227 is not security or has no CVEs. patches: SUSE-2024-2227,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2227,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2227,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2227,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2227,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2227,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2227,SUSE-Storage-7.1-2024-2227 SKIP SUSE-RU-2024:2228-1 as SUSE-SLE-SERVER-12-SP5-2024-2228 is not security or has no CVEs. patches: SUSE-2024-2228,SUSE-SLE-SDK-12-SP5-2024-2228,SUSE-SLE-SERVER-12-SP5-2024-2228 SKIP SUSE-RU-2024:2229-1 as openSUSE-SLE-15.6-2024-2229 is not security or has no CVEs. patches: SUSE-2024-2229,SUSE-SLE-Module-Basesystem-15-SP6-2024-2229,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2229,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2229,openSUSE-SLE-15.6-2024-2229 SKIP SUSE-RU-2024:2231-1 as openSUSE-SLE-15.5-2024-2231 is not security or has no CVEs. patches: SUSE-2024-2231,SUSE-SLE-Module-Basesystem-15-SP5-2024-2231,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2231,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2231,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2231,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2231,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2231,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2231,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2231,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2231,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2231,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2231,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2231,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2231,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2231,SUSE-Storage-7.1-2024-2231,openSUSE-SLE-15.5-2024-2231 SKIP SUSE-RU-2024:2232-1 as openSUSE-Leap-Micro-5.4-2024-2232 is not security or has no CVEs. patches: SUSE-2024-2232,SUSE-SLE-Micro-5.3-2024-2232,SUSE-SLE-Micro-5.4-2024-2232,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2232,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2232,openSUSE-Leap-Micro-5.3-2024-2232,openSUSE-Leap-Micro-5.4-2024-2232 SKIP SUSE-RU-2024:2233-1 as SUSE-Storage-7.1-2024-2233 is not security or has no CVEs. patches: SUSE-2024-2233,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2233,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2233,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2233,SUSE-SUSE-MicroOS-5.1-2024-2233,SUSE-SUSE-MicroOS-5.2-2024-2233,SUSE-Storage-7.1-2024-2233 SKIP SUSE-RU-2024:2234-1 as openSUSE-SLE-15.6-2024-2234 is not security or has no CVEs. patches: SUSE-2024-2234,SUSE-SLE-Module-Basesystem-15-SP6-2024-2234,openSUSE-SLE-15.6-2024-2234 SKIP SUSE-RU-2024:2235-1 as openSUSE-Leap-Micro-5.3-2024-2235 is not security or has no CVEs. patches: SUSE-2024-2235,SUSE-SLE-Micro-5.3-2024-2235,openSUSE-Leap-Micro-5.3-2024-2235 SKIP SUSE-RU-2024:2236-1 as SUSE-SLE-Micro-5.5-2024-2236 is not security or has no CVEs. patches: SUSE-2024-2236,SUSE-SLE-Micro-5.5-2024-2236 SKIP SUSE-RU-2024:2236-2 as SUSE-SLE-Micro-5.5-2024-2236 is not security or has no CVEs. patches: SUSE-2024-2236,SUSE-SLE-Micro-5.5-2024-2236 SKIP SUSE-RU-2024:2237-1 as openSUSE-Leap-Micro-5.4-2024-2237 is not security or has no CVEs. patches: SUSE-2024-2237,SUSE-SLE-Micro-5.4-2024-2237,openSUSE-Leap-Micro-5.4-2024-2237 SKIP SUSE-RU-2024:2238-1 as openSUSE-SLE-15.6-2024-2238 is not security or has no CVEs. patches: SUSE-2024-2238,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2238,openSUSE-SLE-15.6-2024-2238 SKIP SUSE-RU-2024:2239-1 as openSUSE-SLE-15.6-2024-2239 is not security or has no CVEs. patches: SUSE-2024-2239,SUSE-SLE-Module-Basesystem-15-SP6-2024-2239,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2239,openSUSE-SLE-15.6-2024-2239 SKIP SUSE-RU-2024:2240-1 as SUSE-Storage-7.1-2024-2240 is not security or has no CVEs. patches: SUSE-2024-2240,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2240,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2240,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2240,SUSE-SUSE-MicroOS-5.1-2024-2240,SUSE-SUSE-MicroOS-5.2-2024-2240,SUSE-Storage-7.1-2024-2240 SKIP SUSE-RU-2024:2241-1 as openSUSE-SLE-15.6-2024-2241 is not security or has no CVEs. patches: SUSE-2024-2241,SUSE-SLE-Module-Basesystem-15-SP6-2024-2241,openSUSE-SLE-15.6-2024-2241 SKIP SUSE-RU-2024:2242-1 as openSUSE-SLE-15.5-2024-2242 is not security or has no CVEs. patches: SUSE-2024-2242,SUSE-SLE-Micro-5.5-2024-2242,SUSE-SLE-Module-Basesystem-15-SP5-2024-2242,openSUSE-SLE-15.5-2024-2242 SKIP SUSE-RU-2024:2242-2 as SUSE-SLE-Micro-5.5-2024-2242 is not security or has no CVEs. patches: SUSE-2024-2242,SUSE-SLE-Micro-5.5-2024-2242 SKIP SUSE-RU-2024:2243-1 as openSUSE-SLE-15.6-2024-2243 is not security or has no CVEs. patches: SUSE-2024-2243,SUSE-SLE-Module-Basesystem-15-SP6-2024-2243,openSUSE-SLE-15.6-2024-2243 SKIP SUSE-RU-2024:2252-1 as SUSE-SLE-Module-Containers-15-SP3-2024-2252 is not security or has no CVEs. patches: SUSE-2024-2252,SUSE-SLE-Module-Containers-15-SP3-2024-2252 SKIP SUSE-RU-2024:2253-1 as openSUSE-SLE-15.6-2024-2253 is not security or has no CVEs. patches: SUSE-2024-2253,SUSE-SLE-Micro-5.3-2024-2253,SUSE-SLE-Micro-5.4-2024-2253,SUSE-SLE-Micro-5.5-2024-2253,SUSE-SLE-Module-Containers-15-SP5-2024-2253,SUSE-SLE-Module-Containers-15-SP6-2024-2253,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2253,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2253,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2253,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2253,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2253,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2253,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2253,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2253,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2253,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2253,SUSE-SUSE-MicroOS-5.1-2024-2253,SUSE-SUSE-MicroOS-5.2-2024-2253,SUSE-Storage-7.1-2024-2253,openSUSE-Leap-Micro-5.3-2024-2253,openSUSE-Leap-Micro-5.4-2024-2253,openSUSE-SLE-15.5-2024-2253,openSUSE-SLE-15.6-2024-2253 SKIP SUSE-RU-2024:2253-2 as SUSE-SLE-Micro-5.5-2024-2253 is not security or has no CVEs. patches: SUSE-2024-2253,SUSE-SLE-Micro-5.5-2024-2253 SKIP SUSE-RU-2024:2255-1 as openSUSE-SLE-15.6-2024-2255 is not security or has no CVEs. patches: SUSE-2024-2255,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2255,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2255,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2255,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2255,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2255,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2255,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2255,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2255,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2255,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2255,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2255,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2255,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2255,SUSE-Storage-7.1-2024-2255,openSUSE-SLE-15.5-2024-2255,openSUSE-SLE-15.6-2024-2255 SKIP SUSE-RU-2024:2256-1 as openSUSE-SLE-15.6-2024-2256 is not security or has no CVEs. patches: SUSE-2024-2256,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2256,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2256,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2256,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2256,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2256,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2256,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2256,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2256,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2256,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2256,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2256,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2256,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2256,SUSE-Storage-7.1-2024-2256,openSUSE-SLE-15.5-2024-2256,openSUSE-SLE-15.6-2024-2256 SKIP SUSE-RU-2024:2259-1 as openSUSE-SLE-15.6-2024-2259 is not security or has no CVEs. patches: SUSE-2024-2259,SUSE-SLE-Module-Basesystem-15-SP6-2024-2259,openSUSE-SLE-15.6-2024-2259 SKIP SUSE-RU-2024:2264-1 as openSUSE-SLE-15.6-2024-2264 is not security or has no CVEs. patches: SUSE-2024-2264,SUSE-SLE-Module-Basesystem-15-SP5-2024-2264,SUSE-SLE-Module-Basesystem-15-SP6-2024-2264,openSUSE-SLE-15.5-2024-2264,openSUSE-SLE-15.6-2024-2264 SKIP SUSE-RU-2024:2278-1 as openSUSE-SLE-15.6-2024-2278 is not security or has no CVEs. patches: SUSE-2024-2278,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2278,openSUSE-SLE-15.6-2024-2278 SKIP SUSE-RU-2024:2284-1 as openSUSE-SLE-15.6-2024-2284 is not security or has no CVEs. patches: SUSE-2024-2284,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2284,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2284,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2284,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2284,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2284,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2284,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2284,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2284,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2284,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2284,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2284,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2284,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2284,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2284,SUSE-Storage-7.1-2024-2284,openSUSE-SLE-15.5-2024-2284,openSUSE-SLE-15.6-2024-2284 SKIP SUSE-RU-2024:2285-1 as openSUSE-SLE-15.6-2024-2285 is not security or has no CVEs. patches: SUSE-2024-2285,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2285,SUSE-SLE-Product-WE-15-SP6-2024-2285,openSUSE-SLE-15.6-2024-2285 SKIP SUSE-RU-2024:2289-1 as openSUSE-SLE-15.6-2024-2289 is not security or has no CVEs. patches: SUSE-2024-2289,SUSE-SLE-Module-Basesystem-15-SP6-2024-2289,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2289,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2289,openSUSE-SLE-15.6-2024-2289 SKIP SUSE-RU-2024:2291-1 as SUSE-Elemental-5.5-2024-2291 is not security or has no CVEs. patches: SUSE-2024-2291,SUSE-Elemental-5.5-2024-2291 SKIP SUSE-RU-2024:2306-1 as openSUSE-SLE-15.6-2024-2306 is not security or has no CVEs. patches: SUSE-2024-2306,SUSE-SLE-Module-Basesystem-15-SP6-2024-2306,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2306,openSUSE-SLE-15.6-2024-2306 SKIP SUSE-RU-2024:2310-1 as SUSE-Storage-7.1-2024-2310 is not security or has no CVEs. patches: SUSE-2024-2310,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2310,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2310,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2310,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2310,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2310,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2310,SUSE-SUSE-MicroOS-5.1-2024-2310,SUSE-SUSE-MicroOS-5.2-2024-2310,SUSE-Storage-7.1-2024-2310 SKIP SUSE-RU-2024:2311-1 as openSUSE-SLE-15.6-2024-2311 is not security or has no CVEs. patches: SUSE-2024-2311,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2311,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2311,openSUSE-SLE-15.5-2024-2311,openSUSE-SLE-15.6-2024-2311 SKIP SUSE-RU-2024:2314-1 as openSUSE-SLE-15.6-2024-2314 is not security or has no CVEs. patches: SUSE-2024-2314,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2314,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2314,openSUSE-SLE-15.5-2024-2314,openSUSE-SLE-15.6-2024-2314 SKIP SUSE-RU-2024:2315-1 as openSUSE-SLE-15.6-2024-2315 is not security or has no CVEs. patches: SUSE-2024-2315,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2315,openSUSE-SLE-15.6-2024-2315 SKIP SUSE-RU-2024:2317-1 as openSUSE-SLE-15.5-2024-2317 is not security or has no CVEs. patches: SUSE-2024-2317,SUSE-SLE-Micro-5.5-2024-2317,SUSE-SLE-Module-Basesystem-15-SP5-2024-2317,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2317,openSUSE-SLE-15.5-2024-2317 SKIP SUSE-RU-2024:2319-1 as openSUSE-SLE-15.6-2024-2319 is not security or has no CVEs. patches: SUSE-2024-2319,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2319,SUSE-SLE-Module-Python3-15-SP6-2024-2319,openSUSE-SLE-15.6-2024-2319 SKIP SUSE-RU-2024:2321-1 as SUSE-SLE-SERVER-12-SP5-2024-2321 is not security or has no CVEs. patches: SUSE-2024-2321,SUSE-SLE-SDK-12-SP5-2024-2321,SUSE-SLE-SERVER-12-SP5-2024-2321 SKIP SUSE-RU-2024:2323-1 as openSUSE-SLE-15.6-2024-2323 is not security or has no CVEs. patches: SUSE-2024-2323,SUSE-SLE-Module-Basesystem-15-SP6-2024-2323,SUSE-SLE-Module-Containers-15-SP6-2024-2323,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2323,openSUSE-SLE-15.6-2024-2323 SKIP SUSE-RU-2024:2324-1 as openSUSE-SLE-15.6-2024-2324 is not security or has no CVEs. patches: SUSE-2024-2324,SUSE-SLE-Module-Basesystem-15-SP5-2024-2324,SUSE-SLE-Module-Basesystem-15-SP6-2024-2324,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2324,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2324,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2324,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2324,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2324,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2324,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2324,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2324,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2324,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2324,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2324,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2324,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2324,SUSE-Storage-7.1-2024-2324,openSUSE-SLE-15.5-2024-2324,openSUSE-SLE-15.6-2024-2324 SKIP SUSE-RU-2024:2325-1 as openSUSE-SLE-15.5-2024-2325 is not security or has no CVEs. patches: SUSE-2024-2325,SUSE-SLE-Micro-5.3-2024-2325,SUSE-SLE-Micro-5.4-2024-2325,SUSE-SLE-Micro-5.5-2024-2325,SUSE-SLE-Module-Basesystem-15-SP5-2024-2325,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2325,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2325,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2325,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2325,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2325,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2325,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2325,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2325,openSUSE-SLE-15.5-2024-2325 SKIP SUSE-RU-2024:2331-1 as SUSE-2024-2331 is not security or has no CVEs. patches: SUSE-2024-2331 SKIP SUSE-RU-2024:2340-1 as openSUSE-SLE-15.6-2024-2340 is not security or has no CVEs. patches: SUSE-2024-2340,SUSE-SLE-Module-Basesystem-15-SP6-2024-2340,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2340,openSUSE-SLE-15.6-2024-2340 SKIP SUSE-RU-2024:2378-1 as SUSE-SLE-Micro-5.5-2024-2378 is not security or has no CVEs. patches: SUSE-2024-2378,SUSE-SLE-Micro-5.5-2024-2378 SKIP SUSE-RU-2024:2386-1 as SUSE-SLE-SDK-12-SP5-2024-2386 is not security or has no CVEs. patches: SUSE-2024-2386,SUSE-SLE-HA-12-SP5-2024-2386,SUSE-SLE-SDK-12-SP5-2024-2386 SKIP SUSE-RU-2024:2387-1 as SUSE-SLE-Product-HA-15-SP3-2024-2387 is not security or has no CVEs. patches: SUSE-2024-2387,SUSE-SLE-Product-HA-15-SP2-2024-2387,SUSE-SLE-Product-HA-15-SP3-2024-2387 SKIP SUSE-RU-2024:2388-1 as openSUSE-SLE-15.6-2024-2388 is not security or has no CVEs. patches: SUSE-2024-2388,SUSE-SLE-Product-HA-15-SP6-2024-2388,openSUSE-SLE-15.6-2024-2388 SKIP SUSE-RU-2024:2389-1 as SUSE-SLE-Product-HA-15-SP4-2024-2389 is not security or has no CVEs. patches: SUSE-2024-2389,SUSE-SLE-Product-HA-15-SP4-2024-2389 SKIP SUSE-RU-2024:2390-1 as openSUSE-SLE-15.5-2024-2390 is not security or has no CVEs. patches: SUSE-2024-2390,SUSE-SLE-Product-HA-15-SP5-2024-2390,openSUSE-SLE-15.5-2024-2390 SKIP SUSE-RU-2024:2392-1 as SUSE-2024-2392 is not security or has no CVEs. patches: SUSE-2024-2392 SKIP SUSE-RU-2024:2402-1 as openSUSE-SLE-15.6-2024-2402 is not security or has no CVEs. patches: SUSE-2024-2402,SUSE-SLE-Module-Basesystem-15-SP5-2024-2402,SUSE-SLE-Module-Basesystem-15-SP6-2024-2402,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2402,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2402,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2402,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2402,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2402,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2402,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2402,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2402,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2402,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2402,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2402,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2402,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2402,SUSE-Storage-7.1-2024-2402,openSUSE-SLE-15.5-2024-2402,openSUSE-SLE-15.6-2024-2402 SKIP SUSE-RU-2024:2403-1 as openSUSE-SLE-15.6-2024-2403 is not security or has no CVEs. patches: SUSE-2024-2403,SUSE-SLE-Module-Basesystem-15-SP6-2024-2403,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2403,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2403,openSUSE-SLE-15.5-2024-2403,openSUSE-SLE-15.6-2024-2403 SKIP SUSE-RU-2024:2404-1 as openSUSE-SLE-15.6-2024-2404 is not security or has no CVEs. patches: SUSE-2024-2404,SUSE-SLE-Module-Basesystem-15-SP6-2024-2404,openSUSE-SLE-15.6-2024-2404 SKIP SUSE-RU-2024:2406-1 as openSUSE-SLE-15.6-2024-2406 is not security or has no CVEs. patches: SUSE-2024-2406,SUSE-SLE-Micro-5.3-2024-2406,SUSE-SLE-Micro-5.4-2024-2406,SUSE-SLE-Micro-5.5-2024-2406,SUSE-SLE-Module-Basesystem-15-SP5-2024-2406,SUSE-SLE-Module-Basesystem-15-SP6-2024-2406,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2406,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2406,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2406,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2406,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2406,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2406,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2406,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2406,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2406,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2406,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2406,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2406,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2406,SUSE-SUSE-MicroOS-5.1-2024-2406,SUSE-SUSE-MicroOS-5.2-2024-2406,SUSE-Storage-7.1-2024-2406,openSUSE-SLE-15.5-2024-2406,openSUSE-SLE-15.6-2024-2406 SKIP SUSE-RU-2024:2412-1 as SUSE-SLE-Module-Live-Patching-15-SP5-2024-2412 is not security or has no CVEs. patches: SUSE-2024-2412,SUSE-SLE-Module-Live-Patching-15-SP4-2024-2412,SUSE-SLE-Module-Live-Patching-15-SP5-2024-2412 SKIP SUSE-RU-2024:2416-1 as openSUSE-SLE-15.6-2024-2416 is not security or has no CVEs. patches: SUSE-2024-2416,SUSE-SLE-Micro-5.5-2024-2416,SUSE-SLE-Module-Basesystem-15-SP5-2024-2416,SUSE-SLE-Module-Basesystem-15-SP6-2024-2416,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2416,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2416,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2416,openSUSE-SLE-15.5-2024-2416,openSUSE-SLE-15.6-2024-2416 SKIP SUSE-RU-2024:2418-1 as openSUSE-SLE-15.6-2024-2418 is not security or has no CVEs. patches: SUSE-2024-2418,SUSE-SLE-Product-HA-15-SP6-2024-2418,openSUSE-SLE-15.6-2024-2418 SKIP SUSE-RU-2024:2419-1 as openSUSE-SLE-15.5-2024-2419 is not security or has no CVEs. patches: SUSE-2024-2419,SUSE-SLE-Product-HA-15-SP5-2024-2419,openSUSE-SLE-15.5-2024-2419 SKIP SUSE-RU-2024:2420-1 as SUSE-SLE-Product-HA-15-SP4-2024-2420 is not security or has no CVEs. patches: SUSE-2024-2420,SUSE-SLE-Product-HA-15-SP4-2024-2420 SKIP SUSE-RU-2024:2423-1 as SUSE-SLE-Micro-5.5-2024-2423 is not security or has no CVEs. patches: SUSE-2024-2423,SUSE-SLE-Micro-5.5-2024-2423 SKIP SUSE-RU-2024:2424-1 as SUSE-SLE-Micro-5.5-2024-2424 is not security or has no CVEs. patches: SUSE-2024-2424,SUSE-SLE-Micro-5.5-2024-2424 SKIP SUSE-RU-2024:2425-1 as SUSE-SLE-Micro-5.5-2024-2425 is not security or has no CVEs. patches: SUSE-2024-2425,SUSE-SLE-Micro-5.5-2024-2425 SKIP SUSE-RU-2024:2427-1 as SUSE-SLE-Micro-5.5-2024-2427 is not security or has no CVEs. patches: SUSE-2024-2427,SUSE-SLE-Micro-5.5-2024-2427 SKIP SUSE-RU-2024:2428-1 as SUSE-SLE-Micro-5.5-2024-2428 is not security or has no CVEs. patches: SUSE-2024-2428,SUSE-SLE-Micro-5.5-2024-2428 SKIP SUSE-RU-2024:2430-1 as SUSE-SLE-Micro-5.5-2024-2430 is not security or has no CVEs. patches: SUSE-2024-2430,SUSE-SLE-Micro-5.5-2024-2430 SKIP SUSE-RU-2024:2433-1 as SUSE-SLE-Micro-5.5-2024-2433 is not security or has no CVEs. patches: SUSE-2024-2433,SUSE-SLE-Micro-5.5-2024-2433 SKIP SUSE-RU-2024:2434-1 as SUSE-SLE-Micro-5.5-2024-2434 is not security or has no CVEs. patches: SUSE-2024-2434,SUSE-SLE-Micro-5.5-2024-2434 SKIP SUSE-RU-2024:2450-1 as SUSE-SLE-Micro-5.5-2024-2450 is not security or has no CVEs. patches: SUSE-2024-2450,SUSE-SLE-Micro-5.5-2024-2450 SKIP SUSE-RU-2024:2451-1 as SUSE-SLE-Micro-5.5-2024-2451 is not security or has no CVEs. patches: SUSE-2024-2451,SUSE-SLE-Micro-5.5-2024-2451 SKIP SUSE-RU-2024:2452-1 as SUSE-SLE-Micro-5.5-2024-2452 is not security or has no CVEs. patches: SUSE-2024-2452,SUSE-SLE-Micro-5.5-2024-2452 SKIP SUSE-RU-2024:2454-1 as SUSE-SLE-Micro-5.5-2024-2454 is not security or has no CVEs. patches: SUSE-2024-2454,SUSE-SLE-Micro-5.5-2024-2454 SKIP SUSE-RU-2024:2455-1 as SUSE-SLE-Micro-5.5-2024-2455 is not security or has no CVEs. patches: SUSE-2024-2455,SUSE-SLE-Micro-5.5-2024-2455 SKIP SUSE-RU-2024:2456-1 as SUSE-SLE-Micro-5.5-2024-2456 is not security or has no CVEs. patches: SUSE-2024-2456,SUSE-SLE-Micro-5.5-2024-2456 SKIP SUSE-RU-2024:2457-1 as SUSE-SLE-Micro-5.5-2024-2457 is not security or has no CVEs. patches: SUSE-2024-2457,SUSE-SLE-Micro-5.5-2024-2457 SKIP SUSE-RU-2024:2458-1 as SUSE-SLE-Micro-5.5-2024-2458 is not security or has no CVEs. patches: SUSE-2024-2458,SUSE-SLE-Micro-5.5-2024-2458 SKIP SUSE-RU-2024:2459-1 as SUSE-SLE-Micro-5.5-2024-2459 is not security or has no CVEs. patches: SUSE-2024-2459,SUSE-SLE-Micro-5.5-2024-2459 SKIP SUSE-RU-2024:2460-1 as SUSE-SLE-Micro-5.5-2024-2460 is not security or has no CVEs. patches: SUSE-2024-2460,SUSE-SLE-Micro-5.5-2024-2460 SKIP SUSE-RU-2024:2464-1 as SUSE-SLE-Micro-5.5-2024-2464 is not security or has no CVEs. patches: SUSE-2024-2464,SUSE-SLE-Micro-5.5-2024-2464 SKIP SUSE-RU-2024:2465-1 as SUSE-SLE-Micro-5.5-2024-2465 is not security or has no CVEs. patches: SUSE-2024-2465,SUSE-SLE-Micro-5.5-2024-2465 SKIP SUSE-RU-2024:2466-1 as SUSE-SLE-Micro-5.5-2024-2466 is not security or has no CVEs. patches: SUSE-2024-2466,SUSE-SLE-Micro-5.5-2024-2466 SKIP SUSE-RU-2024:2482-1 as SUSE-Storage-7.1-2024-2482 is not security or has no CVEs. patches: SUSE-2024-2482,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2482,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2482,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2482,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2482,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2482,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2482,SUSE-SUSE-MicroOS-5.1-2024-2482,SUSE-SUSE-MicroOS-5.2-2024-2482,SUSE-Storage-7.1-2024-2482 SKIP SUSE-RU-2024:2486-1 as openSUSE-SLE-15.5-2024-2486 is not security or has no CVEs. patches: SUSE-2024-2486,SUSE-SLE-Micro-5.3-2024-2486,SUSE-SLE-Micro-5.4-2024-2486,SUSE-SLE-Micro-5.5-2024-2486,SUSE-SLE-Module-Basesystem-15-SP5-2024-2486,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2486,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2486,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2486,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2486,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2486,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2486,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2486,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2486,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2486,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2486,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2486,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2486,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2486,SUSE-SUSE-MicroOS-5.1-2024-2486,SUSE-SUSE-MicroOS-5.2-2024-2486,SUSE-Storage-7.1-2024-2486,openSUSE-SLE-15.5-2024-2486 SKIP SUSE-RU-2024:2497-1 as openSUSE-SLE-15.6-2024-2497 is not security or has no CVEs. patches: SUSE-2024-2497,SUSE-SLE-Module-Live-Patching-15-SP2-2024-2497,SUSE-SLE-Module-Live-Patching-15-SP3-2024-2497,SUSE-SLE-Module-Live-Patching-15-SP4-2024-2497,SUSE-SLE-Module-Live-Patching-15-SP5-2024-2497,SUSE-SLE-Module-Live-Patching-15-SP6-2024-2497,openSUSE-SLE-15.5-2024-2497,openSUSE-SLE-15.6-2024-2497 SKIP SUSE-RU-2024:2498-1 as SUSE-SLE-Live-Patching-12-SP5-2024-2498 is not security or has no CVEs. patches: SUSE-2024-2498,SUSE-SLE-Live-Patching-12-2024-2498,SUSE-SLE-Live-Patching-12-SP5-2024-2498 SKIP SUSE-RU-2024:2499-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2499 is not security or has no CVEs. patches: SUSE-2024-2499,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-2499,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2499 SKIP SUSE-RU-2024:2500-1 as SUSE-SLE-Manager-Tools-12-2024-2500 is not security or has no CVEs. patches: SUSE-2024-2500,SUSE-SLE-Manager-Tools-12-2024-2500 SKIP SUSE-RU-2024:2501-1 as SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-2501 is not security or has no CVEs. patches: SUSE-2024-2501,SUSE-SLE-Manager-Tools-15-2024-2501,SUSE-SLE-Manager-Tools-For-Micro-5-2024-2501,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-2501 ERROR: notice SUSE-RU-2024:2502-1 has no valid patches out of: SUSE-2024-2502,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-2502,suse-ubu204ct-client-tools-202406-15263 ERROR: notice SUSE-RU-2024:2503-1 has no valid patches out of: SUSE-2024-2503,SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-2503,suse-ubu224ct-client-tools-202406-15264 SKIP SUSE-RU-2024:2506-1 as SUSE-EL-9-CLIENT-TOOLS-BETA-2024-2506 is not security or has no CVEs. patches: SUSE-2024-2506,SUSE-EL-9-CLIENT-TOOLS-2024-2506,SUSE-EL-9-CLIENT-TOOLS-BETA-2024-2506 SKIP SUSE-RU-2024:2507-1 as SUSE-SLE-Manager-Tools-12-2024-2507 is not security or has no CVEs. patches: SUSE-2024-2507,SUSE-SLE-Manager-Tools-12-2024-2507 SKIP SUSE-RU-2024:2508-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2508 is not security or has no CVEs. patches: SUSE-2024-2508,SUSE-SLE-Manager-Tools-15-2024-2508,SUSE-SLE-Manager-Tools-For-Micro-5-2024-2508,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-2508,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2508 ERROR: notice SUSE-RU-2024:2511-1 has no valid patches out of: SUSE-2024-2511,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-2511 ERROR: notice SUSE-RU-2024:2512-1 has no valid patches out of: SUSE-2024-2512,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-2512 SKIP SUSE-RU-2024:2515-1 as SUSE-EL-9-CLIENT-TOOLS-2024-2515 is not security or has no CVEs. patches: SUSE-2024-2515,SUSE-EL-9-CLIENT-TOOLS-2024-2515 SKIP SUSE-RU-2024:2516-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2516 is not security or has no CVEs. patches: SUSE-2024-2516,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2516,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2516,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2516 SKIP SUSE-RU-2024:2517-1 as SUSE-Storage-7.1-2024-2517 is not security or has no CVEs. patches: SUSE-2024-2517,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2517,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2517,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2517,SUSE-SUSE-MicroOS-5.1-2024-2517,SUSE-SUSE-MicroOS-5.2-2024-2517,SUSE-Storage-7.1-2024-2517 SKIP SUSE-RU-2024:2518-1 as openSUSE-Leap-Micro-5.4-2024-2518 is not security or has no CVEs. patches: SUSE-2024-2518,SUSE-SLE-Micro-5.3-2024-2518,SUSE-SLE-Micro-5.4-2024-2518,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2518,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2518,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2518,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2518,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2518,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2518,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2518,openSUSE-Leap-Micro-5.3-2024-2518,openSUSE-Leap-Micro-5.4-2024-2518 SKIP SUSE-RU-2024:2519-1 as openSUSE-SLE-15.6-2024-2519 is not security or has no CVEs. patches: SUSE-2024-2519,SUSE-SLE-Micro-5.5-2024-2519,SUSE-SLE-Module-Basesystem-15-SP5-2024-2519,SUSE-SLE-Module-Basesystem-15-SP6-2024-2519,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2519,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2519,SUSE-SLE-Module-Transactional-Server-15-SP5-2024-2519,SUSE-SLE-Module-Transactional-Server-15-SP6-2024-2519,openSUSE-Leap-Micro-5.5-2024-2519,openSUSE-SLE-15.5-2024-2519,openSUSE-SLE-15.6-2024-2519 SKIP SUSE-RU-2024:2519-2 as SUSE-SLE-Micro-5.5-2024-2519 is not security or has no CVEs. patches: SUSE-2024-2519,SUSE-SLE-Micro-5.5-2024-2519 SKIP SUSE-RU-2024:2520-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2520 is not security or has no CVEs. patches: SUSE-2024-2520,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2520,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2520 SKIP SUSE-RU-2024:2521-1 as SUSE-SLE-Manager-Tools-12-2024-2521 is not security or has no CVEs. patches: SUSE-2024-2521,SUSE-SLE-Manager-Tools-12-2024-2521 SKIP SUSE-RU-2024:2522-1 as openSUSE-SLE-15.6-2024-2522 is not security or has no CVEs. patches: SUSE-2024-2522,SUSE-SLE-Manager-Tools-15-2024-2522,SUSE-SLE-Manager-Tools-For-Micro-5-2024-2522,openSUSE-SLE-15.5-2024-2522,openSUSE-SLE-15.6-2024-2522 ERROR: notice SUSE-RU-2024:2525-1 has no valid patches out of: SUSE-2024-2525,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-2525 ERROR: notice SUSE-RU-2024:2526-1 has no valid patches out of: SUSE-2024-2526,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-2526 SKIP SUSE-RU-2024:2529-1 as SUSE-EL-9-CLIENT-TOOLS-2024-2529 is not security or has no CVEs. patches: SUSE-2024-2529,SUSE-EL-9-CLIENT-TOOLS-2024-2529 SKIP SUSE-RU-2024:2536-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2536 is not security or has no CVEs. patches: SUSE-2024-2536,SUSE-SLE-Module-Public-Cloud-12-2024-2536 SKIP SUSE-RU-2024:2536-2 as SUSE-SLE-Module-Public-Cloud-12-2024-2536 is not security or has no CVEs. patches: SUSE-2024-2536,SUSE-SLE-Module-Public-Cloud-12-2024-2536 SKIP SUSE-RU-2024:2537-1 as openSUSE-SLE-15.6-2024-2537 is not security or has no CVEs. patches: SUSE-2024-2537,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2537,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2537,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2537,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2537,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2537,openSUSE-SLE-15.5-2024-2537,openSUSE-SLE-15.6-2024-2537 SKIP SUSE-RU-2024:2538-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2538 is not security or has no CVEs. patches: SUSE-2024-2538,SUSE-SLE-Module-Public-Cloud-12-2024-2538 SKIP SUSE-RU-2024:2562-1 as SUSE-SLE-Micro-5.5-2024-2562 is not security or has no CVEs. patches: SUSE-2024-2562,SUSE-SLE-Micro-5.5-2024-2562 SKIP SUSE-RU-2024:2563-1 as SUSE-SLE-SERVER-12-SP5-2024-2563 is not security or has no CVEs. patches: SUSE-2024-2563,SUSE-SLE-SERVER-12-SP5-2024-2563 SKIP SUSE-RU-2024:2565-1 as SUSE-2024-2565 is not security or has no CVEs. patches: SUSE-2024-2565 SKIP SUSE-RU-2024:2566-1 as SUSE-2024-2566 is not security or has no CVEs. patches: SUSE-2024-2566 SKIP SUSE-RU-2024:2569-1 as SUSE-SLE-SERVER-12-SP5-2024-2569 is not security or has no CVEs. patches: SUSE-2024-2569,SUSE-SLE-SERVER-12-SP5-2024-2569 SKIP SUSE-RU-2024:2573-1 as openSUSE-SLE-15.6-2024-2573 is not security or has no CVEs. patches: SUSE-2024-2573,SUSE-SLE-Module-Basesystem-15-SP6-2024-2573,openSUSE-SLE-15.6-2024-2573 SKIP SUSE-RU-2024:2580-1 as openSUSE-SLE-15.6-2024-2580 is not security or has no CVEs. patches: SUSE-2024-2580,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2580,openSUSE-SLE-15.6-2024-2580 SKIP SUSE-RU-2024:2581-1 as openSUSE-SLE-15.6-2024-2581 is not security or has no CVEs. patches: SUSE-2024-2581,SUSE-SLE-Module-Basesystem-15-SP6-2024-2581,openSUSE-SLE-15.6-2024-2581 SKIP SUSE-RU-2024:2581-2 as openSUSE-SLE-15.6-2024-2581 is not security or has no CVEs. patches: SUSE-2024-2581,openSUSE-SLE-15.6-2024-2581 SKIP SUSE-RU-2024:2582-1 as openSUSE-SLE-15.6-2024-2582 is not security or has no CVEs. patches: SUSE-2024-2582,SUSE-SLE-Product-HA-15-SP6-2024-2582,openSUSE-SLE-15.6-2024-2582 SKIP SUSE-RU-2024:2586-1 as openSUSE-SLE-15.6-2024-2586 is not security or has no CVEs. patches: SUSE-2024-2586,SUSE-SLE-Module-Basesystem-15-SP6-2024-2586,openSUSE-SLE-15.6-2024-2586 SKIP SUSE-RU-2024:2587-1 as openSUSE-SLE-15.6-2024-2587 is not security or has no CVEs. patches: SUSE-2024-2587,SUSE-SLE-Module-Basesystem-15-SP6-2024-2587,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2587,openSUSE-SLE-15.6-2024-2587 SKIP SUSE-RU-2024:2588-1 as SUSE-SLE-Module-Server-Applications-15-SP6-2024-2588 is not security or has no CVEs. patches: SUSE-2024-2588,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2588 SKIP SUSE-RU-2024:2601-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2601 is not security or has no CVEs. patches: SUSE-2024-2601,SUSE-SLE-Module-Public-Cloud-12-2024-2601 SKIP SUSE-RU-2024:2602-1 as openSUSE-SLE-15.6-2024-2602 is not security or has no CVEs. patches: SUSE-2024-2602,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2602,openSUSE-SLE-15.6-2024-2602 SKIP SUSE-RU-2024:2604-1 as openSUSE-SLE-15.6-2024-2604 is not security or has no CVEs. patches: SUSE-2024-2604,SUSE-SLE-Product-HA-15-SP2-2024-2604,SUSE-SLE-Product-HA-15-SP3-2024-2604,SUSE-SLE-Product-HA-15-SP4-2024-2604,SUSE-SLE-Product-HA-15-SP5-2024-2604,SUSE-SLE-Product-HA-15-SP6-2024-2604,openSUSE-SLE-15.5-2024-2604,openSUSE-SLE-15.6-2024-2604 SKIP SUSE-RU-2024:2606-1 as openSUSE-SLE-15.6-2024-2606 is not security or has no CVEs. patches: SUSE-2024-2606,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2606,openSUSE-SLE-15.6-2024-2606 SKIP SUSE-RU-2024:2608-1 as SUSE-2024-2608 is not security or has no CVEs. patches: SUSE-2024-2608 SKIP SUSE-RU-2024:2609-1 as openSUSE-SLE-15.6-2024-2609 is not security or has no CVEs. patches: SUSE-2024-2609,SUSE-SLE-Micro-5.3-2024-2609,SUSE-SLE-Micro-5.4-2024-2609,SUSE-SLE-Micro-5.5-2024-2609,SUSE-SLE-Module-Basesystem-15-SP5-2024-2609,SUSE-SLE-Module-Basesystem-15-SP6-2024-2609,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2609,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2609,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2609,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2609,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2609,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2609,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2609,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2609,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2609,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2609,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2609,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2609,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2609,SUSE-SUSE-MicroOS-5.1-2024-2609,SUSE-SUSE-MicroOS-5.2-2024-2609,SUSE-Storage-7.1-2024-2609,openSUSE-Leap-Micro-5.5-2024-2609,openSUSE-SLE-15.5-2024-2609,openSUSE-SLE-15.6-2024-2609 SKIP SUSE-RU-2024:2613-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2613 is not security or has no CVEs. patches: SUSE-2024-2613,SUSE-SLE-Micro-5.3-2024-2613,SUSE-SLE-Micro-5.4-2024-2613,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2613 SKIP SUSE-RU-2024:2620-1 as openSUSE-SLE-15.6-2024-2620 is not security or has no CVEs. patches: SUSE-2024-2620,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2620,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2620,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2620,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2620,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2620,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2620,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2620,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2620,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2620,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2620,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2620,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2620,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2620,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2620,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2620,SUSE-Storage-7.1-2024-2620,openSUSE-SLE-15.5-2024-2620,openSUSE-SLE-15.6-2024-2620 SKIP SUSE-RU-2024:2622-1 as SUSE-SLE-Module-Live-Patching-15-SP4-2024-2622 is not security or has no CVEs. patches: SUSE-2024-2622,SUSE-SLE-Module-Live-Patching-15-SP4-2024-2622 SKIP SUSE-RU-2024:2623-1 as openSUSE-SLE-15.5-2024-2623 is not security or has no CVEs. patches: SUSE-2024-2623,SUSE-SLE-Micro-5.5-2024-2623,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2623,openSUSE-Leap-Micro-5.5-2024-2623,openSUSE-SLE-15.5-2024-2623 SKIP SUSE-RU-2024:2637-1 as openSUSE-SLE-15.6-2024-2637 is not security or has no CVEs. patches: SUSE-2024-2637,SUSE-SLE-Module-Basesystem-15-SP6-2024-2637,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2637,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2637,openSUSE-SLE-15.6-2024-2637 SKIP SUSE-RU-2024:2640-1 as openSUSE-SLE-15.5-2024-2640 is not security or has no CVEs. patches: SUSE-2024-2640,SUSE-SLE-Module-Basesystem-15-SP5-2024-2640,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2640,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2640,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2640,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2640,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2640,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2640,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2640,openSUSE-SLE-15.5-2024-2640 SKIP SUSE-RU-2024:2641-1 as openSUSE-SLE-15.6-2024-2641 is not security or has no CVEs. patches: SUSE-2024-2641,SUSE-SLE-Module-Basesystem-15-SP6-2024-2641,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2641,openSUSE-SLE-15.6-2024-2641 SKIP SUSE-RU-2024:2642-1 as openSUSE-SLE-15.6-2024-2642 is not security or has no CVEs. patches: SUSE-2024-2642,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2642,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2642,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2642,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2642,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2642,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2642,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2642,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2642,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2642,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2642,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2642,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2642,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2642,SUSE-Storage-7.1-2024-2642,openSUSE-SLE-15.5-2024-2642,openSUSE-SLE-15.6-2024-2642 SKIP SUSE-RU-2024:2644-1 as openSUSE-SLE-15.6-2024-2644 is not security or has no CVEs. patches: SUSE-2024-2644,SUSE-SLE-Module-Python3-15-SP5-2024-2644,SUSE-SLE-Module-Python3-15-SP6-2024-2644,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2644,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2644,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2644,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2644,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2644,openSUSE-SLE-15.5-2024-2644,openSUSE-SLE-15.6-2024-2644 SKIP SUSE-RU-2024:2645-1 as openSUSE-SLE-15.6-2024-2645 is not security or has no CVEs. patches: SUSE-2024-2645,SUSE-SLE-Module-Basesystem-15-SP6-2024-2645,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2645,openSUSE-SLE-15.6-2024-2645 SKIP SUSE-RU-2024:2646-1 as openSUSE-SLE-15.5-2024-2646 is not security or has no CVEs. patches: SUSE-2024-2646,SUSE-SLE-Module-Basesystem-15-SP5-2024-2646,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2646,openSUSE-SLE-15.5-2024-2646 SKIP SUSE-RU-2024:2647-1 as openSUSE-SLE-15.6-2024-2647 is not security or has no CVEs. patches: SUSE-2024-2647,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2647,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2647,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2647,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2647,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2647,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2647,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2647,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2647,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2647,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2647,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2647,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2647,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2647,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2647,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2647,SUSE-Storage-7.1-2024-2647,openSUSE-SLE-15.5-2024-2647,openSUSE-SLE-15.6-2024-2647 SKIP SUSE-RU-2024:2649-1 as openSUSE-SLE-15.6-2024-2649 is not security or has no CVEs. patches: SUSE-2024-2649,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2649,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2649,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2649,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2649,openSUSE-SLE-15.5-2024-2649,openSUSE-SLE-15.6-2024-2649 SKIP SUSE-RU-2024:2650-1 as SUSE-Storage-7.1-2024-2650 is not security or has no CVEs. patches: SUSE-2024-2650,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2650,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2650,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2650,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2650,SUSE-Storage-7.1-2024-2650 SKIP SUSE-RU-2024:2651-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2651 is not security or has no CVEs. patches: SUSE-2024-2651,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2651,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2651,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2651,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2651,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2651,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2651,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2651 SKIP SUSE-RU-2024:2652-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2652 is not security or has no CVEs. patches: SUSE-2024-2652,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2652,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2652,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2652,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2652 SKIP SUSE-RU-2024:2653-1 as openSUSE-SLE-15.6-2024-2653 is not security or has no CVEs. patches: SUSE-2024-2653,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2653,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2653,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2653,openSUSE-SLE-15.5-2024-2653,openSUSE-SLE-15.6-2024-2653 SKIP SUSE-RU-2024:2664-1 as openSUSE-SLE-15.5-2024-2664 is not security or has no CVEs. patches: SUSE-2024-2664,SUSE-SLE-Micro-5.3-2024-2664,SUSE-SLE-Micro-5.4-2024-2664,SUSE-SLE-Micro-5.5-2024-2664,SUSE-SLE-Module-Basesystem-15-SP5-2024-2664,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2664,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2664,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2664,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2664,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2664,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2664,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2664,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2664,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2664,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2664,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2664,SUSE-SUSE-MicroOS-5.1-2024-2664,SUSE-SUSE-MicroOS-5.2-2024-2664,SUSE-Storage-7.1-2024-2664,openSUSE-Leap-Micro-5.5-2024-2664,openSUSE-SLE-15.5-2024-2664 SKIP SUSE-RU-2024:2665-1 as SUSE-SLE-SERVER-12-SP5-2024-2665 is not security or has no CVEs. patches: SUSE-2024-2665,SUSE-SLE-SERVER-12-SP5-2024-2665 SKIP SUSE-RU-2024:2666-1 as openSUSE-SLE-15.5-2024-2666 is not security or has no CVEs. patches: SUSE-2024-2666,SUSE-SLE-Micro-5.3-2024-2666,SUSE-SLE-Micro-5.4-2024-2666,SUSE-SLE-Micro-5.5-2024-2666,SUSE-SLE-Module-Basesystem-15-SP5-2024-2666,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2666,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2666,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2666,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2666,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2666,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2666,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2666,openSUSE-Leap-Micro-5.5-2024-2666,openSUSE-SLE-15.5-2024-2666 SKIP SUSE-RU-2024:2667-1 as openSUSE-SLE-15.6-2024-2667 is not security or has no CVEs. patches: SUSE-2024-2667,SUSE-SLE-Micro-5.3-2024-2667,SUSE-SLE-Micro-5.4-2024-2667,SUSE-SLE-Micro-5.5-2024-2667,SUSE-SLE-Module-Basesystem-15-SP5-2024-2667,SUSE-SLE-Module-Basesystem-15-SP6-2024-2667,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2667,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2667,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2667,SUSE-SUSE-MicroOS-5.2-2024-2667,openSUSE-Leap-Micro-5.5-2024-2667,openSUSE-SLE-15.5-2024-2667,openSUSE-SLE-15.6-2024-2667 SKIP SUSE-RU-2024:2670-1 as openSUSE-SLE-15.5-2024-2670 is not security or has no CVEs. patches: SUSE-2024-2670,SUSE-SLE-Micro-5.5-2024-2670,SUSE-SLE-Module-Basesystem-15-SP5-2024-2670,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2670,openSUSE-Leap-Micro-5.5-2024-2670,openSUSE-SLE-15.5-2024-2670 SKIP SUSE-RU-2024:2671-1 as openSUSE-SLE-15.6-2024-2671 is not security or has no CVEs. patches: SUSE-2024-2671,SUSE-SLE-Micro-5.3-2024-2671,SUSE-SLE-Micro-5.4-2024-2671,SUSE-SLE-Micro-5.5-2024-2671,SUSE-SLE-Module-Basesystem-15-SP5-2024-2671,SUSE-SLE-Module-Basesystem-15-SP6-2024-2671,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2671,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2671,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2671,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2671,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2671,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2671,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2671,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2671,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2671,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2671,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2671,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2671,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2671,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2671,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2671,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2671,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2671,SUSE-SUSE-MicroOS-5.2-2024-2671,SUSE-Storage-7.1-2024-2671,openSUSE-Leap-Micro-5.5-2024-2671,openSUSE-SLE-15.5-2024-2671,openSUSE-SLE-15.6-2024-2671 SKIP SUSE-RU-2024:2673-1 as SUSE-SLE-SERVER-12-SP5-2024-2673 is not security or has no CVEs. patches: SUSE-2024-2673,SUSE-SLE-SERVER-12-SP5-2024-2673 SKIP SUSE-RU-2024:2674-1 as SUSE-Storage-7.1-2024-2674 is not security or has no CVEs. patches: SUSE-2024-2674,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2674,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2674,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2674,SUSE-SUSE-MicroOS-5.1-2024-2674,SUSE-SUSE-MicroOS-5.2-2024-2674,SUSE-Storage-7.1-2024-2674 SKIP SUSE-RU-2024:2675-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2675 is not security or has no CVEs. patches: SUSE-2024-2675,SUSE-SLE-Micro-5.3-2024-2675,SUSE-SLE-Micro-5.4-2024-2675,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2675,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2675,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2675,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2675,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2675,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2675,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2675 SKIP SUSE-RU-2024:2677-1 as openSUSE-SLE-15.6-2024-2677 is not security or has no CVEs. patches: SUSE-2024-2677,SUSE-SLE-Module-Basesystem-15-SP6-2024-2677,openSUSE-SLE-15.6-2024-2677 SKIP SUSE-RU-2024:2678-1 as openSUSE-SLE-15.5-2024-2678 is not security or has no CVEs. patches: SUSE-2024-2678,SUSE-SLE-Micro-5.5-2024-2678,SUSE-SLE-Module-Basesystem-15-SP5-2024-2678,openSUSE-Leap-Micro-5.5-2024-2678,openSUSE-SLE-15.5-2024-2678 SKIP SUSE-RU-2024:2679-1 as openSUSE-SLE-15.5-2024-2679 is not security or has no CVEs. patches: SUSE-2024-2679,SUSE-SLE-Module-Basesystem-15-SP5-2024-2679,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-2679,SUSE-SLE-Module-Transactional-Server-15-SP5-2024-2679,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2679,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2679,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2679,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2679,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2679,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2679,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2679,openSUSE-SLE-15.5-2024-2679 SKIP SUSE-RU-2024:2680-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2680 is not security or has no CVEs. patches: SUSE-2024-2680,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2680,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2680,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2680 SKIP SUSE-RU-2024:2682-1 as SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2682 is not security or has no CVEs. patches: SUSE-2024-2682,SUSE-SLE-Micro-5.3-2024-2682,SUSE-SLE-Micro-5.4-2024-2682,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2682,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2682,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2682,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2682 SKIP SUSE-RU-2024:2683-1 as openSUSE-SLE-15.6-2024-2683 is not security or has no CVEs. patches: SUSE-2024-2683,SUSE-SLE-Module-HPC-15-SP5-2024-2683,SUSE-SLE-Module-HPC-15-SP6-2024-2683,openSUSE-SLE-15.5-2024-2683,openSUSE-SLE-15.6-2024-2683 SKIP SUSE-RU-2024:2686-1 as SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2686 is not security or has no CVEs. patches: SUSE-2024-2686,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-2686,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2686,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2686,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2686,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2686 SKIP SUSE-RU-2024:2687-1 as SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2687 is not security or has no CVEs. patches: SUSE-2024-2687,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2687,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2687,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2687,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2687 SKIP SUSE-RU-2024:2689-1 as SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-2689 is not security or has no CVEs. patches: SUSE-2024-2689,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-2689 SKIP SUSE-RU-2024:2690-1 as openSUSE-SLE-15.6-2024-2690 is not security or has no CVEs. patches: SUSE-2024-2690,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2690,SUSE-SLE-Module-Python3-15-SP5-2024-2690,SUSE-SLE-Module-Python3-15-SP6-2024-2690,SUSE-SLE-Product-HA-15-SP4-2024-2690,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2690,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2690,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2690,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2690,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2690,openSUSE-SLE-15.5-2024-2690,openSUSE-SLE-15.6-2024-2690 SKIP SUSE-RU-2024:2691-1 as openSUSE-SLE-15.6-2024-2691 is not security or has no CVEs. patches: SUSE-2024-2691,SUSE-SLE-Product-HA-15-SP6-2024-2691,openSUSE-SLE-15.6-2024-2691 SKIP SUSE-RU-2024:2692-1 as openSUSE-SLE-15.5-2024-2692 is not security or has no CVEs. patches: SUSE-2024-2692,SUSE-SLE-Product-HA-15-SP5-2024-2692,openSUSE-SLE-15.5-2024-2692 SKIP SUSE-RU-2024:2693-1 as SUSE-SLE-HA-12-SP5-2024-2693 is not security or has no CVEs. patches: SUSE-2024-2693,SUSE-SLE-HA-12-SP5-2024-2693 SKIP SUSE-RU-2024:2695-1 as openSUSE-SLE-15.6-2024-2695 is not security or has no CVEs. patches: SUSE-2024-2695,SUSE-SLE-Module-Basesystem-15-SP6-2024-2695,SUSE-SLE-Product-HA-15-SP6-2024-2695,openSUSE-SLE-15.6-2024-2695 SKIP SUSE-RU-2024:2696-1 as openSUSE-SLE-15.5-2024-2696 is not security or has no CVEs. patches: SUSE-2024-2696,SUSE-SLE-Micro-5.5-2024-2696,SUSE-SLE-Module-Basesystem-15-SP5-2024-2696,openSUSE-Leap-Micro-5.5-2024-2696,openSUSE-SLE-15.5-2024-2696 SKIP SUSE-RU-2024:2697-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2697 is not security or has no CVEs. patches: SUSE-2024-2697,SUSE-SLE-Micro-5.3-2024-2697,SUSE-SLE-Micro-5.4-2024-2697,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2697,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2697,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2697,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2697,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2697,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2697,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2697 SKIP SUSE-RU-2024:2698-1 as SUSE-SLE-Product-HA-15-SP2-2024-2698 is not security or has no CVEs. patches: SUSE-2024-2698,SUSE-SLE-Product-HA-15-SP2-2024-2698 SKIP SUSE-RU-2024:2699-1 as SUSE-SLE-Product-HA-15-SP4-2024-2699 is not security or has no CVEs. patches: SUSE-2024-2699,SUSE-SLE-Product-HA-15-SP4-2024-2699 SKIP SUSE-RU-2024:2700-1 as openSUSE-SLE-15.6-2024-2700 is not security or has no CVEs. patches: SUSE-2024-2700,SUSE-SLE-Product-HA-15-SP6-2024-2700,openSUSE-SLE-15.6-2024-2700 SKIP SUSE-RU-2024:2701-1 as SUSE-SLE-Product-HA-15-SP3-2024-2701 is not security or has no CVEs. patches: SUSE-2024-2701,SUSE-SLE-Product-HA-15-SP3-2024-2701 SKIP SUSE-RU-2024:2702-1 as SUSE-SLE-SDK-12-SP5-2024-2702 is not security or has no CVEs. patches: SUSE-2024-2702,SUSE-SLE-HA-12-SP5-2024-2702,SUSE-SLE-SDK-12-SP5-2024-2702 SKIP SUSE-RU-2024:2703-1 as openSUSE-SLE-15.5-2024-2703 is not security or has no CVEs. patches: SUSE-2024-2703,SUSE-SLE-Product-HA-15-SP5-2024-2703,openSUSE-SLE-15.5-2024-2703 SKIP SUSE-RU-2024:2705-1 as SUSE-SLE-Module-Certifications-15-SP5-2024-2705 is not security or has no CVEs. patches: SUSE-2024-2705,SUSE-SLE-Module-Certifications-15-SP5-2024-2705 SKIP SUSE-RU-2024:2706-1 as SUSE-SLE-Module-Certifications-15-SP5-2024-2706 is not security or has no CVEs. patches: SUSE-2024-2706,SUSE-SLE-Module-Certifications-15-SP5-2024-2706 SKIP SUSE-RU-2024:2707-1 as SUSE-SLE-Module-Certifications-15-SP5-2024-2707 is not security or has no CVEs. patches: SUSE-2024-2707,SUSE-SLE-Module-Certifications-15-SP5-2024-2707 SKIP SUSE-RU-2024:2708-1 as SUSE-SLE-Module-Certifications-15-SP5-2024-2708 is not security or has no CVEs. patches: SUSE-2024-2708,SUSE-SLE-Module-Certifications-15-SP5-2024-2708 SKIP SUSE-RU-2024:2711-1 as SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2711 is not security or has no CVEs. patches: SUSE-2024-2711,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2711,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2711,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2711,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2711,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2711 SKIP SUSE-RU-2024:2712-1 as openSUSE-SLE-15.6-2024-2712 is not security or has no CVEs. patches: SUSE-2024-2712,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2712,openSUSE-SLE-15.6-2024-2712 SKIP SUSE-RU-2024:2713-1 as openSUSE-SLE-15.5-2024-2713 is not security or has no CVEs. patches: SUSE-2024-2713,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2713,openSUSE-SLE-15.5-2024-2713 SKIP SUSE-RU-2024:2714-1 as SUSE-SLE-SDK-12-SP5-2024-2714 is not security or has no CVEs. patches: SUSE-2024-2714,SUSE-SLE-HA-12-SP5-2024-2714,SUSE-SLE-SDK-12-SP5-2024-2714 SKIP SUSE-RU-2024:2715-1 as SUSE-SLE-Product-HA-15-SP2-2024-2715 is not security or has no CVEs. patches: SUSE-2024-2715,SUSE-SLE-Product-HA-15-SP2-2024-2715 SKIP SUSE-RU-2024:2716-1 as openSUSE-SLE-15.5-2024-2716 is not security or has no CVEs. patches: SUSE-2024-2716,SUSE-SLE-Module-Basesystem-15-SP5-2024-2716,SUSE-SLE-Product-HA-15-SP5-2024-2716,openSUSE-SLE-15.5-2024-2716 SKIP SUSE-RU-2024:2717-1 as SUSE-SLE-Product-HA-15-SP3-2024-2717 is not security or has no CVEs. patches: SUSE-2024-2717,SUSE-SLE-Product-HA-15-SP3-2024-2717 SKIP SUSE-RU-2024:2718-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2718 is not security or has no CVEs. patches: SUSE-2024-2718,SUSE-SLE-Product-HA-15-SP4-2024-2718,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2718,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2718,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2718,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2718,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2718,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2718,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2718 SKIP SUSE-RU-2024:2728-1 as SUSE-SLE-Product-HA-15-SP3-2024-2728 is not security or has no CVEs. patches: SUSE-2024-2728,SUSE-SLE-Product-HA-15-SP3-2024-2728 SKIP SUSE-RU-2024:2729-1 as openSUSE-SLE-15.5-2024-2729 is not security or has no CVEs. patches: SUSE-2024-2729,SUSE-SLE-Product-HA-15-SP5-2024-2729,openSUSE-SLE-15.5-2024-2729 SKIP SUSE-RU-2024:2730-1 as SUSE-SLE-Product-HA-15-SP4-2024-2730 is not security or has no CVEs. patches: SUSE-2024-2730,SUSE-SLE-Product-HA-15-SP4-2024-2730 SKIP SUSE-RU-2024:2731-1 as openSUSE-SLE-15.6-2024-2731 is not security or has no CVEs. patches: SUSE-2024-2731,SUSE-SLE-Product-HA-15-SP6-2024-2731,openSUSE-SLE-15.6-2024-2731 SKIP SUSE-RU-2024:2735-1 as SUSE-SUSE-MicroOS-5.2-2024-2735 is not security or has no CVEs. patches: SUSE-2024-2735,SUSE-SUSE-MicroOS-5.2-2024-2735 SKIP SUSE-RU-2024:2736-1 as SUSE-SUSE-MicroOS-5.2-2024-2736 is not security or has no CVEs. patches: SUSE-2024-2736,SUSE-SUSE-MicroOS-5.1-2024-2736,SUSE-SUSE-MicroOS-5.2-2024-2736 SKIP SUSE-RU-2024:2736-2 as SUSE-Storage-7.1-2024-2736 is not security or has no CVEs. patches: SUSE-2024-2736,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2736,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2736,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2736,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2736,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2736,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2736,SUSE-Storage-7.1-2024-2736 SKIP SUSE-RU-2024:2742-1 as openSUSE-Leap-Micro-5.5-2024-2742 is not security or has no CVEs. patches: SUSE-2024-2742,SUSE-SLE-Micro-5.5-2024-2742,SUSE-SLE-Module-Basesystem-15-SP5-2024-2742,openSUSE-Leap-Micro-5.5-2024-2742 SKIP SUSE-RU-2024:2743-1 as SUSE-SLE-SERVER-12-SP5-2024-2743 is not security or has no CVEs. patches: SUSE-2024-2743,SUSE-SLE-SERVER-12-SP5-2024-2743 SKIP SUSE-RU-2024:2744-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2744 is not security or has no CVEs. patches: SUSE-2024-2744,SUSE-SLE-Micro-5.3-2024-2744,SUSE-SLE-Micro-5.4-2024-2744,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2744,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2744,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2744,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2744,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2744,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2744,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2744 SKIP SUSE-RU-2024:2745-1 as SUSE-Storage-7.1-2024-2745 is not security or has no CVEs. patches: SUSE-2024-2745,SUSE-SLE-INSTALLER-15-SP2-2024-2745,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2745,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2745,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2745,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2745,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2745,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2745,SUSE-Storage-7.1-2024-2745 SKIP SUSE-RU-2024:2746-1 as SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-2746 is not security or has no CVEs. patches: SUSE-2024-2746,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2746,SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-2746 SKIP SUSE-RU-2024:2747-1 as SUSE-SLE-Module-Basesystem-15-SP6-2024-2747 is not security or has no CVEs. patches: SUSE-2024-2747,SUSE-SLE-Module-Basesystem-15-SP6-2024-2747 SKIP SUSE-RU-2024:2748-1 as SUSE-SLE-Module-SAP-Business-One-15-SP6-2024-2748 is not security or has no CVEs. patches: SUSE-2024-2748,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2748,SUSE-SLE-Module-SAP-Business-One-15-SP6-2024-2748 SKIP SUSE-RU-2024:2749-1 as SUSE-SUSE-MicroOS-5.1-2024-2749 is not security or has no CVEs. patches: SUSE-2024-2749,SUSE-SUSE-MicroOS-5.1-2024-2749 SKIP SUSE-RU-2024:2753-1 as SUSE-SLE-SERVER-12-SP5-2024-2753 is not security or has no CVEs. patches: SUSE-2024-2753,SUSE-SLE-SDK-12-SP5-2024-2753,SUSE-SLE-SERVER-12-SP5-2024-2753 SKIP SUSE-RU-2024:2762-1 as SUSE-SLE-SERVER-12-SP5-2024-2762 is not security or has no CVEs. patches: SUSE-2024-2762,SUSE-SLE-SERVER-12-SP5-2024-2762 SKIP SUSE-RU-2024:2763-1 as openSUSE-SLE-15.5-2024-2763 is not security or has no CVEs. patches: SUSE-2024-2763,SUSE-SLE-Micro-5.5-2024-2763,SUSE-SLE-Module-Basesystem-15-SP5-2024-2763,openSUSE-SLE-15.5-2024-2763 SKIP SUSE-RU-2024:2764-1 as openSUSE-SLE-15.6-2024-2764 is not security or has no CVEs. patches: SUSE-2024-2764,SUSE-SLE-Module-Basesystem-15-SP6-2024-2764,openSUSE-SLE-15.6-2024-2764 SKIP SUSE-RU-2024:2765-1 as openSUSE-Leap-Micro-5.5-2024-2765 is not security or has no CVEs. patches: SUSE-2024-2765,SUSE-SLE-Micro-5.5-2024-2765,openSUSE-Leap-Micro-5.5-2024-2765 SKIP SUSE-RU-2024:2777-1 as openSUSE-SLE-15.6-2024-2777 is not security or has no CVEs. patches: SUSE-2024-2777,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2777,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2777,openSUSE-SLE-15.5-2024-2777,openSUSE-SLE-15.6-2024-2777 SKIP SUSE-RU-2024:2778-1 as openSUSE-SLE-15.6-2024-2778 is not security or has no CVEs. patches: SUSE-2024-2778,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2778,openSUSE-SLE-15.6-2024-2778 SKIP SUSE-RU-2024:2779-1 as openSUSE-SLE-15.6-2024-2779 is not security or has no CVEs. patches: SUSE-2024-2779,SUSE-SLE-Module-Basesystem-15-SP6-2024-2779,openSUSE-SLE-15.6-2024-2779 SKIP SUSE-RU-2024:2781-1 as openSUSE-SLE-15.6-2024-2781 is not security or has no CVEs. patches: SUSE-2024-2781,SUSE-SLE-Module-Basesystem-15-SP6-2024-2781,openSUSE-SLE-15.6-2024-2781 SKIP SUSE-RU-2024:2782-1 as SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2782 is not security or has no CVEs. patches: SUSE-2024-2782,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2782 SKIP SUSE-RU-2024:2783-1 as openSUSE-SLE-15.5-2024-2783 is not security or has no CVEs. patches: SUSE-2024-2783,SUSE-SLE-Module-Legacy-15-SP5-2024-2783,openSUSE-SLE-15.5-2024-2783 SKIP SUSE-RU-2024:2787-1 as openSUSE-SLE-15.6-2024-2787 is not security or has no CVEs. patches: SUSE-2024-2787,SUSE-SLE-Module-Basesystem-15-SP6-2024-2787,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2787,SUSE-SLE-Module-HPC-15-SP5-2024-2787,SUSE-SLE-Module-HPC-15-SP6-2024-2787,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2787,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2787,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2787,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2787,openSUSE-SLE-15.5-2024-2787,openSUSE-SLE-15.6-2024-2787 SKIP SUSE-RU-2024:2788-1 as openSUSE-SLE-15.6-2024-2788 is not security or has no CVEs. patches: SUSE-2024-2788,SUSE-SLE-Module-Basesystem-15-SP6-2024-2788,openSUSE-SLE-15.6-2024-2788 SKIP SUSE-RU-2024:2791-1 as openSUSE-SLE-15.6-2024-2791 is not security or has no CVEs. patches: SUSE-2024-2791,SUSE-SLE-Micro-5.3-2024-2791,SUSE-SLE-Micro-5.4-2024-2791,SUSE-SLE-Micro-5.5-2024-2791,SUSE-SLE-Module-Basesystem-15-SP5-2024-2791,SUSE-SLE-Module-Basesystem-15-SP6-2024-2791,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2791,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2791,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2791,SUSE-SLE-Product-WE-15-SP5-2024-2791,SUSE-SLE-Product-WE-15-SP6-2024-2791,SUSE-SUSE-MicroOS-5.1-2024-2791,SUSE-SUSE-MicroOS-5.2-2024-2791,openSUSE-Leap-Micro-5.5-2024-2791,openSUSE-SLE-15.5-2024-2791,openSUSE-SLE-15.6-2024-2791 SKIP SUSE-RU-2024:2799-1 as openSUSE-SLE-15.6-2024-2799 is not security or has no CVEs. patches: SUSE-2024-2799,SUSE-SLE-Micro-5.3-2024-2799,SUSE-SLE-Micro-5.4-2024-2799,SUSE-SLE-Micro-5.5-2024-2799,SUSE-SLE-Module-Containers-15-SP5-2024-2799,SUSE-SLE-Module-Containers-15-SP6-2024-2799,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2799,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2799,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2799,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2799,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2799,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2799,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2799,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2799,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2799,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2799,SUSE-SUSE-MicroOS-5.1-2024-2799,SUSE-SUSE-MicroOS-5.2-2024-2799,SUSE-Storage-7.1-2024-2799,openSUSE-Leap-Micro-5.5-2024-2799,openSUSE-SLE-15.5-2024-2799,openSUSE-SLE-15.6-2024-2799 SKIP SUSE-RU-2024:2800-1 as SUSE-SLE-Module-Containers-12-2024-2800 is not security or has no CVEs. patches: SUSE-2024-2800,SUSE-SLE-Module-Containers-12-2024-2800 SKIP SUSE-RU-2024:2812-1 as openSUSE-SLE-15.6-2024-2812 is not security or has no CVEs. patches: SUSE-2024-2812,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2812,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2812,openSUSE-SLE-15.6-2024-2812 SKIP SUSE-RU-2024:2812-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2812 is not security or has no CVEs. patches: SUSE-2024-2812,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2812 SKIP SUSE-RU-2024:2854-1 as openSUSE-SLE-15.6-2024-2854 is not security or has no CVEs. patches: SUSE-2024-2854,SUSE-SLE-Product-HA-15-SP6-2024-2854,openSUSE-SLE-15.6-2024-2854 SKIP SUSE-RU-2024:2855-1 as openSUSE-SLE-15.5-2024-2855 is not security or has no CVEs. patches: SUSE-2024-2855,SUSE-SLE-Product-HA-15-SP5-2024-2855,openSUSE-SLE-15.5-2024-2855 SKIP SUSE-RU-2024:2865-1 as openSUSE-SLE-15.6-2024-2865 is not security or has no CVEs. patches: SUSE-2024-2865,SUSE-SLE-Module-Basesystem-15-SP6-2024-2865,openSUSE-SLE-15.6-2024-2865 SKIP SUSE-RU-2024:2866-1 as openSUSE-SLE-15.6-2024-2866 is not security or has no CVEs. patches: SUSE-2024-2866,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2866,openSUSE-SLE-15.6-2024-2866 SKIP SUSE-RU-2024:2867-1 as SUSE-SLE-SAP-12-SP5-2024-2867 is not security or has no CVEs. patches: SUSE-2024-2867,SUSE-SLE-SAP-12-SP5-2024-2867 SKIP SUSE-RU-2024:2870-1 as SUSE-Storage-7.1-2024-2870 is not security or has no CVEs. patches: SUSE-2024-2870,SUSE-SLE-INSTALLER-15-SP2-2024-2870,SUSE-SLE-INSTALLER-15-SP3-2024-2870,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2870,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2870,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2870,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2870,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2870,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2870,SUSE-SUSE-MicroOS-5.1-2024-2870,SUSE-SUSE-MicroOS-5.2-2024-2870,SUSE-Storage-7.1-2024-2870 SKIP SUSE-RU-2024:2871-1 as SUSE-SLE-WE-12-SP5-2024-2871 is not security or has no CVEs. patches: SUSE-2024-2871,SUSE-SLE-SDK-12-SP5-2024-2871,SUSE-SLE-WE-12-SP5-2024-2871 SKIP SUSE-RU-2024:2878-1 as openSUSE-SLE-15.6-2024-2878 is not security or has no CVEs. patches: SUSE-2024-2878,SUSE-SLE-Micro-5.3-2024-2878,SUSE-SLE-Micro-5.4-2024-2878,SUSE-SLE-Micro-5.5-2024-2878,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2878,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2878,SUSE-SUSE-MicroOS-5.1-2024-2878,SUSE-SUSE-MicroOS-5.2-2024-2878,openSUSE-Leap-Micro-5.5-2024-2878,openSUSE-SLE-15.5-2024-2878,openSUSE-SLE-15.6-2024-2878 SKIP SUSE-RU-2024:2884-1 as openSUSE-SLE-15.6-2024-2884 is not security or has no CVEs. patches: SUSE-2024-2884,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-2884,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-2884,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2884,openSUSE-SLE-15.5-2024-2884,openSUSE-SLE-15.6-2024-2884 SKIP SUSE-RU-2024:2885-1 as SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2885 is not security or has no CVEs. patches: SUSE-2024-2885,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-2885,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-2885 SKIP SUSE-RU-2024:2886-1 as openSUSE-SLE-15.6-2024-2886 is not security or has no CVEs. patches: SUSE-2024-2886,SUSE-SLE-Micro-5.3-2024-2886,SUSE-SLE-Micro-5.4-2024-2886,SUSE-SLE-Micro-5.5-2024-2886,SUSE-SLE-Module-Basesystem-15-SP5-2024-2886,SUSE-SLE-Module-Basesystem-15-SP6-2024-2886,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2886,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2886,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2886,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2886,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2886,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2886,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2886,openSUSE-Leap-Micro-5.5-2024-2886,openSUSE-SLE-15.5-2024-2886,openSUSE-SLE-15.6-2024-2886 SKIP SUSE-RU-2024:2887-1 as openSUSE-SLE-15.6-2024-2887 is not security or has no CVEs. patches: SUSE-2024-2887,SUSE-SLE-Micro-5.5-2024-2887,SUSE-SLE-Module-Basesystem-15-SP5-2024-2887,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2887,openSUSE-Leap-Micro-5.5-2024-2887,openSUSE-SLE-15.5-2024-2887,openSUSE-SLE-15.6-2024-2887 SKIP SUSE-RU-2024:2888-1 as openSUSE-SLE-15.6-2024-2888 is not security or has no CVEs. patches: SUSE-2024-2888,SUSE-SLE-Module-Basesystem-15-SP6-2024-2888,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2888,openSUSE-SLE-15.6-2024-2888 SKIP SUSE-RU-2024:2912-1 as openSUSE-SLE-15.6-2024-2912 is not security or has no CVEs. patches: SUSE-2024-2912,SUSE-SLE-Micro-5.3-2024-2912,SUSE-SLE-Micro-5.4-2024-2912,SUSE-SLE-Micro-5.5-2024-2912,SUSE-SLE-Module-Basesystem-15-SP5-2024-2912,SUSE-SLE-Module-Basesystem-15-SP6-2024-2912,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-2912,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2912,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2912,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2912,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2912,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2912,openSUSE-Leap-Micro-5.5-2024-2912,openSUSE-SLE-15.5-2024-2912,openSUSE-SLE-15.6-2024-2912 SKIP SUSE-RU-2024:2913-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2913 is not security or has no CVEs. patches: SUSE-2024-2913,SUSE-SLE-Module-Public-Cloud-12-2024-2913 SKIP SUSE-RU-2024:2914-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2914 is not security or has no CVEs. patches: SUSE-2024-2914,SUSE-SLE-Module-Public-Cloud-12-2024-2914 SKIP SUSE-RU-2024:2915-1 as SUSE-SLE-Module-Public-Cloud-12-2024-2915 is not security or has no CVEs. patches: SUSE-2024-2915,SUSE-SLE-Module-Public-Cloud-12-2024-2915 SKIP SUSE-RU-2024:2918-1 as openSUSE-SLE-15.6-2024-2918 is not security or has no CVEs. patches: SUSE-2024-2918,SUSE-SLE-Module-Basesystem-15-SP6-2024-2918,SUSE-SLE-Module-Server-Applications-15-SP6-2024-2918,openSUSE-SLE-15.6-2024-2918 SKIP SUSE-RU-2024:2919-1 as SUSE-Storage-7.1-2024-2919 is not security or has no CVEs. patches: SUSE-2024-2919,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2919,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2919,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2919,SUSE-SUSE-MicroOS-5.2-2024-2919,SUSE-Storage-7.1-2024-2919 SKIP SUSE-RU-2024:2920-1 as SUSE-SLE-SERVER-12-SP5-2024-2920 is not security or has no CVEs. patches: SUSE-2024-2920,SUSE-SLE-SERVER-12-SP5-2024-2920 SKIP SUSE-RU-2024:2921-1 as openSUSE-SLE-15.5-2024-2921 is not security or has no CVEs. patches: SUSE-2024-2921,SUSE-SLE-Micro-5.5-2024-2921,SUSE-SLE-Module-Basesystem-15-SP5-2024-2921,SUSE-SLE-Module-Server-Applications-15-SP5-2024-2921,openSUSE-Leap-Micro-5.5-2024-2921,openSUSE-SLE-15.5-2024-2921 SKIP SUSE-RU-2024:2922-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2922 is not security or has no CVEs. patches: SUSE-2024-2922,SUSE-SLE-Micro-5.3-2024-2922,SUSE-SLE-Micro-5.4-2024-2922,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-2922,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-2922,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2922,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2922,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2922,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2922,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2922,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2922,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2922 SKIP SUSE-RU-2024:2932-1 as openSUSE-SLE-15.6-2024-2932 is not security or has no CVEs. patches: SUSE-2024-2932,SUSE-SLE-Module-Basesystem-15-SP6-2024-2932,openSUSE-SLE-15.6-2024-2932 SKIP SUSE-RU-2024:2935-1 as SUSE-SLE-SDK-12-SP5-2024-2935 is not security or has no CVEs. patches: SUSE-2024-2935,SUSE-SLE-SDK-12-SP5-2024-2935 SKIP SUSE-RU-2024:2936-1 as SUSE-SLE-SDK-12-SP5-2024-2936 is not security or has no CVEs. patches: SUSE-2024-2936,SUSE-SLE-SDK-12-SP5-2024-2936 SKIP SUSE-RU-2024:2937-1 as SUSE-SLE-HA-12-SP5-2024-2937 is not security or has no CVEs. patches: SUSE-2024-2937,SUSE-SLE-HA-12-SP5-2024-2937 SKIP SUSE-RU-2024:2951-1 as openSUSE-SLE-15.6-2024-2951 is not security or has no CVEs. patches: SUSE-2024-2951,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2951,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2951,openSUSE-SLE-15.5-2024-2951,openSUSE-SLE-15.6-2024-2951 SKIP SUSE-RU-2024:2952-1 as openSUSE-SLE-15.6-2024-2952 is not security or has no CVEs. patches: SUSE-2024-2952,SUSE-SLE-Module-Basesystem-15-SP6-2024-2952,openSUSE-SLE-15.6-2024-2952 SKIP SUSE-RU-2024:2952-2 as openSUSE-SLE-15.6-2024-2952 is not security or has no CVEs. patches: SUSE-2024-2952,SUSE-SLE-Module-Basesystem-15-SP6-2024-2952,openSUSE-SLE-15.6-2024-2952 SKIP SUSE-RU-2024:2955-1 as SUSE-SLE-SERVER-12-SP5-2024-2955 is not security or has no CVEs. patches: SUSE-2024-2955,SUSE-SLE-SDK-12-SP5-2024-2955,SUSE-SLE-SERVER-12-SP5-2024-2955 SKIP SUSE-RU-2024:2956-1 as openSUSE-SLE-15.6-2024-2956 is not security or has no CVEs. patches: SUSE-2024-2956,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2956,SUSE-SLE-Product-WE-15-SP6-2024-2956,openSUSE-SLE-15.6-2024-2956 SKIP SUSE-RU-2024:2957-1 as openSUSE-SLE-15.6-2024-2957 is not security or has no CVEs. patches: SUSE-2024-2957,SUSE-SLE-Module-Basesystem-15-SP6-2024-2957,SUSE-SLE-Product-HA-15-SP6-2024-2957,openSUSE-SLE-15.6-2024-2957 SKIP SUSE-RU-2024:2958-1 as SUSE-SLE-SAP-12-SP5-2024-2958 is not security or has no CVEs. patches: SUSE-2024-2958,SUSE-SLE-SAP-12-SP5-2024-2958 SKIP SUSE-RU-2024:2960-1 as SUSE-SLE-SERVER-12-SP5-2024-2960 is not security or has no CVEs. patches: SUSE-2024-2960,SUSE-SLE-SDK-12-SP5-2024-2960,SUSE-SLE-SERVER-12-SP5-2024-2960 SKIP SUSE-RU-2024:2964-1 as SUSE-SLE-SERVER-12-SP5-2024-2964 is not security or has no CVEs. patches: SUSE-2024-2964,SUSE-SLE-SDK-12-SP5-2024-2964,SUSE-SLE-SERVER-12-SP5-2024-2964 SKIP SUSE-RU-2024:2965-1 as SUSE-SLE-WE-12-SP5-2024-2965 is not security or has no CVEs. patches: SUSE-2024-2965,SUSE-SLE-SDK-12-SP5-2024-2965,SUSE-SLE-SERVER-12-SP5-2024-2965,SUSE-SLE-WE-12-SP5-2024-2965 SKIP SUSE-RU-2024:2966-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2966 is not security or has no CVEs. patches: SUSE-2024-2966,SUSE-SLE-Micro-5.3-2024-2966,SUSE-SLE-Micro-5.4-2024-2966,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2966,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2966,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2966,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2966,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2966,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2966,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2966 SKIP SUSE-RU-2024:2967-1 as openSUSE-SLE-15.6-2024-2967 is not security or has no CVEs. patches: SUSE-2024-2967,SUSE-SLE-Micro-5.3-2024-2967,SUSE-SLE-Micro-5.4-2024-2967,SUSE-SLE-Micro-5.5-2024-2967,SUSE-SLE-Module-Basesystem-15-SP5-2024-2967,SUSE-SLE-Module-Basesystem-15-SP6-2024-2967,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2967,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2967,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2967,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2967,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2967,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2967,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2967,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2967,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2967,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2967,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2967,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2967,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2967,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2967,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2967,SUSE-SUSE-MicroOS-5.1-2024-2967,SUSE-SUSE-MicroOS-5.2-2024-2967,SUSE-Storage-7.1-2024-2967,openSUSE-Leap-Micro-5.5-2024-2967,openSUSE-SLE-15.5-2024-2967,openSUSE-SLE-15.6-2024-2967 SKIP SUSE-RU-2024:2968-1 as SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2968 is not security or has no CVEs. patches: SUSE-2024-2968,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-2968 SKIP SUSE-RU-2024:2971-1 as openSUSE-SLE-15.6-2024-2971 is not security or has no CVEs. patches: SUSE-2024-2971,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2971,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2971,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2971,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2971,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2971,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2971,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2971,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2971,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2971,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2971,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2971,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2971,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2971,SUSE-Storage-7.1-2024-2971,openSUSE-SLE-15.5-2024-2971,openSUSE-SLE-15.6-2024-2971 SKIP SUSE-RU-2024:2972-1 as SUSE-SLE-SERVER-12-SP5-2024-2972 is not security or has no CVEs. patches: SUSE-2024-2972,SUSE-SLE-SDK-12-SP5-2024-2972,SUSE-SLE-SERVER-12-SP5-2024-2972 SKIP SUSE-RU-2024:2986-1 as SUSE-Storage-7.1-2024-2986 is not security or has no CVEs. patches: SUSE-2024-2986,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2986,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2986,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2986,SUSE-Storage-7.1-2024-2986 SKIP SUSE-RU-2024:2987-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2987 is not security or has no CVEs. patches: SUSE-2024-2987,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2987,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2987,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2987,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2987,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2987,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2987 SKIP SUSE-RU-2024:2988-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2988 is not security or has no CVEs. patches: SUSE-2024-2988,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2988,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2988,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2988 SKIP SUSE-RU-2024:2992-1 as openSUSE-SLE-15.6-2024-2992 is not security or has no CVEs. patches: SUSE-2024-2992,SUSE-SLE-Micro-5.3-2024-2992,SUSE-SLE-Micro-5.4-2024-2992,SUSE-SLE-Micro-5.5-2024-2992,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-2992,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2992,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2992,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2992,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2992,openSUSE-Leap-Micro-5.5-2024-2992,openSUSE-SLE-15.5-2024-2992,openSUSE-SLE-15.6-2024-2992 SKIP SUSE-RU-2024:2995-1 as openSUSE-SLE-15.6-2024-2995 is not security or has no CVEs. patches: SUSE-2024-2995,openSUSE-SLE-15.5-2024-2995,openSUSE-SLE-15.6-2024-2995 SKIP SUSE-RU-2024:2996-1 as openSUSE-SLE-15.6-2024-2996 is not security or has no CVEs. patches: SUSE-2024-2996,SUSE-SLE-Micro-5.3-2024-2996,SUSE-SLE-Micro-5.4-2024-2996,SUSE-SLE-Micro-5.5-2024-2996,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-2996,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-2996,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-2996,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-2996,openSUSE-Leap-Micro-5.5-2024-2996,openSUSE-SLE-15.5-2024-2996,openSUSE-SLE-15.6-2024-2996 SKIP SUSE-RU-2024:3009-1 as openSUSE-SLE-15.5-2024-3009 is not security or has no CVEs. patches: SUSE-2024-3009,SUSE-SLE-Micro-5.5-2024-3009,SUSE-SLE-Module-Basesystem-15-SP5-2024-3009,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3009,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3009,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3009,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3009,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3009,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3009,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3009,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3009,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3009,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3009,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3009,SUSE-Storage-7.1-2024-3009,openSUSE-Leap-Micro-5.5-2024-3009,openSUSE-SLE-15.5-2024-3009 SKIP SUSE-RU-2024:3011-1 as SUSE-SLE-SERVER-12-SP5-2024-3011 is not security or has no CVEs. patches: SUSE-2024-3011,SUSE-SLE-SERVER-12-SP5-2024-3011 SKIP SUSE-RU-2024:3012-1 as openSUSE-SLE-15.6-2024-3012 is not security or has no CVEs. patches: SUSE-2024-3012,SUSE-SLE-Micro-5.3-2024-3012,SUSE-SLE-Micro-5.4-2024-3012,SUSE-SLE-Micro-5.5-2024-3012,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-3012,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3012,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3012,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3012,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3012,openSUSE-Leap-Micro-5.5-2024-3012,openSUSE-SLE-15.5-2024-3012,openSUSE-SLE-15.6-2024-3012 SKIP SUSE-RU-2024:3013-1 as openSUSE-SLE-15.6-2024-3013 is not security or has no CVEs. patches: SUSE-2024-3013,SUSE-SLE-Micro-5.3-2024-3013,SUSE-SLE-Micro-5.4-2024-3013,SUSE-SLE-Micro-5.5-2024-3013,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-3013,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3013,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3013,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3013,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3013,openSUSE-Leap-Micro-5.5-2024-3013,openSUSE-SLE-15.5-2024-3013,openSUSE-SLE-15.6-2024-3013 SKIP SUSE-RU-2024:3016-1 as SUSE-SLE-Micro-5.3-2024-3016 is not security or has no CVEs. patches: SUSE-2024-3016,SUSE-SLE-Micro-5.3-2024-3016 SKIP SUSE-RU-2024:3017-1 as SUSE-SLE-Micro-5.4-2024-3017 is not security or has no CVEs. patches: SUSE-2024-3017,SUSE-SLE-Micro-5.4-2024-3017 SKIP SUSE-RU-2024:3020-1 as SUSE-SUSE-MicroOS-5.1-2024-3020 is not security or has no CVEs. patches: SUSE-2024-3020,SUSE-SUSE-MicroOS-5.1-2024-3020 SKIP SUSE-RU-2024:3025-1 as SUSE-SUSE-MicroOS-5.2-2024-3025 is not security or has no CVEs. patches: SUSE-2024-3025,SUSE-SUSE-MicroOS-5.2-2024-3025 SKIP SUSE-RU-2024:3026-1 as openSUSE-SLE-15.5-2024-3026 is not security or has no CVEs. patches: SUSE-2024-3026,SUSE-SLE-Micro-5.3-2024-3026,SUSE-SLE-Micro-5.4-2024-3026,SUSE-SLE-Micro-5.5-2024-3026,SUSE-SLE-Module-Basesystem-15-SP5-2024-3026,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3026,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3026,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3026,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3026,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3026,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3026,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3026,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3026,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3026,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3026,SUSE-SUSE-MicroOS-5.1-2024-3026,SUSE-SUSE-MicroOS-5.2-2024-3026,SUSE-Storage-7.1-2024-3026,openSUSE-Leap-Micro-5.5-2024-3026,openSUSE-SLE-15.5-2024-3026 SKIP SUSE-RU-2024:3053-1 as openSUSE-Leap-Micro-5.5-2024-3053 is not security or has no CVEs. patches: SUSE-2024-3053,SUSE-SLE-Micro-5.5-2024-3053,openSUSE-Leap-Micro-5.5-2024-3053 SKIP SUSE-RU-2024:3056-1 as openSUSE-SLE-15.6-2024-3056 is not security or has no CVEs. patches: SUSE-2024-3056,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3056,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3056,openSUSE-SLE-15.5-2024-3056,openSUSE-SLE-15.6-2024-3056 SKIP SUSE-RU-2024:3057-1 as openSUSE-SLE-15.6-2024-3057 is not security or has no CVEs. patches: SUSE-2024-3057,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3057,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3057,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3057,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3057,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3057,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3057,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3057,openSUSE-SLE-15.5-2024-3057,openSUSE-SLE-15.6-2024-3057 SKIP SUSE-RU-2024:3058-1 as SUSE-SLE-SDK-12-SP5-2024-3058 is not security or has no CVEs. patches: SUSE-2024-3058,SUSE-SLE-SDK-12-SP5-2024-3058 SKIP SUSE-RU-2024:3059-1 as openSUSE-SLE-15.6-2024-3059 is not security or has no CVEs. patches: SUSE-2024-3059,SUSE-SLE-Micro-5.3-2024-3059,SUSE-SLE-Micro-5.4-2024-3059,SUSE-SLE-Micro-5.5-2024-3059,SUSE-SLE-Module-Basesystem-15-SP5-2024-3059,SUSE-SLE-Module-Basesystem-15-SP6-2024-3059,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3059,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3059,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3059,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3059,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3059,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3059,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3059,openSUSE-Leap-Micro-5.5-2024-3059,openSUSE-SLE-15.5-2024-3059,openSUSE-SLE-15.6-2024-3059 SKIP SUSE-RU-2024:3065-1 as SUSE-SLE-SDK-12-SP5-2024-3065 is not security or has no CVEs. patches: SUSE-2024-3065,SUSE-SLE-SDK-12-SP5-2024-3065 SKIP SUSE-RU-2024:3066-1 as SUSE-SLE-SERVER-12-SP5-2024-3066 is not security or has no CVEs. patches: SUSE-2024-3066,SUSE-SLE-SERVER-12-SP5-2024-3066 SKIP SUSE-RU-2024:3067-1 as openSUSE-SLE-15.6-2024-3067 is not security or has no CVEs. patches: SUSE-2024-3067,SUSE-SLE-Module-Containers-15-SP5-2024-3067,openSUSE-SLE-15.5-2024-3067,openSUSE-SLE-15.6-2024-3067 SKIP SUSE-RU-2024:3068-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3068 is not security or has no CVEs. patches: SUSE-2024-3068,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3068,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3068,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3068 SKIP SUSE-RU-2024:3069-1 as SUSE-SLE-WE-12-SP5-2024-3069 is not security or has no CVEs. patches: SUSE-2024-3069,SUSE-SLE-SDK-12-SP5-2024-3069,SUSE-SLE-SERVER-12-SP5-2024-3069,SUSE-SLE-WE-12-SP5-2024-3069 SKIP SUSE-RU-2024:3070-1 as SUSE-Storage-7.1-2024-3070 is not security or has no CVEs. patches: SUSE-2024-3070,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3070,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3070,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3070,SUSE-SUSE-MicroOS-5.1-2024-3070,SUSE-SUSE-MicroOS-5.2-2024-3070,SUSE-Storage-7.1-2024-3070 SKIP SUSE-RU-2024:3071-1 as openSUSE-SLE-15.6-2024-3071 is not security or has no CVEs. patches: SUSE-2024-3071,SUSE-SLE-Micro-5.3-2024-3071,SUSE-SLE-Micro-5.4-2024-3071,SUSE-SLE-Micro-5.5-2024-3071,SUSE-SLE-Module-Basesystem-15-SP5-2024-3071,SUSE-SLE-Module-Basesystem-15-SP6-2024-3071,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3071,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3071,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3071,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3071,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3071,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3071,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3071,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3071,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3071,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3071,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3071,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3071,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3071,SUSE-SUSE-MicroOS-5.1-2024-3071,SUSE-SUSE-MicroOS-5.2-2024-3071,SUSE-Storage-7.1-2024-3071,openSUSE-Leap-Micro-5.5-2024-3071,openSUSE-SLE-15.5-2024-3071,openSUSE-SLE-15.6-2024-3071 SKIP SUSE-RU-2024:3072-1 as SUSE-SLE-Module-Public-Cloud-12-2024-3072 is not security or has no CVEs. patches: SUSE-2024-3072,SUSE-SLE-Module-Public-Cloud-12-2024-3072 SKIP SUSE-RU-2024:3084-1 as SUSE-Storage-7.1-2024-3084 is not security or has no CVEs. patches: SUSE-2024-3084,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3084,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3084,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3084,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3084,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3084,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3084,SUSE-SUSE-MicroOS-5.1-2024-3084,SUSE-SUSE-MicroOS-5.2-2024-3084,SUSE-Storage-7.1-2024-3084 SKIP SUSE-RU-2024:3087-1 as SUSE-SLE-WE-12-SP5-2024-3087 is not security or has no CVEs. patches: SUSE-2024-3087,SUSE-SLE-SDK-12-SP5-2024-3087,SUSE-SLE-SERVER-12-SP5-2024-3087,SUSE-SLE-WE-12-SP5-2024-3087 SKIP SUSE-RU-2024:3092-1 as openSUSE-SLE-15.5-2024-3092 is not security or has no CVEs. patches: SUSE-2024-3092,SUSE-SLE-Module-Legacy-15-SP5-2024-3092,openSUSE-SLE-15.5-2024-3092 SKIP SUSE-RU-2024:3093-1 as openSUSE-SLE-15.6-2024-3093 is not security or has no CVEs. patches: SUSE-2024-3093,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3093,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3093,openSUSE-SLE-15.5-2024-3093,openSUSE-SLE-15.6-2024-3093 SKIP SUSE-RU-2024:3096-1 as openSUSE-SLE-15.6-2024-3096 is not security or has no CVEs. patches: SUSE-2024-3096,SUSE-SLE-Module-Containers-15-SP5-2024-3096,SUSE-SLE-Module-Containers-15-SP6-2024-3096,openSUSE-SLE-15.5-2024-3096,openSUSE-SLE-15.6-2024-3096 SKIP SUSE-RU-2024:3099-1 as SUSE-SLE-Module-Public-Cloud-12-2024-3099 is not security or has no CVEs. patches: SUSE-2024-3099,SUSE-SLE-Module-Public-Cloud-12-2024-3099 SKIP SUSE-RU-2024:3100-1 as openSUSE-SLE-15.6-2024-3100 is not security or has no CVEs. patches: SUSE-2024-3100,SUSE-SLE-Micro-5.3-2024-3100,SUSE-SLE-Micro-5.4-2024-3100,SUSE-SLE-Micro-5.5-2024-3100,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3100,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3100,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3100,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3100,openSUSE-Leap-Micro-5.5-2024-3100,openSUSE-SLE-15.5-2024-3100,openSUSE-SLE-15.6-2024-3100 SKIP SUSE-RU-2024:3101-1 as openSUSE-SLE-15.6-2024-3101 is not security or has no CVEs. patches: SUSE-2024-3101,SUSE-SLE-Micro-5.5-2024-3101,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-3101,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3101,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3101,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3101,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3101,SUSE-SUSE-MicroOS-5.2-2024-3101,openSUSE-SLE-15.5-2024-3101,openSUSE-SLE-15.6-2024-3101 SKIP SUSE-RU-2024:3102-1 as SUSE-SLE-SERVER-12-SP5-2024-3102 is not security or has no CVEs. patches: SUSE-2024-3102,SUSE-SLE-SDK-12-SP5-2024-3102,SUSE-SLE-SERVER-12-SP5-2024-3102 SKIP SUSE-RU-2024:3103-1 as openSUSE-SLE-15.6-2024-3103 is not security or has no CVEs. patches: SUSE-2024-3103,SUSE-SLE-Module-Basesystem-15-SP6-2024-3103,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3103,openSUSE-SLE-15.6-2024-3103 SKIP SUSE-RU-2024:3121-1 as openSUSE-SLE-15.6-2024-3121 is not security or has no CVEs. patches: SUSE-2024-3121,SUSE-SLE-Module-Basesystem-15-SP6-2024-3121,openSUSE-SLE-15.6-2024-3121 SKIP SUSE-RU-2024:3122-1 as openSUSE-SLE-15.6-2024-3122 is not security or has no CVEs. patches: SUSE-2024-3122,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3122,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3122,openSUSE-SLE-15.5-2024-3122,openSUSE-SLE-15.6-2024-3122 SKIP SUSE-RU-2024:3123-1 as openSUSE-SLE-15.6-2024-3123 is not security or has no CVEs. patches: SUSE-2024-3123,SUSE-SLE-Module-Basesystem-15-SP5-2024-3123,SUSE-SLE-Module-Basesystem-15-SP6-2024-3123,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3123,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3123,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3123,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3123,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3123,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3123,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3123,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3123,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3123,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3123,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3123,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3123,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3123,SUSE-Storage-7.1-2024-3123,openSUSE-SLE-15.5-2024-3123,openSUSE-SLE-15.6-2024-3123 SKIP SUSE-RU-2024:3124-1 as openSUSE-SLE-15.6-2024-3124 is not security or has no CVEs. patches: SUSE-2024-3124,SUSE-SLE-Module-Basesystem-15-SP6-2024-3124,openSUSE-SLE-15.6-2024-3124 SKIP SUSE-RU-2024:3125-1 as openSUSE-SLE-15.6-2024-3125 is not security or has no CVEs. patches: SUSE-2024-3125,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3125,openSUSE-SLE-15.6-2024-3125 SKIP SUSE-RU-2024:3126-1 as openSUSE-SLE-15.6-2024-3126 is not security or has no CVEs. patches: SUSE-2024-3126,SUSE-SLE-Module-Basesystem-15-SP6-2024-3126,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3126,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3126,openSUSE-SLE-15.6-2024-3126 SKIP SUSE-RU-2024:3127-1 as openSUSE-SLE-15.6-2024-3127 is not security or has no CVEs. patches: SUSE-2024-3127,SUSE-SLE-Module-Containers-15-SP6-2024-3127,openSUSE-SLE-15.6-2024-3127 SKIP SUSE-RU-2024:3128-1 as openSUSE-SLE-15.6-2024-3128 is not security or has no CVEs. patches: SUSE-2024-3128,SUSE-SLE-Module-Containers-15-SP6-2024-3128,openSUSE-SLE-15.6-2024-3128 SKIP SUSE-RU-2024:3129-1 as openSUSE-SLE-15.6-2024-3129 is not security or has no CVEs. patches: SUSE-2024-3129,SUSE-SLE-Module-Basesystem-15-SP5-2024-3129,SUSE-SLE-Module-Basesystem-15-SP6-2024-3129,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3129,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3129,openSUSE-SLE-15.5-2024-3129,openSUSE-SLE-15.6-2024-3129 SKIP SUSE-RU-2024:3130-1 as openSUSE-SLE-15.6-2024-3130 is not security or has no CVEs. patches: SUSE-2024-3130,SUSE-SLE-Module-Basesystem-15-SP5-2024-3130,SUSE-SLE-Module-Basesystem-15-SP6-2024-3130,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3130,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3130,openSUSE-SLE-15.5-2024-3130,openSUSE-SLE-15.6-2024-3130 SKIP SUSE-RU-2024:3131-1 as openSUSE-SLE-15.6-2024-3131 is not security or has no CVEs. patches: SUSE-2024-3131,SUSE-SLE-Micro-5.3-2024-3131,SUSE-SLE-Micro-5.4-2024-3131,SUSE-SLE-Micro-5.5-2024-3131,SUSE-SLE-Module-Basesystem-15-SP5-2024-3131,SUSE-SLE-Module-Basesystem-15-SP6-2024-3131,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3131,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3131,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3131,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3131,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3131,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3131,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3131,openSUSE-Leap-Micro-5.5-2024-3131,openSUSE-SLE-15.5-2024-3131,openSUSE-SLE-15.6-2024-3131 SKIP SUSE-RU-2024:3132-1 as openSUSE-SLE-15.6-2024-3132 is not security or has no CVEs. patches: SUSE-2024-3132,SUSE-SLE-Module-Basesystem-15-SP6-2024-3132,openSUSE-SLE-15.6-2024-3132 SKIP SUSE-RU-2024:3133-1 as openSUSE-SLE-15.6-2024-3133 is not security or has no CVEs. patches: SUSE-2024-3133,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3133,openSUSE-SLE-15.6-2024-3133 SKIP SUSE-RU-2024:3134-1 as openSUSE-SLE-15.6-2024-3134 is not security or has no CVEs. patches: SUSE-2024-3134,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3134,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3134,openSUSE-SLE-15.6-2024-3134 SKIP SUSE-RU-2024:3135-1 as openSUSE-SLE-15.6-2024-3135 is not security or has no CVEs. patches: SUSE-2024-3135,SUSE-SLE-Module-Basesystem-15-SP6-2024-3135,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3135,openSUSE-SLE-15.6-2024-3135 SKIP SUSE-RU-2024:3137-1 as SUSE-SLE-SERVER-12-SP5-2024-3137 is not security or has no CVEs. patches: SUSE-2024-3137,SUSE-SLE-SDK-12-SP5-2024-3137,SUSE-SLE-SERVER-12-SP5-2024-3137 SKIP SUSE-RU-2024:3138-1 as openSUSE-SLE-15.5-2024-3138 is not security or has no CVEs. patches: SUSE-2024-3138,SUSE-SLE-Product-HA-15-SP5-2024-3138,openSUSE-SLE-15.5-2024-3138 SKIP SUSE-RU-2024:3141-1 as openSUSE-SLE-15.6-2024-3141 is not security or has no CVEs. patches: SUSE-2024-3141,SUSE-SLE-Micro-5.3-2024-3141,SUSE-SLE-Micro-5.4-2024-3141,SUSE-SLE-Micro-5.5-2024-3141,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3141,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3141,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3141,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3141,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3141,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3141,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3141,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3141,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3141,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3141,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3141,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3141,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3141,SUSE-SUSE-MicroOS-5.1-2024-3141,SUSE-SUSE-MicroOS-5.2-2024-3141,SUSE-Storage-7.1-2024-3141,openSUSE-Leap-Micro-5.5-2024-3141,openSUSE-SLE-15.5-2024-3141,openSUSE-SLE-15.6-2024-3141 SKIP SUSE-RU-2024:3142-1 as openSUSE-SLE-15.6-2024-3142 is not security or has no CVEs. patches: SUSE-2024-3142,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3142,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3142,openSUSE-SLE-15.5-2024-3142,openSUSE-SLE-15.6-2024-3142 SKIP SUSE-RU-2024:3143-1 as SUSE-SLE-Product-SLES-15-SP5-2024-3143 is not security or has no CVEs. patches: SUSE-2024-3143,SUSE-SLE-Product-SLES-15-SP5-2024-3143 SKIP SUSE-RU-2024:3145-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3145 is not security or has no CVEs. patches: SUSE-2024-3145,SUSE-SLE-Micro-5.3-2024-3145,SUSE-SLE-Micro-5.4-2024-3145,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3145,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3145,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3145,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3145,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3145,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3145,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3145 SKIP SUSE-RU-2024:3146-1 as openSUSE-SLE-15.5-2024-3146 is not security or has no CVEs. patches: SUSE-2024-3146,SUSE-SLE-Micro-5.5-2024-3146,SUSE-SLE-Module-Basesystem-15-SP5-2024-3146,openSUSE-Leap-Micro-5.5-2024-3146,openSUSE-SLE-15.5-2024-3146 SKIP SUSE-RU-2024:3147-1 as openSUSE-SLE-15.6-2024-3147 is not security or has no CVEs. patches: SUSE-2024-3147,SUSE-SLE-Module-Basesystem-15-SP6-2024-3147,SUSE-SLE-Product-HA-15-SP6-2024-3147,openSUSE-SLE-15.6-2024-3147 SKIP SUSE-RU-2024:3148-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3148 is not security or has no CVEs. patches: SUSE-2024-3148,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3148,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3148,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3148 SKIP SUSE-RU-2024:3150-1 as openSUSE-SLE-15.5-2024-3150 is not security or has no CVEs. patches: SUSE-2024-3150,SUSE-SLE-Module-Basesystem-15-SP5-2024-3150,SUSE-SLE-Module-Basesystem-15-SP6-2024-3150,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3150,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3150,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3150,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3150,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3150,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3150,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3150,openSUSE-SLE-15.5-2024-3150 SKIP SUSE-RU-2024:3164-1 as openSUSE-SLE-15.6-2024-3164 is not security or has no CVEs. patches: SUSE-2024-3164,SUSE-SLE-Module-Basesystem-15-SP5-2024-3164,SUSE-SLE-Module-Basesystem-15-SP6-2024-3164,openSUSE-SLE-15.5-2024-3164,openSUSE-SLE-15.6-2024-3164 SKIP SUSE-RU-2024:3166-1 as openSUSE-SLE-15.6-2024-3166 is not security or has no CVEs. patches: SUSE-2024-3166,SUSE-SLE-Module-Basesystem-15-SP6-2024-3166,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3166,openSUSE-SLE-15.6-2024-3166 SKIP SUSE-RU-2024:3167-1 as openSUSE-SLE-15.5-2024-3167 is not security or has no CVEs. patches: SUSE-2024-3167,SUSE-SLE-Micro-5.3-2024-3167,SUSE-SLE-Micro-5.4-2024-3167,SUSE-SLE-Micro-5.5-2024-3167,SUSE-SLE-Module-Basesystem-15-SP5-2024-3167,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3167,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3167,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3167,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3167,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3167,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3167,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3167,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3167,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3167,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3167,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3167,SUSE-SUSE-MicroOS-5.1-2024-3167,SUSE-SUSE-MicroOS-5.2-2024-3167,SUSE-Storage-7.1-2024-3167,openSUSE-Leap-Micro-5.5-2024-3167,openSUSE-SLE-15.5-2024-3167 SKIP SUSE-RU-2024:3175-1 as SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3175 is not security or has no CVEs. patches: SUSE-2024-3175,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3175,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3175,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3175,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3175,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3175 SKIP SUSE-RU-2024:3176-1 as openSUSE-SLE-15.5-2024-3176 is not security or has no CVEs. patches: SUSE-2024-3176,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3176,openSUSE-SLE-15.5-2024-3176 SKIP SUSE-RU-2024:3177-1 as openSUSE-SLE-15.6-2024-3177 is not security or has no CVEs. patches: SUSE-2024-3177,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3177,openSUSE-SLE-15.6-2024-3177 SKIP SUSE-RU-2024:3178-1 as openSUSE-SLE-15.6-2024-3178 is not security or has no CVEs. patches: SUSE-2024-3178,SUSE-SLE-INSTALLER-15-SP4-2024-3178,SUSE-SLE-INSTALLER-15-SP5-2024-3178,SUSE-SLE-INSTALLER-15-SP6-2024-3178,SUSE-SLE-Micro-5.3-2024-3178,SUSE-SLE-Micro-5.4-2024-3178,SUSE-SLE-Micro-5.5-2024-3178,SUSE-SLE-Module-Basesystem-15-SP5-2024-3178,SUSE-SLE-Module-Basesystem-15-SP6-2024-3178,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3178,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3178,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3178,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3178,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3178,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3178,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3178,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3178,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3178,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3178,SUSE-SLE-Product-WE-15-SP5-2024-3178,SUSE-SLE-Product-WE-15-SP6-2024-3178,openSUSE-Leap-Micro-5.5-2024-3178,openSUSE-SLE-15.5-2024-3178,openSUSE-SLE-15.6-2024-3178 SKIP SUSE-RU-2024:3180-1 as openSUSE-SLE-15.6-2024-3180 is not security or has no CVEs. patches: SUSE-2024-3180,SUSE-SLE-Module-Basesystem-15-SP5-2024-3180,SUSE-SLE-Module-Basesystem-15-SP6-2024-3180,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3180,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3180,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3180,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3180,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3180,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3180,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3180,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3180,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3180,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3180,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3180,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3180,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3180,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3180,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3180,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3180,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3180,SUSE-Storage-7.1-2024-3180,openSUSE-SLE-15.5-2024-3180,openSUSE-SLE-15.6-2024-3180 SKIP SUSE-RU-2024:3184-1 as SUSE-SLE-SERVER-12-SP5-2024-3184 is not security or has no CVEs. patches: SUSE-2024-3184,SUSE-SLE-SDK-12-SP5-2024-3184,SUSE-SLE-SERVER-12-SP5-2024-3184 SKIP SUSE-RU-2024:3185-1 as openSUSE-SLE-15.6-2024-3185 is not security or has no CVEs. patches: SUSE-2024-3185,SUSE-SLE-Micro-5.3-2024-3185,SUSE-SLE-Micro-5.4-2024-3185,SUSE-SLE-Micro-5.5-2024-3185,SUSE-SLE-Module-Basesystem-15-SP5-2024-3185,SUSE-SLE-Module-Basesystem-15-SP6-2024-3185,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3185,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3185,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3185,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3185,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3185,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3185,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3185,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3185,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3185,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3185,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3185,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3185,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3185,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3185,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3185,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3185,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3185,SUSE-SUSE-MicroOS-5.2-2024-3185,SUSE-Storage-7.1-2024-3185,openSUSE-Leap-Micro-5.5-2024-3185,openSUSE-SLE-15.5-2024-3185,openSUSE-SLE-15.6-2024-3185 SKIP SUSE-RU-2024:3199-1 as openSUSE-SLE-15.6-2024-3199 is not security or has no CVEs. patches: SUSE-2024-3199,SUSE-SLE-Module-Basesystem-15-SP6-2024-3199,openSUSE-SLE-15.6-2024-3199 SKIP SUSE-RU-2024:3201-1 as openSUSE-SLE-15.5-2024-3201 is not security or has no CVEs. patches: SUSE-2024-3201,SUSE-SLE-Module-Basesystem-15-SP5-2024-3201,openSUSE-SLE-15.5-2024-3201 SKIP SUSE-RU-2024:3205-1 as openSUSE-SLE-15.6-2024-3205 is not security or has no CVEs. patches: SUSE-2024-3205,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3205,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3205,SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-3205,openSUSE-SLE-15.6-2024-3205 SKIP SUSE-RU-2024:3206-1 as openSUSE-SLE-15.6-2024-3206 is not security or has no CVEs. patches: SUSE-2024-3206,SUSE-SLE-Micro-5.3-2024-3206,SUSE-SLE-Micro-5.4-2024-3206,SUSE-SLE-Micro-5.5-2024-3206,SUSE-SLE-Module-Basesystem-15-SP5-2024-3206,SUSE-SLE-Module-Basesystem-15-SP6-2024-3206,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3206,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3206,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3206,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3206,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3206,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3206,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3206,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3206,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3206,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3206,SUSE-SUSE-MicroOS-5.1-2024-3206,SUSE-SUSE-MicroOS-5.2-2024-3206,SUSE-Storage-7.1-2024-3206,openSUSE-Leap-Micro-5.5-2024-3206,openSUSE-SLE-15.5-2024-3206,openSUSE-SLE-15.6-2024-3206 SKIP SUSE-RU-2024:3212-1 as openSUSE-Leap-Micro-5.5-2024-3212 is not security or has no CVEs. patches: SUSE-2024-3212,SUSE-SLE-Micro-5.5-2024-3212,openSUSE-Leap-Micro-5.5-2024-3212 SKIP SUSE-RU-2024:3215-1 as openSUSE-SLE-15.6-2024-3215 is not security or has no CVEs. patches: SUSE-2024-3215,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3215,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3215,openSUSE-SLE-15.5-2024-3215,openSUSE-SLE-15.6-2024-3215 SKIP SUSE-RU-2024:3223-1 as openSUSE-SLE-15.6-2024-3223 is not security or has no CVEs. patches: SUSE-2024-3223,openSUSE-SLE-15.5-2024-3223,openSUSE-SLE-15.6-2024-3223 SKIP SUSE-RU-2024:3230-1 as openSUSE-SLE-15.6-2024-3230 is not security or has no CVEs. patches: SUSE-2024-3230,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3230,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3230,openSUSE-SLE-15.5-2024-3230,openSUSE-SLE-15.6-2024-3230 SKIP SUSE-RU-2024:3231-1 as SUSE-SLE-SDK-12-SP5-2024-3231 is not security or has no CVEs. patches: SUSE-2024-3231,SUSE-SLE-SDK-12-SP5-2024-3231 SKIP SUSE-RU-2024:3232-1 as openSUSE-SLE-15.6-2024-3232 is not security or has no CVEs. patches: SUSE-2024-3232,SUSE-SLE-Module-Basesystem-15-SP6-2024-3232,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3232,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3232,openSUSE-SLE-15.6-2024-3232 SKIP SUSE-RU-2024:3233-1 as openSUSE-SLE-15.5-2024-3233 is not security or has no CVEs. patches: SUSE-2024-3233,SUSE-SLE-Micro-5.5-2024-3233,SUSE-SLE-Module-Basesystem-15-SP5-2024-3233,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3233,openSUSE-Leap-Micro-5.5-2024-3233,openSUSE-SLE-15.5-2024-3233 SKIP SUSE-RU-2024:3234-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3234 is not security or has no CVEs. patches: SUSE-2024-3234,SUSE-SLE-Micro-5.3-2024-3234,SUSE-SLE-Micro-5.4-2024-3234,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-3234,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-3234,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3234,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3234,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3234,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3234,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3234,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3234,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3234 SKIP SUSE-RU-2024:3235-1 as openSUSE-SLE-15.6-2024-3235 is not security or has no CVEs. patches: SUSE-2024-3235,SUSE-SLE-Module-Basesystem-15-SP6-2024-3235,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3235,openSUSE-SLE-15.6-2024-3235 SKIP SUSE-RU-2024:3237-1 as openSUSE-SLE-15.6-2024-3237 is not security or has no CVEs. patches: SUSE-2024-3237,SUSE-SLE-Micro-5.5-2024-3237,SUSE-SLE-Module-Basesystem-15-SP5-2024-3237,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3237,openSUSE-Leap-Micro-5.5-2024-3237,openSUSE-SLE-15.5-2024-3237,openSUSE-SLE-15.6-2024-3237 SKIP SUSE-RU-2024:3238-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3238 is not security or has no CVEs. patches: SUSE-2024-3238,SUSE-SLE-Micro-5.3-2024-3238,SUSE-SLE-Micro-5.4-2024-3238,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3238,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3238,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3238,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3238,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3238,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3238,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3238 SKIP SUSE-RU-2024:3239-1 as openSUSE-SLE-15.6-2024-3239 is not security or has no CVEs. patches: SUSE-2024-3239,SUSE-SLE-Module-Basesystem-15-SP6-2024-3239,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3239,openSUSE-SLE-15.6-2024-3239 SKIP SUSE-RU-2024:3240-1 as SUSE-Storage-7.1-2024-3240 is not security or has no CVEs. patches: SUSE-2024-3240,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3240,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3240,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3240,SUSE-SUSE-MicroOS-5.1-2024-3240,SUSE-SUSE-MicroOS-5.2-2024-3240,SUSE-Storage-7.1-2024-3240 SKIP SUSE-RU-2024:3241-1 as SUSE-Storage-7.1-2024-3241 is not security or has no CVEs. patches: SUSE-2024-3241,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3241,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3241,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3241,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3241,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3241,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3241,SUSE-SUSE-MicroOS-5.2-2024-3241,SUSE-Storage-7.1-2024-3241 SKIP SUSE-RU-2024:3242-1 as openSUSE-SLE-15.6-2024-3242 is not security or has no CVEs. patches: SUSE-2024-3242,SUSE-SLE-Micro-5.3-2024-3242,SUSE-SLE-Micro-5.4-2024-3242,SUSE-SLE-Micro-5.5-2024-3242,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3242,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3242,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3242,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3242,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3242,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3242,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3242,openSUSE-Leap-Micro-5.5-2024-3242,openSUSE-SLE-15.5-2024-3242,openSUSE-SLE-15.6-2024-3242 SKIP SUSE-RU-2024:3243-1 as SUSE-SLE-SERVER-12-SP5-2024-3243 is not security or has no CVEs. patches: SUSE-2024-3243,SUSE-SLE-SERVER-12-SP5-2024-3243 SKIP SUSE-RU-2024:3244-1 as openSUSE-SLE-15.6-2024-3244 is not security or has no CVEs. patches: SUSE-2024-3244,SUSE-SLE-Manager-Tools-For-Micro-5-2024-3244,SUSE-SLE-Micro-5.3-2024-3244,SUSE-SLE-Micro-5.4-2024-3244,SUSE-SLE-Micro-5.5-2024-3244,SUSE-SLE-Module-Basesystem-15-SP5-2024-3244,SUSE-SLE-Module-Basesystem-15-SP6-2024-3244,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3244,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3244,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3244,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3244,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3244,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3244,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3244,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3244,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3244,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3244,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3244,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3244,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3244,SUSE-SUSE-MicroOS-5.1-2024-3244,SUSE-SUSE-MicroOS-5.2-2024-3244,SUSE-Storage-7.1-2024-3244,openSUSE-SLE-15.5-2024-3244,openSUSE-SLE-15.6-2024-3244 SKIP SUSE-RU-2024:3245-1 as openSUSE-SLE-15.6-2024-3245 is not security or has no CVEs. patches: SUSE-2024-3245,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3245,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3245,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3245,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3245,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3245,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3245,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3245,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3245,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3245,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3245,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3245,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3245,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3245,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3245,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3245,SUSE-Storage-7.1-2024-3245,openSUSE-SLE-15.5-2024-3245,openSUSE-SLE-15.6-2024-3245 SKIP SUSE-RU-2024:3246-1 as openSUSE-SLE-15.6-2024-3246 is not security or has no CVEs. patches: SUSE-2024-3246,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3246,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3246,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3246,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3246,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3246,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3246,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3246,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3246,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3246,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3246,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3246,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3246,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3246,SUSE-Storage-7.1-2024-3246,openSUSE-SLE-15.5-2024-3246,openSUSE-SLE-15.6-2024-3246 SKIP SUSE-RU-2024:3247-1 as openSUSE-SLE-15.6-2024-3247 is not security or has no CVEs. patches: SUSE-2024-3247,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3247,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3247,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3247,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3247,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3247,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3247,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3247,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3247,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3247,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3247,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3247,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3247,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3247,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3247,SUSE-Storage-7.1-2024-3247,openSUSE-SLE-15.5-2024-3247,openSUSE-SLE-15.6-2024-3247 SKIP SUSE-RU-2024:3253-1 as openSUSE-SLE-15.6-2024-3253 is not security or has no CVEs. patches: SUSE-2024-3253,SUSE-SLE-Product-HA-15-SP6-2024-3253,openSUSE-SLE-15.6-2024-3253 SKIP SUSE-RU-2024:3254-1 as openSUSE-SLE-15.5-2024-3254 is not security or has no CVEs. patches: SUSE-2024-3254,SUSE-SLE-Product-HA-15-SP5-2024-3254,openSUSE-SLE-15.5-2024-3254 SKIP SUSE-RU-2024:3255-1 as SUSE-SLE-HA-12-SP5-2024-3255 is not security or has no CVEs. patches: SUSE-2024-3255,SUSE-SLE-HA-12-SP5-2024-3255 SKIP SUSE-RU-2024:3256-1 as SUSE-SLE-Product-HA-15-SP4-2024-3256 is not security or has no CVEs. patches: SUSE-2024-3256,SUSE-SLE-Product-HA-15-SP4-2024-3256 SKIP SUSE-RU-2024:3258-1 as openSUSE-SLE-15.6-2024-3258 is not security or has no CVEs. patches: SUSE-2024-3258,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3258,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3258,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3258,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3258,openSUSE-SLE-15.5-2024-3258,openSUSE-SLE-15.6-2024-3258 SKIP SUSE-RU-2024:3259-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3259 is not security or has no CVEs. patches: SUSE-2024-3259,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3259,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3259,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3259,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3259,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3259,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3259,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3259 SKIP SUSE-RU-2024:3260-1 as SUSE-Storage-7.1-2024-3260 is not security or has no CVEs. patches: SUSE-2024-3260,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3260,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3260,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3260,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3260,SUSE-Storage-7.1-2024-3260 SKIP SUSE-RU-2024:3261-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3261 is not security or has no CVEs. patches: SUSE-2024-3261,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-3261,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3261,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3261,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3261 SKIP SUSE-RU-2024:3263-1 as openSUSE-SLE-15.6-2024-3263 is not security or has no CVEs. patches: SUSE-2024-3263,SUSE-SLE-Module-Basesystem-15-SP5-2024-3263,SUSE-SLE-Module-Basesystem-15-SP6-2024-3263,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3263,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3263,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3263,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3263,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3263,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3263,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3263,openSUSE-SLE-15.5-2024-3263,openSUSE-SLE-15.6-2024-3263 SKIP SUSE-RU-2024:3264-1 as SUSE-SUSE-Manager-Server-5.0-2024-3264 is not security or has no CVEs. patches: SUSE-2024-3264,SUSE-SUSE-Manager-Proxy-5.0-2024-3264,SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2024-3264,SUSE-SUSE-Manager-Server-5.0-2024-3264 SKIP SUSE-RU-2024:3265-1 as SUSE-SUSE-Manager-Server-5.0-2024-3265 is not security or has no CVEs. patches: SUSE-2024-3265,SUSE-SUSE-Manager-Proxy-5.0-2024-3265,SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2024-3265,SUSE-SUSE-Manager-Server-5.0-2024-3265 ERROR: notice SUSE-RU-2024:3268-1 has no valid patches out of: SUSE-2024-3268,SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-3268,suse-ubu204ct-client-tools-202408-15272 ERROR: notice SUSE-RU-2024:3270-1 has no valid patches out of: SUSE-2024-3270,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-3270 ERROR: notice SUSE-RU-2024:3271-1 has no valid patches out of: SUSE-2024-3271,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-3271 SKIP SUSE-RU-2024:3274-1 as SUSE-EL-9-CLIENT-TOOLS-2024-3274 is not security or has no CVEs. patches: SUSE-2024-3274,SUSE-EL-9-CLIENT-TOOLS-2024-3274 SKIP SUSE-RU-2024:3275-1 as SUSE-SLE-Manager-Tools-12-2024-3275 is not security or has no CVEs. patches: SUSE-2024-3275,SUSE-SLE-Manager-Tools-12-2024-3275 SKIP SUSE-RU-2024:3276-1 as SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-3276 is not security or has no CVEs. patches: SUSE-2024-3276,SUSE-SLE-Manager-Tools-15-2024-3276,SUSE-SLE-Manager-Tools-For-Micro-5-2024-3276,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-3276,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-3276 ERROR: notice SUSE-RU-2024:3279-1 has no valid patches out of: SUSE-2024-3279,SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-3279 ERROR: notice SUSE-RU-2024:3280-1 has no valid patches out of: SUSE-2024-3280,SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-3280 SKIP SUSE-RU-2024:3283-1 as SUSE-EL-9-CLIENT-TOOLS-2024-3283 is not security or has no CVEs. patches: SUSE-2024-3283,SUSE-EL-9-CLIENT-TOOLS-2024-3283 SKIP SUSE-RU-2024:3284-1 as SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3284 is not security or has no CVEs. patches: SUSE-2024-3284,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3284,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3284,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3284 SKIP SUSE-RU-2024:3285-1 as SUSE-Storage-7.1-2024-3285 is not security or has no CVEs. patches: SUSE-2024-3285,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3285,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3285,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3285,SUSE-SUSE-MicroOS-5.1-2024-3285,SUSE-SUSE-MicroOS-5.2-2024-3285,SUSE-Storage-7.1-2024-3285 SKIP SUSE-RU-2024:3286-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3286 is not security or has no CVEs. patches: SUSE-2024-3286,SUSE-SLE-Micro-5.3-2024-3286,SUSE-SLE-Micro-5.4-2024-3286,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3286,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3286,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3286,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3286,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3286,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3286,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3286 SKIP SUSE-RU-2024:3287-1 as openSUSE-SLE-15.6-2024-3287 is not security or has no CVEs. patches: SUSE-2024-3287,SUSE-SLE-Micro-5.5-2024-3287,SUSE-SLE-Module-Basesystem-15-SP5-2024-3287,SUSE-SLE-Module-Basesystem-15-SP6-2024-3287,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3287,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3287,SUSE-SLE-Module-Transactional-Server-15-SP5-2024-3287,SUSE-SLE-Module-Transactional-Server-15-SP6-2024-3287,openSUSE-Leap-Micro-5.5-2024-3287,openSUSE-SLE-15.5-2024-3287,openSUSE-SLE-15.6-2024-3287 SKIP SUSE-RU-2024:3290-1 as openSUSE-SLE-15.6-2024-3290 is not security or has no CVEs. patches: SUSE-2024-3290,SUSE-SLE-Module-Basesystem-15-SP5-2024-3290,SUSE-SLE-Module-Basesystem-15-SP6-2024-3290,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3290,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3290,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3290,SUSE-SLE-Module-Python3-15-SP5-2024-3290,SUSE-SLE-Module-Python3-15-SP6-2024-3290,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-3290,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3290,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3290,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3290,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3290,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3290,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3290,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3290,openSUSE-SLE-15.5-2024-3290,openSUSE-SLE-15.6-2024-3290 SKIP SUSE-RU-2024:3291-1 as SUSE-2024-3291 is not security or has no CVEs. patches: SUSE-2024-3291 SKIP SUSE-RU-2024:3296-1 as openSUSE-SLE-15.6-2024-3296 is not security or has no CVEs. patches: SUSE-2024-3296,SUSE-SLE-INSTALLER-15-SP6-2024-3296,openSUSE-SLE-15.6-2024-3296 SKIP SUSE-RU-2024:3299-1 as openSUSE-SLE-15.5-2024-3299 is not security or has no CVEs. patches: SUSE-2024-3299,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3299,openSUSE-SLE-15.5-2024-3299 SKIP SUSE-RU-2024:3300-1 as openSUSE-SLE-15.6-2024-3300 is not security or has no CVEs. patches: SUSE-2024-3300,SUSE-SLE-Micro-5.3-2024-3300,SUSE-SLE-Micro-5.4-2024-3300,SUSE-SLE-Micro-5.5-2024-3300,SUSE-SLE-Module-Basesystem-15-SP5-2024-3300,SUSE-SLE-Module-Basesystem-15-SP6-2024-3300,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3300,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3300,SUSE-SLE-Module-Legacy-15-SP5-2024-3300,SUSE-SLE-Module-Legacy-15-SP6-2024-3300,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3300,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3300,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3300,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3300,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3300,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3300,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3300,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3300,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3300,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3300,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3300,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3300,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3300,SUSE-SUSE-MicroOS-5.1-2024-3300,SUSE-SUSE-MicroOS-5.2-2024-3300,SUSE-Storage-7.1-2024-3300,openSUSE-Leap-Micro-5.5-2024-3300,openSUSE-SLE-15.5-2024-3300,openSUSE-SLE-15.6-2024-3300 SKIP SUSE-RU-2024:3310-1 as SUSE-Storage-7.1-2024-3310 is not security or has no CVEs. patches: SUSE-2024-3310,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3310,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3310,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3310,SUSE-Storage-7.1-2024-3310 SKIP SUSE-RU-2024:3311-1 as openSUSE-SLE-15.6-2024-3311 is not security or has no CVEs. patches: SUSE-2024-3311,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3311,openSUSE-SLE-15.6-2024-3311 SKIP SUSE-RU-2024:3312-1 as SUSE-SLE-Micro-5.4-2024-3312 is not security or has no CVEs. patches: SUSE-2024-3312,SUSE-SLE-Micro-5.4-2024-3312 SKIP SUSE-RU-2024:3313-1 as SUSE-SLE-Micro-5.3-2024-3313 is not security or has no CVEs. patches: SUSE-2024-3313,SUSE-SLE-Micro-5.3-2024-3313 SKIP SUSE-RU-2024:3314-1 as openSUSE-Leap-Micro-5.5-2024-3314 is not security or has no CVEs. patches: SUSE-2024-3314,SUSE-SLE-Micro-5.5-2024-3314,openSUSE-Leap-Micro-5.5-2024-3314 SKIP SUSE-RU-2024:3315-1 as openSUSE-SLE-15.5-2024-3315 is not security or has no CVEs. patches: SUSE-2024-3315,SUSE-SLE-Micro-5.5-2024-3315,SUSE-SLE-Module-Basesystem-15-SP5-2024-3315,openSUSE-Leap-Micro-5.5-2024-3315,openSUSE-SLE-15.5-2024-3315 SKIP SUSE-RU-2024:3316-1 as openSUSE-SLE-15.6-2024-3316 is not security or has no CVEs. patches: SUSE-2024-3316,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3316,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3316,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3316,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3316,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3316,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3316,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3316,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3316,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3316,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3316,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3316,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3316,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3316,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3316,SUSE-Storage-7.1-2024-3316,openSUSE-SLE-15.5-2024-3316,openSUSE-SLE-15.6-2024-3316 SKIP SUSE-RU-2024:3317-1 as openSUSE-SLE-15.6-2024-3317 is not security or has no CVEs. patches: SUSE-2024-3317,SUSE-SLE-Module-Basesystem-15-SP6-2024-3317,openSUSE-SLE-15.6-2024-3317 SKIP SUSE-RU-2024:3325-1 as SUSE-Storage-7.1-2024-3325 is not security or has no CVEs. patches: SUSE-2024-3325,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3325,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3325,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3325,SUSE-SUSE-MicroOS-5.1-2024-3325,SUSE-SUSE-MicroOS-5.2-2024-3325,SUSE-Storage-7.1-2024-3325 SKIP SUSE-RU-2024:3326-1 as SUSE-SLE-Module-Basesystem-15-SP6-2024-3326 is not security or has no CVEs. patches: SUSE-2024-3326,SUSE-SLE-Module-Basesystem-15-SP6-2024-3326 SKIP SUSE-RU-2024:3327-1 as SUSE-SLE-SERVER-12-SP5-2024-3327 is not security or has no CVEs. patches: SUSE-2024-3327,SUSE-SLE-SERVER-12-SP5-2024-3327 SKIP SUSE-RU-2024:3328-1 as openSUSE-Leap-Micro-5.5-2024-3328 is not security or has no CVEs. patches: SUSE-2024-3328,SUSE-SLE-Micro-5.5-2024-3328,SUSE-SLE-Module-Basesystem-15-SP5-2024-3328,openSUSE-Leap-Micro-5.5-2024-3328 SKIP SUSE-RU-2024:3329-1 as SUSE-Storage-7.1-2024-3329 is not security or has no CVEs. patches: SUSE-2024-3329,SUSE-SLE-INSTALLER-15-SP2-2024-3329,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3329,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3329,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3329,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3329,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3329,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3329,SUSE-Storage-7.1-2024-3329 SKIP SUSE-RU-2024:3330-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3330 is not security or has no CVEs. patches: SUSE-2024-3330,SUSE-SLE-Micro-5.3-2024-3330,SUSE-SLE-Micro-5.4-2024-3330,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3330,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3330,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3330,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3330,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3330,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3330,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3330 SKIP SUSE-RU-2024:3331-1 as openSUSE-SLE-15.5-2024-3331 is not security or has no CVEs. patches: SUSE-2024-3331,SUSE-SLE-Micro-5.3-2024-3331,SUSE-SLE-Micro-5.4-2024-3331,SUSE-SLE-Micro-5.5-2024-3331,SUSE-SLE-Module-Basesystem-15-SP5-2024-3331,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3331,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3331,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3331,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3331,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3331,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3331,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3331,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3331,SUSE-SLE-Product-WE-15-SP5-2024-3331,openSUSE-Leap-Micro-5.5-2024-3331,openSUSE-SLE-15.5-2024-3331 SKIP SUSE-RU-2024:3335-1 as openSUSE-SLE-15.6-2024-3335 is not security or has no CVEs. patches: SUSE-2024-3335,SUSE-SLE-Module-Basesystem-15-SP6-2024-3335,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3335,openSUSE-SLE-15.6-2024-3335 SKIP SUSE-RU-2024:3346-1 as openSUSE-SLE-15.6-2024-3346 is not security or has no CVEs. patches: SUSE-2024-3346,SUSE-SLE-INSTALLER-15-SP6-2024-3346,SUSE-SLE-Module-Basesystem-15-SP6-2024-3346,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3346,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3346,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3346,openSUSE-SLE-15.6-2024-3346 SKIP SUSE-RU-2024:3356-1 as openSUSE-SLE-15.6-2024-3356 is not security or has no CVEs. patches: SUSE-2024-3356,SUSE-SLE-Micro-5.3-2024-3356,SUSE-SLE-Micro-5.4-2024-3356,SUSE-SLE-Micro-5.5-2024-3356,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3356,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3356,SUSE-SUSE-MicroOS-5.1-2024-3356,SUSE-SUSE-MicroOS-5.2-2024-3356,openSUSE-Leap-Micro-5.5-2024-3356,openSUSE-SLE-15.5-2024-3356,openSUSE-SLE-15.6-2024-3356 SKIP SUSE-RU-2024:3359-1 as openSUSE-SLE-15.6-2024-3359 is not security or has no CVEs. patches: SUSE-2024-3359,SUSE-SLE-Module-Basesystem-15-SP6-2024-3359,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3359,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3359,openSUSE-SLE-15.6-2024-3359 SKIP SUSE-RU-2024:33664-1 as openSUSE-SLE-15.6-2024-33664 is not security or has no CVEs. patches: 33664,SUSE-SLE-INSTALLER-15-SP4-2024-33664,SUSE-SLE-INSTALLER-15-SP5-2024-33664,SUSE-SLE-INSTALLER-15-SP6-2024-33664,SUSE-SLE-Micro-5.3-2024-33664,SUSE-SLE-Micro-5.4-2024-33664,SUSE-SLE-Micro-5.5-2024-33664,SUSE-SLE-Module-Basesystem-15-SP5-2024-33664,SUSE-SLE-Module-Basesystem-15-SP6-2024-33664,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-33664,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-33664,SUSE-SLE-Module-Development-Tools-15-SP5-2024-33664,SUSE-SLE-Module-Development-Tools-15-SP6-2024-33664,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-33664,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-33664,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-33664,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-33664,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-33664,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-33664,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-33664,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-33664,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-33664,SUSE-SLE-Product-WE-15-SP5-2024-33664,SUSE-SLE-Product-WE-15-SP6-2024-33664,openSUSE-Leap-Micro-5.3-2024-33664,openSUSE-Leap-Micro-5.4-2024-33664,openSUSE-SLE-15.5-2024-33664,openSUSE-SLE-15.6-2024-33664 SKIP SUSE-RU-2024:33666-1 as SUSE-Storage-7.1-2024-33666 is not security or has no CVEs. patches: 33666,SUSE-SLE-INSTALLER-15-SP2-2024-33666,SUSE-SLE-INSTALLER-15-SP3-2024-33666,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-33666,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-33666,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-33666,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-33666,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-33666,SUSE-SUSE-MicroOS-5.1-2024-33666,SUSE-SUSE-MicroOS-5.2-2024-33666,SUSE-Storage-7.1-2024-33666 SKIP SUSE-RU-2024:3385-1 as openSUSE-SLE-15.6-2024-3385 is not security or has no CVEs. patches: SUSE-2024-3385,SUSE-SLE-Product-HA-15-SP6-2024-3385,openSUSE-SLE-15.6-2024-3385 SKIP SUSE-RU-2024:3386-1 as openSUSE-SLE-15.6-2024-3386 is not security or has no CVEs. patches: SUSE-2024-3386,SUSE-SLE-Module-Basesystem-15-SP6-2024-3386,openSUSE-SLE-15.6-2024-3386 SKIP SUSE-RU-2024:3388-1 as openSUSE-SLE-15.6-2024-3388 is not security or has no CVEs. patches: SUSE-2024-3388,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3388,openSUSE-SLE-15.6-2024-3388 SKIP SUSE-RU-2024:3389-1 as openSUSE-SLE-15.6-2024-3389 is not security or has no CVEs. patches: SUSE-2024-3389,SUSE-SLE-Module-Basesystem-15-SP6-2024-3389,openSUSE-SLE-15.6-2024-3389 SKIP SUSE-RU-2024:3390-1 as openSUSE-SLE-15.6-2024-3390 is not security or has no CVEs. patches: SUSE-2024-3390,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3390,openSUSE-SLE-15.6-2024-3390 SKIP SUSE-RU-2024:3391-1 as openSUSE-SLE-15.6-2024-3391 is not security or has no CVEs. patches: SUSE-2024-3391,SUSE-SLE-Product-HA-15-SP5-2024-3391,SUSE-SLE-Product-HA-15-SP6-2024-3391,openSUSE-SLE-15.5-2024-3391,openSUSE-SLE-15.6-2024-3391 SKIP SUSE-RU-2024:3392-1 as openSUSE-SLE-15.6-2024-3392 is not security or has no CVEs. patches: SUSE-2024-3392,SUSE-SLE-Module-Basesystem-15-SP6-2024-3392,openSUSE-SLE-15.6-2024-3392 SKIP SUSE-RU-2024:3393-1 as openSUSE-SLE-15.6-2024-3393 is not security or has no CVEs. patches: SUSE-2024-3393,SUSE-SLE-Module-Basesystem-15-SP6-2024-3393,openSUSE-SLE-15.6-2024-3393 SKIP SUSE-RU-2024:3394-1 as openSUSE-SLE-15.6-2024-3394 is not security or has no CVEs. patches: SUSE-2024-3394,SUSE-SLE-Module-Basesystem-15-SP6-2024-3394,openSUSE-SLE-15.6-2024-3394 SKIP SUSE-RU-2024:3400-1 as SUSE-SLE-Module-Public-Cloud-12-2024-3400 is not security or has no CVEs. patches: SUSE-2024-3400,SUSE-SLE-Module-Public-Cloud-12-2024-3400 SKIP SUSE-RU-2024:3401-1 as openSUSE-SLE-15.6-2024-3401 is not security or has no CVEs. patches: SUSE-2024-3401,SUSE-SLE-Module-Public-Cloud-15-SP2-2024-3401,SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3401,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3401,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3401,SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3401,openSUSE-SLE-15.5-2024-3401,openSUSE-SLE-15.6-2024-3401 SKIP SUSE-RU-2024:3402-1 as openSUSE-SLE-15.6-2024-3402 is not security or has no CVEs. patches: SUSE-2024-3402,SUSE-SLE-Module-Basesystem-15-SP6-2024-3402,openSUSE-SLE-15.6-2024-3402 SKIP SUSE-RU-2024:3406-1 as openSUSE-SLE-15.6-2024-3406 is not security or has no CVEs. patches: SUSE-2024-3406,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3406,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3406,openSUSE-SLE-15.5-2024-3406,openSUSE-SLE-15.6-2024-3406 SKIP SUSE-RU-2024:3407-1 as openSUSE-SLE-15.6-2024-3407 is not security or has no CVEs. patches: SUSE-2024-3407,SUSE-SLE-Module-Basesystem-15-SP6-2024-3407,openSUSE-SLE-15.6-2024-3407 SKIP SUSE-RU-2024:3409-1 as openSUSE-SLE-15.6-2024-3409 is not security or has no CVEs. patches: SUSE-2024-3409,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3409,openSUSE-SLE-15.6-2024-3409 SKIP SUSE-RU-2024:3412-1 as openSUSE-SLE-15.6-2024-3412 is not security or has no CVEs. patches: SUSE-2024-3412,SUSE-SLE-Micro-5.3-2024-3412,SUSE-SLE-Micro-5.4-2024-3412,SUSE-SLE-Micro-5.5-2024-3412,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3412,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3412,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3412,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3412,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3412,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3412,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3412,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3412,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3412,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3412,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3412,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3412,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3412,SUSE-SUSE-MicroOS-5.1-2024-3412,SUSE-SUSE-MicroOS-5.2-2024-3412,SUSE-Storage-7.1-2024-3412,openSUSE-Leap-Micro-5.5-2024-3412,openSUSE-SLE-15.5-2024-3412,openSUSE-SLE-15.6-2024-3412 SKIP SUSE-RU-2024:3413-1 as openSUSE-SLE-15.6-2024-3413 is not security or has no CVEs. patches: SUSE-2024-3413,SUSE-SLE-Module-Basesystem-15-SP6-2024-3413,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3413,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3413,openSUSE-SLE-15.6-2024-3413 SKIP SUSE-RU-2024:3414-1 as openSUSE-SLE-15.5-2024-3414 is not security or has no CVEs. patches: SUSE-2024-3414,SUSE-SLE-Micro-5.5-2024-3414,SUSE-SLE-Module-Basesystem-15-SP5-2024-3414,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3414,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3414,openSUSE-Leap-Micro-5.5-2024-3414,openSUSE-SLE-15.5-2024-3414 SKIP SUSE-RU-2024:3415-1 as SUSE-Storage-7.1-2024-3415 is not security or has no CVEs. patches: SUSE-2024-3415,SUSE-SLE-Module-Legacy-15-SP6-2024-3415,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3415,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3415,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3415,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3415,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3415,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3415,SUSE-Storage-7.1-2024-3415 SKIP SUSE-RU-2024:3416-1 as SUSE-SLE-SERVER-12-SP5-2024-3416 is not security or has no CVEs. patches: SUSE-2024-3416,SUSE-SLE-SDK-12-SP5-2024-3416,SUSE-SLE-SERVER-12-SP5-2024-3416 SKIP SUSE-RU-2024:3420-1 as openSUSE-SLE-15.5-2024-3420 is not security or has no CVEs. patches: SUSE-2024-3420,SUSE-SLE-INSTALLER-15-SP5-2024-3420,SUSE-SLE-Micro-5.5-2024-3420,SUSE-SLE-Module-Basesystem-15-SP5-2024-3420,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3420,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3420,SUSE-SLE-Product-WE-15-SP5-2024-3420,openSUSE-Leap-Micro-5.5-2024-3420,openSUSE-SLE-15.5-2024-3420 SKIP SUSE-RU-2024:3431-1 as openSUSE-SLE-15.6-2024-3431 is not security or has no CVEs. patches: SUSE-2024-3431,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3431,openSUSE-SLE-15.6-2024-3431 SKIP SUSE-RU-2024:3435-1 as openSUSE-SLE-15.6-2024-3435 is not security or has no CVEs. patches: SUSE-2024-3435,SUSE-SLE-Module-Basesystem-15-SP6-2024-3435,openSUSE-SLE-15.6-2024-3435 SKIP SUSE-RU-2024:3436-1 as openSUSE-SLE-15.6-2024-3436 is not security or has no CVEs. patches: SUSE-2024-3436,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3436,openSUSE-SLE-15.6-2024-3436 SKIP SUSE-RU-2024:3437-1 as openSUSE-SLE-15.5-2024-3437 is not security or has no CVEs. patches: SUSE-2024-3437,SUSE-SLE-INSTALLER-15-SP5-2024-3437,openSUSE-SLE-15.5-2024-3437 SKIP SUSE-RU-2024:3438-1 as openSUSE-SLE-15.6-2024-3438 is not security or has no CVEs. patches: SUSE-2024-3438,SUSE-SLE-Module-Basesystem-15-SP6-2024-3438,openSUSE-SLE-15.6-2024-3438 SKIP SUSE-RU-2024:3439-1 as openSUSE-SLE-15.5-2024-3439 is not security or has no CVEs. patches: SUSE-2024-3439,SUSE-SLE-Micro-5.5-2024-3439,SUSE-SLE-Module-Basesystem-15-SP5-2024-3439,openSUSE-Leap-Micro-5.5-2024-3439,openSUSE-SLE-15.5-2024-3439 SKIP SUSE-RU-2024:3440-1 as SUSE-SLE-SERVER-12-SP5-2024-3440 is not security or has no CVEs. patches: SUSE-2024-3440,SUSE-SLE-SERVER-12-SP5-2024-3440 SKIP SUSE-RU-2024:3441-1 as openSUSE-SLE-15.6-2024-3441 is not security or has no CVEs. patches: SUSE-2024-3441,SUSE-SLE-Module-Basesystem-15-SP6-2024-3441,openSUSE-SLE-15.6-2024-3441 SKIP SUSE-RU-2024:3442-1 as openSUSE-SLE-15.5-2024-3442 is not security or has no CVEs. patches: SUSE-2024-3442,SUSE-SLE-Micro-5.5-2024-3442,SUSE-SLE-Module-Basesystem-15-SP5-2024-3442,openSUSE-Leap-Micro-5.5-2024-3442,openSUSE-SLE-15.5-2024-3442 SKIP SUSE-RU-2024:3446-1 as openSUSE-SLE-15.6-2024-3446 is not security or has no CVEs. patches: SUSE-2024-3446,openSUSE-SLE-15.5-2024-3446,openSUSE-SLE-15.6-2024-3446 SKIP SUSE-RU-2024:3448-1 as SUSE-SLE-SERVER-12-SP5-2024-3448 is not security or has no CVEs. patches: SUSE-2024-3448,SUSE-SLE-SERVER-12-SP5-2024-3448 SKIP SUSE-RU-2024:3449-1 as openSUSE-SLE-15.5-2024-3449 is not security or has no CVEs. patches: SUSE-2024-3449,SUSE-SLE-Micro-5.5-2024-3449,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3449,openSUSE-Leap-Micro-5.5-2024-3449,openSUSE-SLE-15.5-2024-3449 SKIP SUSE-RU-2024:3450-1 as openSUSE-SLE-15.6-2024-3450 is not security or has no CVEs. patches: SUSE-2024-3450,SUSE-SLE-Module-Basesystem-15-SP6-2024-3450,openSUSE-SLE-15.6-2024-3450 SKIP SUSE-RU-2024:3451-1 as openSUSE-SLE-15.5-2024-3451 is not security or has no CVEs. patches: SUSE-2024-3451,SUSE-SLE-Micro-5.3-2024-3451,SUSE-SLE-Micro-5.4-2024-3451,SUSE-SLE-Micro-5.5-2024-3451,SUSE-SLE-Module-Basesystem-15-SP5-2024-3451,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3451,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3451,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3451,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3451,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3451,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3451,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3451,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3451,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3451,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3451,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3451,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3451,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3451,SUSE-SUSE-MicroOS-5.1-2024-3451,SUSE-SUSE-MicroOS-5.2-2024-3451,SUSE-Storage-7.1-2024-3451,openSUSE-Leap-Micro-5.5-2024-3451,openSUSE-SLE-15.5-2024-3451 SKIP SUSE-RU-2024:3452-1 as openSUSE-SLE-15.6-2024-3452 is not security or has no CVEs. patches: SUSE-2024-3452,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3452,openSUSE-SLE-15.6-2024-3452 SKIP SUSE-RU-2024:3460-1 as openSUSE-SLE-15.6-2024-3460 is not security or has no CVEs. patches: SUSE-2024-3460,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3460,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3460,SUSE-SLE-Product-WE-15-SP5-2024-3460,SUSE-SLE-Product-WE-15-SP6-2024-3460,openSUSE-SLE-15.5-2024-3460,openSUSE-SLE-15.6-2024-3460 SKIP SUSE-RU-2024:3461-1 as openSUSE-SLE-15.6-2024-3461 is not security or has no CVEs. patches: SUSE-2024-3461,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3461,SUSE-SLE-Product-WE-15-SP6-2024-3461,openSUSE-SLE-15.6-2024-3461 SKIP SUSE-RU-2024:3462-1 as SUSE-SLE-Module-Public-Cloud-12-2024-3462 is not security or has no CVEs. patches: SUSE-2024-3462,SUSE-SLE-Module-Public-Cloud-12-2024-3462 SKIP SUSE-RU-2024:3463-1 as SUSE-SLE-Module-Server-Applications-15-SP6-2024-3463 is not security or has no CVEs. patches: SUSE-2024-3463,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3463 SKIP SUSE-RU-2024:3466-1 as openSUSE-SLE-15.6-2024-3466 is not security or has no CVEs. patches: SUSE-2024-3466,SUSE-SLE-Module-Basesystem-15-SP6-2024-3466,openSUSE-SLE-15.6-2024-3466 SKIP SUSE-RU-2024:3469-1 as openSUSE-SLE-15.6-2024-3469 is not security or has no CVEs. patches: SUSE-2024-3469,SUSE-SLE-Module-Containers-15-SP5-2024-3469,SUSE-SLE-Module-Containers-15-SP6-2024-3469,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3469,SUSE-SLE-Module-Python3-15-SP5-2024-3469,SUSE-SLE-Module-Python3-15-SP6-2024-3469,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3469,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3469,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3469,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3469,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3469,openSUSE-SLE-15.5-2024-3469,openSUSE-SLE-15.6-2024-3469 SKIP SUSE-RU-2024:3471-1 as openSUSE-SLE-15.6-2024-3471 is not security or has no CVEs. patches: SUSE-2024-3471,SUSE-SLE-INSTALLER-15-SP6-2024-3471,SUSE-SLE-Module-Basesystem-15-SP6-2024-3471,openSUSE-SLE-15.6-2024-3471 SKIP SUSE-RU-2024:3472-1 as openSUSE-SLE-15.6-2024-3472 is not security or has no CVEs. patches: SUSE-2024-3472,SUSE-SLE-Micro-5.3-2024-3472,SUSE-SLE-Micro-5.4-2024-3472,SUSE-SLE-Micro-5.5-2024-3472,SUSE-SLE-Module-Basesystem-15-SP5-2024-3472,SUSE-SLE-Module-Basesystem-15-SP6-2024-3472,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3472,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3472,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3472,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3472,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3472,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3472,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3472,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3472,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3472,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3472,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3472,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3472,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3472,SUSE-SUSE-MicroOS-5.1-2024-3472,SUSE-SUSE-MicroOS-5.2-2024-3472,SUSE-Storage-7.1-2024-3472,openSUSE-Leap-Micro-5.5-2024-3472,openSUSE-SLE-15.5-2024-3472,openSUSE-SLE-15.6-2024-3472 SKIP SUSE-RU-2024:3473-1 as openSUSE-SLE-15.6-2024-3473 is not security or has no CVEs. patches: SUSE-2024-3473,SUSE-SLE-Module-Legacy-15-SP5-2024-3473,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3473,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3473,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3473,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3473,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3473,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3473,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3473,openSUSE-SLE-15.5-2024-3473,openSUSE-SLE-15.6-2024-3473 SKIP SUSE-RU-2024:3474-1 as SUSE-SLE-SERVER-12-SP5-2024-3474 is not security or has no CVEs. patches: SUSE-2024-3474,SUSE-SLE-SDK-12-SP5-2024-3474,SUSE-SLE-SERVER-12-SP5-2024-3474 SKIP SUSE-RU-2024:3475-1 as SUSE-Storage-7.1-2024-3475 is not security or has no CVEs. patches: SUSE-2024-3475,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3475,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3475,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3475,SUSE-SUSE-MicroOS-5.1-2024-3475,SUSE-SUSE-MicroOS-5.2-2024-3475,SUSE-Storage-7.1-2024-3475 SKIP SUSE-RU-2024:3476-1 as openSUSE-SLE-15.6-2024-3476 is not security or has no CVEs. patches: SUSE-2024-3476,SUSE-SLE-Module-Basesystem-15-SP6-2024-3476,openSUSE-SLE-15.6-2024-3476 SKIP SUSE-RU-2024:3477-1 as openSUSE-SLE-15.5-2024-3477 is not security or has no CVEs. patches: SUSE-2024-3477,SUSE-SLE-INSTALLER-15-SP4-2024-3477,SUSE-SLE-INSTALLER-15-SP5-2024-3477,SUSE-SLE-Micro-5.3-2024-3477,SUSE-SLE-Micro-5.4-2024-3477,SUSE-SLE-Micro-5.5-2024-3477,SUSE-SLE-Module-Basesystem-15-SP5-2024-3477,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3477,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3477,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3477,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3477,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3477,openSUSE-Leap-Micro-5.5-2024-3477,openSUSE-SLE-15.5-2024-3477 SKIP SUSE-RU-2024:3479-1 as openSUSE-SLE-15.6-2024-3479 is not security or has no CVEs. patches: SUSE-2024-3479,SUSE-SLE-Module-Basesystem-15-SP5-2024-3479,SUSE-SLE-Module-Basesystem-15-SP6-2024-3479,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3479,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3479,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3479,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3479,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3479,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3479,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3479,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3479,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3479,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3479,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3479,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3479,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3479,SUSE-Storage-7.1-2024-3479,openSUSE-SLE-15.5-2024-3479,openSUSE-SLE-15.6-2024-3479 SKIP SUSE-RU-2024:3480-1 as openSUSE-SLE-15.6-2024-3480 is not security or has no CVEs. patches: SUSE-2024-3480,SUSE-SLE-Module-Basesystem-15-SP6-2024-3480,openSUSE-SLE-15.6-2024-3480 SKIP SUSE-RU-2024:3481-1 as openSUSE-SLE-15.5-2024-3481 is not security or has no CVEs. patches: SUSE-2024-3481,SUSE-SLE-Micro-5.5-2024-3481,SUSE-SLE-Module-Basesystem-15-SP5-2024-3481,openSUSE-Leap-Micro-5.5-2024-3481,openSUSE-SLE-15.5-2024-3481 SKIP SUSE-RU-2024:3482-1 as openSUSE-SLE-15.6-2024-3482 is not security or has no CVEs. patches: SUSE-2024-3482,SUSE-SLE-Module-Basesystem-15-SP5-2024-3482,SUSE-SLE-Module-Basesystem-15-SP6-2024-3482,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3482,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3482,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3482,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3482,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3482,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3482,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3482,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3482,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3482,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3482,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3482,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3482,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3482,SUSE-Storage-7.1-2024-3482,openSUSE-SLE-15.5-2024-3482,openSUSE-SLE-15.6-2024-3482 SKIP SUSE-RU-2024:3484-1 as SUSE-SLE-SERVER-12-SP5-2024-3484 is not security or has no CVEs. patches: SUSE-2024-3484,SUSE-SLE-SERVER-12-SP5-2024-3484 SKIP SUSE-RU-2024:3485-1 as SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3485 is not security or has no CVEs. patches: SUSE-2024-3485,SUSE-SLE-INSTALLER-15-SP4-2024-3485,SUSE-SLE-Micro-5.3-2024-3485,SUSE-SLE-Micro-5.4-2024-3485,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3485,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3485,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3485,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3485,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3485,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3485 SKIP SUSE-RU-2024:3487-1 as openSUSE-SLE-15.6-2024-3487 is not security or has no CVEs. patches: SUSE-2024-3487,SUSE-SLE-Micro-5.3-2024-3487,SUSE-SLE-Micro-5.4-2024-3487,SUSE-SLE-Micro-5.5-2024-3487,SUSE-SLE-Module-Basesystem-15-SP5-2024-3487,SUSE-SLE-Module-Basesystem-15-SP6-2024-3487,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3487,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3487,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3487,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3487,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3487,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3487,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3487,openSUSE-Leap-Micro-5.5-2024-3487,openSUSE-SLE-15.5-2024-3487,openSUSE-SLE-15.6-2024-3487 SKIP SUSE-RU-2024:3488-1 as SUSE-SLE-Module-Basesystem-15-SP5-2024-3488 is not security or has no CVEs. patches: SUSE-2024-3488,SUSE-SLE-Module-Basesystem-15-SP5-2024-3488 SKIP SUSE-RU-2024:3489-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3489 is not security or has no CVEs. patches: SUSE-2024-3489,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3489,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3489,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3489,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3489,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3489,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3489,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3489 SKIP SUSE-RU-2024:3490-1 as openSUSE-SLE-15.6-2024-3490 is not security or has no CVEs. patches: SUSE-2024-3490,SUSE-SLE-Module-Basesystem-15-SP5-2024-3490,SUSE-SLE-Module-Basesystem-15-SP6-2024-3490,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3490,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3490,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3490,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3490,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3490,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3490,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3490,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3490,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3490,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3490,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3490,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3490,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3490,SUSE-Storage-7.1-2024-3490,openSUSE-SLE-15.5-2024-3490,openSUSE-SLE-15.6-2024-3490 SKIP SUSE-RU-2024:3491-1 as openSUSE-SLE-15.6-2024-3491 is not security or has no CVEs. patches: SUSE-2024-3491,SUSE-SLE-Module-Basesystem-15-SP5-2024-3491,SUSE-SLE-Module-Basesystem-15-SP6-2024-3491,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3491,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3491,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3491,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3491,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3491,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3491,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3491,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3491,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3491,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3491,SUSE-Storage-7.1-2024-3491,openSUSE-SLE-15.5-2024-3491,openSUSE-SLE-15.6-2024-3491 SKIP SUSE-RU-2024:3492-1 as openSUSE-SLE-15.6-2024-3492 is not security or has no CVEs. patches: SUSE-2024-3492,SUSE-SLE-Micro-5.3-2024-3492,SUSE-SLE-Micro-5.4-2024-3492,SUSE-SLE-Micro-5.5-2024-3492,SUSE-SLE-Module-Basesystem-15-SP5-2024-3492,SUSE-SLE-Module-Basesystem-15-SP6-2024-3492,openSUSE-Leap-Micro-5.5-2024-3492,openSUSE-SLE-15.5-2024-3492,openSUSE-SLE-15.6-2024-3492 SKIP SUSE-RU-2024:3492-2 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3492 is not security or has no CVEs. patches: SUSE-2024-3492,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3492 SKIP SUSE-RU-2024:3492-3 as SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3492 is not security or has no CVEs. patches: SUSE-2024-3492,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3492 SKIP SUSE-RU-2024:3493-1 as openSUSE-SLE-15.6-2024-3493 is not security or has no CVEs. patches: SUSE-2024-3493,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3493,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3493,openSUSE-SLE-15.5-2024-3493,openSUSE-SLE-15.6-2024-3493 SKIP SUSE-RU-2024:3494-1 as openSUSE-SLE-15.5-2024-3494 is not security or has no CVEs. patches: SUSE-2024-3494,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3494,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3494,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3494,SUSE-SLE-Product-WE-15-SP6-2024-3494,openSUSE-SLE-15.5-2024-3494 SKIP SUSE-RU-2024:3495-1 as openSUSE-SLE-15.5-2024-3495 is not security or has no CVEs. patches: SUSE-2024-3495,SUSE-SLE-INSTALLER-15-SP5-2024-3495,SUSE-SLE-Product-SLES-15-SP5-2024-3495,openSUSE-SLE-15.5-2024-3495 SKIP SUSE-RU-2024:3496-1 as openSUSE-SLE-15.6-2024-3496 is not security or has no CVEs. patches: SUSE-2024-3496,SUSE-SLE-Module-Basesystem-15-SP6-2024-3496,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3496,openSUSE-SLE-15.6-2024-3496 SKIP SUSE-RU-2024:3497-1 as openSUSE-SLE-15.6-2024-3497 is not security or has no CVEs. patches: SUSE-2024-3497,SUSE-SLE-INSTALLER-15-SP6-2024-3497,SUSE-SLE-Product-SLES-15-SP6-2024-3497,openSUSE-SLE-15.6-2024-3497 SKIP SUSE-RU-2024:3503-1 as openSUSE-SLE-15.5-2024-3503 is not security or has no CVEs. patches: SUSE-2024-3503,SUSE-SLE-Micro-5.3-2024-3503,SUSE-SLE-Micro-5.4-2024-3503,SUSE-SLE-Micro-5.5-2024-3503,SUSE-SLE-Module-Basesystem-15-SP5-2024-3503,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3503,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3503,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3503,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3503,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3503,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3503,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3503,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3503,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3503,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3503,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3503,SUSE-SUSE-MicroOS-5.1-2024-3503,SUSE-SUSE-MicroOS-5.2-2024-3503,SUSE-Storage-7.1-2024-3503,openSUSE-Leap-Micro-5.5-2024-3503,openSUSE-SLE-15.5-2024-3503 SKIP SUSE-RU-2024:3504-1 as openSUSE-SLE-15.6-2024-3504 is not security or has no CVEs. patches: SUSE-2024-3504,SUSE-SLE-Module-Basesystem-15-SP6-2024-3504,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3504,openSUSE-SLE-15.6-2024-3504 SKIP SUSE-RU-2024:3508-1 as SUSE-SLE-Module-RT-15-SP6-2024-3508 is not security or has no CVEs. patches: SUSE-2024-3508,SUSE-SLE-Module-RT-15-SP6-2024-3508 SKIP SUSE-RU-2024:3509-1 as openSUSE-SLE-15.6-2024-3509 is not security or has no CVEs. patches: SUSE-2024-3509,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3509,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3509,openSUSE-SLE-15.5-2024-3509,openSUSE-SLE-15.6-2024-3509 SKIP SUSE-RU-2024:3511-1 as openSUSE-SLE-15.5-2024-3511 is not security or has no CVEs. patches: SUSE-2024-3511,SUSE-SLE-Product-HA-15-SP5-2024-3511,openSUSE-SLE-15.5-2024-3511 SKIP SUSE-RU-2024:3512-1 as openSUSE-SLE-15.6-2024-3512 is not security or has no CVEs. patches: SUSE-2024-3512,SUSE-SLE-Module-Basesystem-15-SP6-2024-3512,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3512,openSUSE-SLE-15.6-2024-3512 SKIP SUSE-RU-2024:3513-1 as openSUSE-SLE-15.6-2024-3513 is not security or has no CVEs. patches: SUSE-2024-3513,SUSE-SLE-Product-HA-15-SP2-2024-3513,SUSE-SLE-Product-HA-15-SP3-2024-3513,SUSE-SLE-Product-HA-15-SP4-2024-3513,SUSE-SLE-Product-HA-15-SP5-2024-3513,SUSE-SLE-Product-HA-15-SP6-2024-3513,openSUSE-SLE-15.5-2024-3513,openSUSE-SLE-15.6-2024-3513 SKIP SUSE-RU-2024:3514-1 as SUSE-SLE-HA-12-SP5-2024-3514 is not security or has no CVEs. patches: SUSE-2024-3514,SUSE-SLE-HA-12-SP5-2024-3514 SKIP SUSE-RU-2024:3520-1 as openSUSE-SLE-15.6-2024-3520 is not security or has no CVEs. patches: SUSE-2024-3520,SUSE-SLE-Module-Basesystem-15-SP6-2024-3520,openSUSE-SLE-15.6-2024-3520 SKIP SUSE-RU-2024:3521-1 as openSUSE-SLE-15.5-2024-3521 is not security or has no CVEs. patches: SUSE-2024-3521,SUSE-SLE-Micro-5.5-2024-3521,SUSE-SLE-Module-Basesystem-15-SP5-2024-3521,openSUSE-Leap-Micro-5.5-2024-3521,openSUSE-SLE-15.5-2024-3521 SKIP SUSE-RU-2024:3522-1 as openSUSE-SLE-15.6-2024-3522 is not security or has no CVEs. patches: SUSE-2024-3522,SUSE-SLE-Module-Basesystem-15-SP6-2024-3522,SUSE-SLE-Product-HA-15-SP6-2024-3522,openSUSE-SLE-15.6-2024-3522 SKIP SUSE-RU-2024:3527-1 as openSUSE-SLE-15.5-2024-3527 is not security or has no CVEs. patches: SUSE-2024-3527,SUSE-SLE-Micro-5.3-2024-3527,SUSE-SLE-Micro-5.4-2024-3527,SUSE-SLE-Micro-5.5-2024-3527,SUSE-SLE-Module-Basesystem-15-SP5-2024-3527,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3527,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3527,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3527,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3527,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3527,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3527,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3527,openSUSE-Leap-Micro-5.5-2024-3527,openSUSE-SLE-15.5-2024-3527 SKIP SUSE-RU-2024:3528-1 as openSUSE-SLE-15.6-2024-3528 is not security or has no CVEs. patches: SUSE-2024-3528,SUSE-SLE-Module-Basesystem-15-SP6-2024-3528,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3528,openSUSE-SLE-15.6-2024-3528 SKIP SUSE-RU-2024:3529-1 as openSUSE-SLE-15.6-2024-3529 is not security or has no CVEs. patches: SUSE-2024-3529,SUSE-SLE-Module-Basesystem-15-SP6-2024-3529,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3529,openSUSE-SLE-15.6-2024-3529 SKIP SUSE-RU-2024:3530-1 as openSUSE-SLE-15.5-2024-3530 is not security or has no CVEs. patches: SUSE-2024-3530,SUSE-SLE-Micro-5.3-2024-3530,SUSE-SLE-Micro-5.4-2024-3530,SUSE-SLE-Micro-5.5-2024-3530,SUSE-SLE-Module-Basesystem-15-SP5-2024-3530,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3530,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3530,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3530,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3530,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3530,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3530,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3530,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3530,openSUSE-Leap-Micro-5.5-2024-3530,openSUSE-SLE-15.5-2024-3530 SKIP SUSE-RU-2024:3531-1 as openSUSE-SLE-15.6-2024-3531 is not security or has no CVEs. patches: SUSE-2024-3531,SUSE-SLE-Module-Basesystem-15-SP5-2024-3531,SUSE-SLE-Module-Basesystem-15-SP6-2024-3531,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3531,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3531,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3531,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3531,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3531,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3531,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3531,openSUSE-SLE-15.5-2024-3531,openSUSE-SLE-15.6-2024-3531 SKIP SUSE-RU-2024:3534-1 as openSUSE-SLE-15.6-2024-3534 is not security or has no CVEs. patches: SUSE-2024-3534,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3534,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3534,openSUSE-SLE-15.5-2024-3534,openSUSE-SLE-15.6-2024-3534 SKIP SUSE-RU-2024:3536-1 as SUSE-Storage-7.1-2024-3536 is not security or has no CVEs. patches: SUSE-2024-3536,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3536,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3536,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3536,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3536,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3536,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3536,SUSE-SUSE-MicroOS-5.1-2024-3536,SUSE-SUSE-MicroOS-5.2-2024-3536,SUSE-Storage-7.1-2024-3536 SKIP SUSE-RU-2024:3539-1 as openSUSE-SLE-15.6-2024-3539 is not security or has no CVEs. patches: SUSE-2024-3539,SUSE-SLE-Module-Containers-15-SP5-2024-3539,SUSE-SLE-Module-Containers-15-SP6-2024-3539,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3539,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3539,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3539,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3539,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3539,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3539,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3539,SUSE-Storage-7.1-2024-3539,openSUSE-SLE-15.5-2024-3539,openSUSE-SLE-15.6-2024-3539 SKIP SUSE-RU-2024:3555-1 as openSUSE-SLE-15.6-2024-3555 is not security or has no CVEs. patches: SUSE-2024-3555,SUSE-SLE-Module-Basesystem-15-SP6-2024-3555,openSUSE-SLE-15.6-2024-3555 SKIP SUSE-RU-2024:3556-1 as SUSE-SLE-SERVER-12-SP5-2024-3556 is not security or has no CVEs. patches: SUSE-2024-3556,SUSE-SLE-SERVER-12-SP5-2024-3556 SKIP SUSE-RU-2024:3557-1 as openSUSE-SLE-15.5-2024-3557 is not security or has no CVEs. patches: SUSE-2024-3557,SUSE-SLE-Micro-5.5-2024-3557,SUSE-SLE-Module-Basesystem-15-SP5-2024-3557,openSUSE-Leap-Micro-5.5-2024-3557,openSUSE-SLE-15.5-2024-3557 SKIP SUSE-RU-2024:3560-1 as SUSE-SLE-Module-Server-Applications-15-SP6-2024-3560 is not security or has no CVEs. patches: SUSE-2024-3560,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3560 SKIP SUSE-RU-2024:3562-1 as openSUSE-SLE-15.6-2024-3562 is not security or has no CVEs. patches: SUSE-2024-3562,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3562,openSUSE-SLE-15.6-2024-3562 SKIP SUSE-RU-2024:3568-1 as openSUSE-SLE-15.6-2024-3568 is not security or has no CVEs. patches: SUSE-2024-3568,SUSE-SLE-Micro-5.5-2024-3568,SUSE-SLE-Module-Basesystem-15-SP5-2024-3568,SUSE-SLE-Module-Basesystem-15-SP6-2024-3568,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3568,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3568,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3568,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3568,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3568,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3568,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3568,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3568,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3568,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3568,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3568,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3568,SUSE-Storage-7.1-2024-3568,openSUSE-Leap-Micro-5.5-2024-3568,openSUSE-SLE-15.5-2024-3568,openSUSE-SLE-15.6-2024-3568 SKIP SUSE-RU-2024:3571-1 as SUSE-SLE-SDK-12-SP5-2024-3571 is not security or has no CVEs. patches: SUSE-2024-3571,SUSE-SLE-SDK-12-SP5-2024-3571 SKIP SUSE-RU-2024:3572-1 as SUSE-SLE-SDK-12-SP5-2024-3572 is not security or has no CVEs. patches: SUSE-2024-3572,SUSE-SLE-SDK-12-SP5-2024-3572 SKIP SUSE-RU-2024:3573-1 as openSUSE-SLE-15.6-2024-3573 is not security or has no CVEs. patches: SUSE-2024-3573,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3573,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3573,openSUSE-SLE-15.5-2024-3573,openSUSE-SLE-15.6-2024-3573 SKIP SUSE-RU-2024:3574-1 as openSUSE-SLE-15.6-2024-3574 is not security or has no CVEs. patches: SUSE-2024-3574,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3574,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3574,openSUSE-SLE-15.5-2024-3574,openSUSE-SLE-15.6-2024-3574 SKIP SUSE-RU-2024:3579-1 as SUSE-Storage-7.1-2024-3579 is not security or has no CVEs. patches: SUSE-2024-3579,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3579,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3579,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3579,SUSE-SUSE-MicroOS-5.1-2024-3579,SUSE-SUSE-MicroOS-5.2-2024-3579,SUSE-Storage-7.1-2024-3579 SKIP SUSE-RU-2024:3580-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3580 is not security or has no CVEs. patches: SUSE-2024-3580,SUSE-SLE-Micro-5.3-2024-3580,SUSE-SLE-Micro-5.4-2024-3580,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3580,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3580,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3580,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3580,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3580,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3580,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3580 SKIP SUSE-RU-2024:3581-1 as SUSE-SLE-SERVER-12-SP5-2024-3581 is not security or has no CVEs. patches: SUSE-2024-3581,SUSE-SLE-SERVER-12-SP5-2024-3581 SKIP SUSE-RU-2024:3583-1 as openSUSE-SLE-15.6-2024-3583 is not security or has no CVEs. patches: SUSE-2024-3583,SUSE-SLE-Module-Basesystem-15-SP6-2024-3583,openSUSE-SLE-15.6-2024-3583 SKIP SUSE-RU-2024:3584-1 as openSUSE-SLE-15.5-2024-3584 is not security or has no CVEs. patches: SUSE-2024-3584,SUSE-SLE-Micro-5.5-2024-3584,SUSE-SLE-Module-Basesystem-15-SP5-2024-3584,openSUSE-Leap-Micro-5.5-2024-3584,openSUSE-SLE-15.5-2024-3584 SKIP SUSE-RU-2024:35851-1 as SUSE-SLE-Module-Public-Cloud-12-2024-35851 is not security or has no CVEs. patches: SUSE-SLE-Module-Public-Cloud-12-2024-35851 SKIP SUSE-RU-2024:3588-1 as SUSE-Elemental-5.5-2024-3588 is not security or has no CVEs. patches: SUSE-2024-3588,SUSE-Elemental-5.5-2024-3588 SKIP SUSE-RU-2024:3589-1 as openSUSE-SLE-15.6-2024-3589 is not security or has no CVEs. patches: SUSE-2024-3589,SUSE-SLE-Module-Basesystem-15-SP6-2024-3589,SUSE-SLE-Module-Legacy-15-SP6-2024-3589,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3589,openSUSE-SLE-15.6-2024-3589 SKIP SUSE-RU-2024:3593-1 as openSUSE-SLE-15.5-2024-3593 is not security or has no CVEs. patches: SUSE-2024-3593,SUSE-SLE-Module-Basesystem-15-SP5-2024-3593,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3593,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3593,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3593,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3593,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3593,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3593,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3593,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3593,openSUSE-SLE-15.5-2024-3593 SKIP SUSE-RU-2024:3594-1 as SUSE-SLE-Module-RT-15-SP6-2024-3594 is not security or has no CVEs. patches: SUSE-2024-3594,SUSE-SLE-Module-RT-15-SP6-2024-3594 SKIP SUSE-RU-2024:3595-1 as openSUSE-SLE-15.6-2024-3595 is not security or has no CVEs. patches: SUSE-2024-3595,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3595,openSUSE-SLE-15.6-2024-3595 SKIP SUSE-RU-2024:3597-1 as openSUSE-SLE-15.6-2024-3597 is not security or has no CVEs. patches: SUSE-2024-3597,SUSE-SLE-Micro-5.3-2024-3597,SUSE-SLE-Micro-5.4-2024-3597,SUSE-SLE-Micro-5.5-2024-3597,SUSE-SLE-Module-Basesystem-15-SP5-2024-3597,SUSE-SLE-Module-Basesystem-15-SP6-2024-3597,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3597,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3597,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3597,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3597,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3597,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3597,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3597,openSUSE-Leap-Micro-5.5-2024-3597,openSUSE-SLE-15.5-2024-3597,openSUSE-SLE-15.6-2024-3597 SKIP SUSE-RU-2024:3601-1 as SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3601 is not security or has no CVEs. patches: SUSE-2024-3601,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3601 SKIP SUSE-RU-2024:3602-1 as openSUSE-SLE-15.6-2024-3602 is not security or has no CVEs. patches: SUSE-2024-3602,SUSE-SLE-Module-Basesystem-15-SP6-2024-3602,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3602,openSUSE-SLE-15.6-2024-3602 SKIP SUSE-RU-2024:3605-1 as openSUSE-SLE-15.5-2024-3605 is not security or has no CVEs. patches: SUSE-2024-3605,SUSE-SLE-Micro-5.5-2024-3605,SUSE-SLE-Module-Basesystem-15-SP5-2024-3605,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3605,openSUSE-Leap-Micro-5.5-2024-3605,openSUSE-SLE-15.5-2024-3605 SKIP SUSE-RU-2024:3606-1 as openSUSE-SLE-15.6-2024-3606 is not security or has no CVEs. patches: SUSE-2024-3606,SUSE-SLE-Module-Basesystem-15-SP5-2024-3606,SUSE-SLE-Module-Basesystem-15-SP6-2024-3606,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3606,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3606,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3606,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3606,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3606,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3606,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3606,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3606,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3606,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3606,SUSE-Storage-7.1-2024-3606,openSUSE-SLE-15.5-2024-3606,openSUSE-SLE-15.6-2024-3606 SKIP SUSE-RU-2024:3608-1 as openSUSE-SLE-15.6-2024-3608 is not security or has no CVEs. patches: SUSE-2024-3608,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3608,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3608,openSUSE-SLE-15.5-2024-3608,openSUSE-SLE-15.6-2024-3608 SKIP SUSE-RU-2024:3609-1 as SUSE-SLE-Product-SLES-15-SP6-2024-3609 is not security or has no CVEs. patches: SUSE-2024-3609,SUSE-SLE-Product-SLES-15-SP6-2024-3609 SKIP SUSE-RU-2024:3611-1 as openSUSE-SLE-15.6-2024-3611 is not security or has no CVEs. patches: SUSE-2024-3611,SUSE-SLE-Module-Live-Patching-15-SP2-2024-3611,SUSE-SLE-Module-Live-Patching-15-SP3-2024-3611,SUSE-SLE-Module-Live-Patching-15-SP4-2024-3611,SUSE-SLE-Module-Live-Patching-15-SP5-2024-3611,SUSE-SLE-Module-Live-Patching-15-SP6-2024-3611,openSUSE-SLE-15.5-2024-3611,openSUSE-SLE-15.6-2024-3611 SKIP SUSE-RU-2024:3612-1 as SUSE-SLE-Live-Patching-12-SP5-2024-3612 is not security or has no CVEs. patches: SUSE-2024-3612,SUSE-SLE-Live-Patching-12-2024-3612,SUSE-SLE-Live-Patching-12-SP5-2024-3612 SKIP SUSE-RU-2024:3613-1 as openSUSE-SLE-15.6-2024-3613 is not security or has no CVEs. patches: SUSE-2024-3613,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3613,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3613,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3613,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3613,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3613,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3613,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3613,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3613,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3613,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3613,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3613,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3613,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3613,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3613,SUSE-Storage-7.1-2024-3613,openSUSE-SLE-15.5-2024-3613,openSUSE-SLE-15.6-2024-3613 SKIP SUSE-RU-2024:3616-1 as openSUSE-SLE-15.6-2024-3616 is not security or has no CVEs. patches: SUSE-2024-3616,SUSE-SLE-Module-Basesystem-15-SP6-2024-3616,openSUSE-SLE-15.6-2024-3616 SKIP SUSE-RU-2024:3618-1 as openSUSE-SLE-15.6-2024-3618 is not security or has no CVEs. patches: SUSE-2024-3618,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3618,openSUSE-SLE-15.6-2024-3618 SKIP SUSE-RU-2024:3619-1 as openSUSE-SLE-15.6-2024-3619 is not security or has no CVEs. patches: SUSE-2024-3619,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3619,openSUSE-SLE-15.6-2024-3619 SKIP SUSE-RU-2024:3620-1 as openSUSE-SLE-15.6-2024-3620 is not security or has no CVEs. patches: SUSE-2024-3620,SUSE-SLE-Product-HA-15-SP2-2024-3620,SUSE-SLE-Product-HA-15-SP3-2024-3620,SUSE-SLE-Product-HA-15-SP4-2024-3620,SUSE-SLE-Product-HA-15-SP5-2024-3620,SUSE-SLE-Product-HA-15-SP6-2024-3620,openSUSE-SLE-15.5-2024-3620,openSUSE-SLE-15.6-2024-3620 SKIP SUSE-RU-2024:3621-1 as openSUSE-SLE-15.6-2024-3621 is not security or has no CVEs. patches: SUSE-2024-3621,SUSE-SLE-Module-Basesystem-15-SP6-2024-3621,openSUSE-SLE-15.6-2024-3621 SKIP SUSE-RU-2024:3637-1 as openSUSE-SLE-15.6-2024-3637 is not security or has no CVEs. patches: SUSE-2024-3637,openSUSE-SLE-15.6-2024-3637 SKIP SUSE-RU-2024:3645-1 as SUSE-SLE-Module-Basesystem-15-SP6-2024-3645 is not security or has no CVEs. patches: SUSE-2024-3645,SUSE-SLE-Module-Basesystem-15-SP6-2024-3645 SKIP SUSE-RU-2024:3653-1 as openSUSE-SLE-15.5-2024-3653 is not security or has no CVEs. patches: SUSE-2024-3653,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3653,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3653,SUSE-SLE-Product-WE-15-SP6-2024-3653,openSUSE-SLE-15.5-2024-3653 SKIP SUSE-RU-2024:3654-1 as openSUSE-SLE-15.6-2024-3654 is not security or has no CVEs. patches: SUSE-2024-3654,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3654,SUSE-SLE-Product-WE-15-SP6-2024-3654,openSUSE-SLE-15.6-2024-3654 SKIP SUSE-RU-2024:3657-1 as SUSE-SLE-SERVER-12-SP5-2024-3657 is not security or has no CVEs. patches: SUSE-2024-3657,SUSE-SLE-SERVER-12-SP5-2024-3657 SKIP SUSE-RU-2024:3659-1 as openSUSE-SLE-15.6-2024-3659 is not security or has no CVEs. patches: SUSE-2024-3659,SUSE-SLE-INSTALLER-15-SP2-2024-3659,SUSE-SLE-INSTALLER-15-SP3-2024-3659,SUSE-SLE-INSTALLER-15-SP4-2024-3659,SUSE-SLE-INSTALLER-15-SP5-2024-3659,SUSE-SLE-Micro-5.3-2024-3659,SUSE-SLE-Micro-5.4-2024-3659,SUSE-SLE-Micro-5.5-2024-3659,SUSE-SLE-Module-Basesystem-15-SP5-2024-3659,SUSE-SLE-Module-Basesystem-15-SP6-2024-3659,SUSE-SLE-Module-Development-Tools-15-SP5-2024-3659,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3659,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3659,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3659,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3659,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3659,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3659,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3659,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3659,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3659,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3659,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3659,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3659,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3659,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3659,SUSE-SUSE-MicroOS-5.1-2024-3659,SUSE-SUSE-MicroOS-5.2-2024-3659,SUSE-Storage-7.1-2024-3659,openSUSE-Leap-Micro-5.5-2024-3659,openSUSE-SLE-15.5-2024-3659,openSUSE-SLE-15.6-2024-3659 SKIP SUSE-RU-2024:3681-1 as openSUSE-SLE-15.6-2024-3681 is not security or has no CVEs. patches: SUSE-2024-3681,SUSE-SLE-INSTALLER-15-SP6-2024-3681,SUSE-SLE-Module-Basesystem-15-SP6-2024-3681,openSUSE-SLE-15.6-2024-3681 SKIP SUSE-RU-2024:3712-1 as openSUSE-SLE-15.6-2024-3712 is not security or has no CVEs. patches: SUSE-2024-3712,SUSE-SLE-Module-Basesystem-15-SP6-2024-3712,SUSE-SLE-Product-HA-15-SP6-2024-3712,openSUSE-SLE-15.6-2024-3712 SKIP SUSE-RU-2024:3713-1 as openSUSE-SLE-15.6-2024-3713 is not security or has no CVEs. patches: SUSE-2024-3713,SUSE-SLE-Module-SAP-Applications-15-SP2-2024-3713,SUSE-SLE-Module-SAP-Applications-15-SP3-2024-3713,SUSE-SLE-Module-SAP-Applications-15-SP4-2024-3713,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-3713,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-3713,openSUSE-SLE-15.5-2024-3713,openSUSE-SLE-15.6-2024-3713 SKIP SUSE-RU-2024:3714-1 as openSUSE-SLE-15.5-2024-3714 is not security or has no CVEs. patches: SUSE-2024-3714,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-3714,SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-3714,openSUSE-SLE-15.5-2024-3714 SKIP SUSE-RU-2024:3715-1 as SUSE-SLE-Module-SAP-Business-One-15-SP6-2024-3715 is not security or has no CVEs. patches: SUSE-2024-3715,SUSE-SLE-Module-SAP-Applications-15-SP6-2024-3715,SUSE-SLE-Module-SAP-Business-One-15-SP6-2024-3715 SKIP SUSE-RU-2024:3716-1 as SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-3716 is not security or has no CVEs. patches: SUSE-2024-3716,SUSE-SLE-Module-SAP-Applications-15-SP5-2024-3716,SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-3716 SKIP SUSE-RU-2024:3718-1 as openSUSE-SLE-15.5-2024-3718 is not security or has no CVEs. patches: SUSE-2024-3718,SUSE-SLE-INSTALLER-15-SP5-2024-3718,SUSE-SLE-Micro-5.5-2024-3718,SUSE-SLE-Module-Basesystem-15-SP5-2024-3718,openSUSE-Leap-Micro-5.5-2024-3718,openSUSE-SLE-15.5-2024-3718 SKIP SUSE-RU-2024:3721-1 as openSUSE-SLE-15.6-2024-3721 is not security or has no CVEs. patches: SUSE-2024-3721,SUSE-SLE-Micro-5.3-2024-3721,SUSE-SLE-Micro-5.4-2024-3721,SUSE-SLE-Micro-5.5-2024-3721,SUSE-SLE-Module-Basesystem-15-SP5-2024-3721,SUSE-SLE-Module-Basesystem-15-SP6-2024-3721,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3721,openSUSE-Leap-Micro-5.5-2024-3721,openSUSE-SLE-15.5-2024-3721,openSUSE-SLE-15.6-2024-3721 SKIP SUSE-RU-2024:3723-1 as SUSE-SLE-SERVER-12-SP5-2024-3723 is not security or has no CVEs. patches: SUSE-2024-3723,SUSE-SLE-SERVER-12-SP5-2024-3723 SKIP SUSE-RU-2024:3724-1 as SUSE-SLE-SERVER-12-SP5-2024-3724 is not security or has no CVEs. patches: SUSE-2024-3724,SUSE-SLE-SERVER-12-SP5-2024-3724 SKIP SUSE-RU-2024:3725-1 as SUSE-SLE-SERVER-12-SP5-LTSS-2024-3725 is not security or has no CVEs. patches: SUSE-2024-3725,SUSE-SLE-SERVER-12-SP5-LTSS-2024-3725 SKIP SUSE-RU-2024:3726-1 as openSUSE-SLE-15.6-2024-3726 is not security or has no CVEs. patches: SUSE-2024-3726,SUSE-SLE-Module-Basesystem-15-SP6-2024-3726,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3726,openSUSE-SLE-15.6-2024-3726 SKIP SUSE-RU-2024:3727-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3727 is not security or has no CVEs. patches: SUSE-2024-3727,SUSE-SLE-INSTALLER-15-SP4-2024-3727,SUSE-SLE-Micro-5.3-2024-3727,SUSE-SLE-Micro-5.4-2024-3727,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3727,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3727,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3727,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3727,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3727,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3727,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3727 SKIP SUSE-RU-2024:3730-1 as SUSE-Storage-7.1-2024-3730 is not security or has no CVEs. patches: SUSE-2024-3730,SUSE-SLE-INSTALLER-15-SP2-2024-3730,SUSE-SLE-INSTALLER-15-SP3-2024-3730,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3730,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3730,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3730,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3730,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3730,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3730,SUSE-SUSE-MicroOS-5.1-2024-3730,SUSE-SUSE-MicroOS-5.2-2024-3730,SUSE-Storage-7.1-2024-3730 SKIP SUSE-RU-2024:3734-1 as SUSE-SLE-Product-HA-15-SP4-2024-3734 is not security or has no CVEs. patches: SUSE-2024-3734,SUSE-SLE-Product-HA-15-SP4-2024-3734 SKIP SUSE-RU-2024:3735-1 as openSUSE-SLE-15.6-2024-3735 is not security or has no CVEs. patches: SUSE-2024-3735,SUSE-SLE-Product-HA-15-SP6-2024-3735,openSUSE-SLE-15.6-2024-3735 SKIP SUSE-RU-2024:3736-1 as openSUSE-SLE-15.5-2024-3736 is not security or has no CVEs. patches: SUSE-2024-3736,SUSE-SLE-Product-HA-15-SP5-2024-3736,openSUSE-SLE-15.5-2024-3736 SKIP SUSE-RU-2024:3738-1 as openSUSE-SLE-15.6-2024-3738 is not security or has no CVEs. patches: SUSE-2024-3738,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3738,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3738,openSUSE-SLE-15.5-2024-3738,openSUSE-SLE-15.6-2024-3738 SKIP SUSE-RU-2024:3743-1 as openSUSE-SLE-15.6-2024-3743 is not security or has no CVEs. patches: SUSE-2024-3743,SUSE-SLE-Module-Development-Tools-15-SP6-2024-3743,openSUSE-SLE-15.6-2024-3743 SKIP SUSE-RU-2024:3761-1 as SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3761 is not security or has no CVEs. patches: SUSE-2024-3761,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-3761 SKIP SUSE-RU-2024:3763-1 as SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3763 is not security or has no CVEs. patches: SUSE-2024-3763,SUSE-SLE-Micro-5.3-2024-3763,SUSE-SLE-Micro-5.4-2024-3763,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3763,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3763,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3763,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3763,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3763,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3763,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3763,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3763 ERROR: notice SUSE-SU-2015:0238-1 has no valid patches out of: 2015-7 ERROR: notice SUSE-SU-2015:0316-1 has no valid patches out of: SUSE-SLE-BSK-12-2015-82 ERROR: notice SUSE-SU-2015:0465-2 has no valid patches out of: SUSE-SLE-BSK-12-2015-116 ERROR: notice SUSE-SU-2015:0496-1 has no valid patches out of: 2015-8 ERROR: notice SUSE-SU-2015:0499-1 has no valid patches out of: 2015-9 ERROR: notice SUSE-SU-2015:0566-1 has no valid patches out of: 2015-10 ERROR: notice SUSE-SU-2015:0567-1 has no valid patches out of: 2015-11 ERROR: notice SUSE-SU-2015:0725-1 has no valid patches out of: 2015-13 ERROR: notice SUSE-SU-2015:0890-1 has no valid patches out of: 2015-14 ERROR: notice SUSE-SU-2015:0892-1 has no valid patches out of: 2015-15 ERROR: notice SUSE-SU-2015:1061-1 has no valid patches out of: 2015-17 ERROR: notice SUSE-SU-2015:1103-1 has no valid patches out of: sdksp4-e2fsprogs-219,sledsp4-e2fsprogs-219,slessp4-e2fsprogs-219 ERROR: notice SUSE-SU-2015:1180-1 has no valid patches out of: 2015-462 ERROR: notice SUSE-SU-2015:1210-1 has no valid patches out of: 2015-475 ERROR: notice SUSE-SU-2015:1214-1 has no valid patches out of: sledsp3-flash-player-20150708-1,sledsp4-flash-player-20150708-1 ERROR: notice SUSE-SU-2015:1266-1 has no valid patches out of: 2015-503 ERROR: notice SUSE-SU-2015:1267-1 has no valid patches out of: 2015-502 ERROR: notice SUSE-SU-2015:1326-1 has no valid patches out of: 2015-527 ERROR: notice SUSE-SU-2015:1547-1 has no valid patches out of: slessp3-openssh-12087 ERROR: notice SUSE-SU-2015:1547-2 has no valid patches out of: sledsp3-openssh-12087 ERROR: notice SUSE-SU-2015:1667-1 has no valid patches out of: 2015-625 ERROR: notice SUSE-SU-2015:1781-1 has no valid patches out of: 2015-670 ERROR: notice SUSE-SU-2015:1898-2 has no valid patches out of: ERROR: notice SUSE-SU-2015:2391-1 has no valid patches out of: 2015-969 ERROR: notice SUSE-SU-2015:2392-1 has no valid patches out of: 2015-970 ERROR: notice SUSE-SU-2015:2403-1 has no valid patches out of: 2015-976 ERROR: notice SUSE-SU-2016:0144-1 has no valid patches out of: 2016-48 ERROR: notice SUSE-SU-2016:0145-1 has no valid patches out of: 2016-49 ERROR: notice SUSE-SU-2016:0204-1 has no valid patches out of: 2016-73 ERROR: notice SUSE-SU-2016:0207-1 has no valid patches out of: 2016-76 ERROR: notice SUSE-SU-2016:0214-1 has no valid patches out of: 2016-84 ERROR: notice SUSE-SU-2016:0215-1 has no valid patches out of: 2016-85 ERROR: notice SUSE-SU-2016:0216-1 has no valid patches out of: 2016-82 ERROR: notice SUSE-SU-2016:0217-1 has no valid patches out of: 2016-83 ERROR: notice SUSE-SU-2016:0218-1 has no valid patches out of: 2016-86 ERROR: notice SUSE-SU-2016:0246-1 has no valid patches out of: 2016-98 ERROR: notice SUSE-SU-2016:0255-1 has no valid patches out of: 2016-102 ERROR: notice SUSE-SU-2016:0271-1 has no valid patches out of: 2016-109 ERROR: notice SUSE-SU-2016:0272-1 has no valid patches out of: 2016-110 ERROR: notice SUSE-SU-2016:0302-1 has no valid patches out of: 2016-125 ERROR: notice SUSE-SU-2016:0306-1 has no valid patches out of: 2016-131 ERROR: notice SUSE-SU-2016:0308-1 has no valid patches out of: 2016-129 ERROR: notice SUSE-SU-2016:0311-1 has no valid patches out of: 2016-132 ERROR: notice SUSE-SU-2016:0376-1 has no valid patches out of: 2016-170 ERROR: notice SUSE-SU-2016:0377-1 has no valid patches out of: 2016-169 ERROR: notice SUSE-SU-2016:0378-1 has no valid patches out of: 2016-168 ERROR: notice SUSE-SU-2016:0413-1 has no valid patches out of: 2016-185 ERROR: notice SUSE-SU-2016:0414-1 has no valid patches out of: 2016-184 ERROR: notice SUSE-SU-2016:0415-1 has no valid patches out of: 2016-186 ERROR: notice SUSE-SU-2016:0440-1 has no valid patches out of: 2016-201 ERROR: notice SUSE-SU-2016:0441-1 has no valid patches out of: 2016-202 ERROR: notice SUSE-SU-2016:0442-1 has no valid patches out of: 2016-203 ERROR: notice SUSE-SU-2016:0483-1 has no valid patches out of: 2016-218 ERROR: notice SUSE-SU-2016:0485-1 has no valid patches out of: 2016-219 ERROR: notice SUSE-SU-2016:0486-1 has no valid patches out of: 2016-217 ERROR: notice SUSE-SU-2016:0488-1 has no valid patches out of: 2016-225 ERROR: notice SUSE-SU-2016:0511-1 has no valid patches out of: 2016-234 ERROR: notice SUSE-SU-2016:0512-1 has no valid patches out of: 2016-234 ERROR: notice SUSE-SU-2016:0518-1 has no valid patches out of: 2016-238 ERROR: notice SUSE-SU-2016:0529-1 has no valid patches out of: 2016-249 ERROR: notice SUSE-SU-2016:0530-1 has no valid patches out of: 2016-248 ERROR: notice SUSE-SU-2016:0553-1 has no valid patches out of: 2016-259 ERROR: notice SUSE-SU-2016:0613-1 has no valid patches out of: 4723 ERROR: notice SUSE-SU-2016:0637-1 has no valid patches out of: 2016-293 ERROR: notice SUSE-SU-2016:0638-1 has no valid patches out of: 2016-292 ERROR: notice SUSE-SU-2016:0661-1 has no valid patches out of: 2016-302 ERROR: notice SUSE-SU-2016:0662-1 has no valid patches out of: 2016-303 ERROR: notice SUSE-SU-2016:0664-1 has no valid patches out of: 4789 ERROR: notice SUSE-SU-2016:0665-1 has no valid patches out of: 4789 ERROR: notice SUSE-SU-2016:0666-1 has no valid patches out of: 2016-305 ERROR: notice SUSE-SU-2016:0684-1 has no valid patches out of: 2016-316 ERROR: notice SUSE-SU-2016:0732-1 has no valid patches out of: 2016-333 ERROR: notice SUSE-SU-2016:0733-1 has no valid patches out of: 2016-334 ERROR: notice SUSE-SU-2016:0734-1 has no valid patches out of: 2016-335 ERROR: notice SUSE-SU-2016:0826-1 has no valid patches out of: 2016-366 ERROR: notice SUSE-SU-2016:0827-1 has no valid patches out of: 2016-365 ERROR: notice SUSE-SU-2016:0828-1 has no valid patches out of: 2016-364 ERROR: notice SUSE-SU-2016:0829-1 has no valid patches out of: 2016-367 ERROR: notice SUSE-SU-2016:0830-1 has no valid patches out of: 2016-365 ERROR: notice SUSE-SU-2016:0831-1 has no valid patches out of: 2016-367 ERROR: notice SUSE-SU-2016:0832-1 has no valid patches out of: 2016-366 ERROR: notice SUSE-SU-2016:0844-1 has no valid patches out of: 4813 ERROR: notice SUSE-SU-2016:0845-1 has no valid patches out of: 4816 ERROR: notice SUSE-SU-2016:0894-1 has no valid patches out of: 2016-402 ERROR: notice SUSE-SU-2016:0908-1 has no valid patches out of: ERROR: notice SUSE-SU-2016:0997-1 has no valid patches out of: 2016-440 ERROR: notice SUSE-SU-2016:1042-1 has no valid patches out of: 2016-457 ERROR: notice SUSE-SU-2016:1059-1 has no valid patches out of: 2016-459 ERROR: notice SUSE-SU-2016:1060-1 has no valid patches out of: 4965 ERROR: notice SUSE-SU-2016:1061-1 has no valid patches out of: 4965 ERROR: notice SUSE-SU-2016:1103-1 has no valid patches out of: 2016-489 ERROR: notice SUSE-SU-2016:1106-1 has no valid patches out of: 2016-490 ERROR: notice SUSE-SU-2016:1107-1 has no valid patches out of: 2016-490 ERROR: notice SUSE-SU-2016:1108-1 has no valid patches out of: 2016-491 ERROR: notice SUSE-SU-2016:1118-1 has no valid patches out of: 2016-497 ERROR: notice SUSE-SU-2016:1136-1 has no valid patches out of: 2016-505 ERROR: notice SUSE-SU-2016:1157-1 has no valid patches out of: 2016-513 ERROR: notice SUSE-SU-2016:1235-1 has no valid patches out of: 2016-560 ERROR: notice SUSE-SU-2016:1237-1 has no valid patches out of: 2016-562 ERROR: notice SUSE-SU-2016:1239-1 has no valid patches out of: 2016-563 ERROR: notice SUSE-SU-2016:1240-1 has no valid patches out of: 2016-562 ERROR: notice SUSE-SU-2016:1241-1 has no valid patches out of: 2016-563 ERROR: notice SUSE-SU-2016:1251-1 has no valid patches out of: 2016-566 ERROR: notice SUSE-SU-2016:1308-1 has no valid patches out of: 2016-587 ERROR: notice SUSE-SU-2016:1309-1 has no valid patches out of: 2016-587 ERROR: notice SUSE-SU-2016:1489-1 has no valid patches out of: 5171 ERROR: notice SUSE-SU-2016:1490-1 has no valid patches out of: 5171 ERROR: notice SUSE-SU-2016:1556-1 has no valid patches out of: 2016-712 ERROR: notice SUSE-SU-2016:1557-1 has no valid patches out of: 2016-714 ERROR: notice SUSE-SU-2016:1558-1 has no valid patches out of: 2016-713 ERROR: notice SUSE-SU-2016:1625-1 has no valid patches out of: 2016-743 ERROR: notice SUSE-SU-2016:1655-1 has no valid patches out of: 2016-756 ERROR: notice SUSE-SU-2016:1683-1 has no valid patches out of: 2016-774 ERROR: notice SUSE-SU-2016:1700-1 has no valid patches out of: 2016-806 ERROR: notice SUSE-SU-2016:1766-1 has no valid patches out of: 2016-846 ERROR: notice SUSE-SU-2016:1767-1 has no valid patches out of: 2016-848 ERROR: notice SUSE-SU-2016:1802-1 has no valid patches out of: 2016-870 ERROR: notice SUSE-SU-2016:1850-1 has no valid patches out of: 2016-890 ERROR: notice SUSE-SU-2016:1917-1 has no valid patches out of: 2016-918 ERROR: notice SUSE-SU-2016:1918-1 has no valid patches out of: 2016-919 ERROR: notice SUSE-SU-2016:1996-1 has no valid patches out of: slessp4-squid3-12682 ERROR: notice SUSE-SU-2016:2025-1 has no valid patches out of: 2016-959 ERROR: notice SUSE-SU-2016:2026-1 has no valid patches out of: 2016-960 ERROR: notice SUSE-SU-2016:2058-1 has no valid patches out of: 2016-982 ERROR: notice SUSE-SU-2016:2127-1 has no valid patches out of: 2016-1011 ERROR: notice SUSE-SU-2016:2167-1 has no valid patches out of: 2016-1019 ERROR: notice SUSE-SU-2016:2176-1 has no valid patches out of: 2016-1027 ERROR: notice SUSE-SU-2016:2375-1 has no valid patches out of: 2016-1122 ERROR: notice SUSE-SU-2016:2376-1 has no valid patches out of: 2016-1123 ERROR: notice SUSE-SU-2016:2378-1 has no valid patches out of: 2016-1120 ERROR: notice SUSE-SU-2016:2386-1 has no valid patches out of: 2016-1128 ERROR: notice SUSE-SU-2016:2517-1 has no valid patches out of: 2016-1183 ERROR: notice SUSE-SU-2016:2543-1 has no valid patches out of: 2016-1195 ERROR: notice SUSE-SU-2016:2544-1 has no valid patches out of: 2016-1196 ERROR: notice SUSE-SU-2016:2639-1 has no valid patches out of: 5723 ERROR: notice SUSE-SU-2016:2649-1 has no valid patches out of: 2016-1236 ERROR: notice SUSE-SU-2016:2665-1 has no valid patches out of: 2016-1240 ERROR: notice SUSE-SU-2016:2735-1 has no valid patches out of: 2016-1271 ERROR: notice SUSE-SU-2016:2736-1 has no valid patches out of: 2016-1269 ERROR: notice SUSE-SU-2016:2737-1 has no valid patches out of: 2016-1270 ERROR: notice SUSE-SU-2016:2782-1 has no valid patches out of: 2016-1286 ERROR: notice SUSE-SU-2016:2923-1 has no valid patches out of: 5892 ERROR: notice SUSE-SU-2016:2990-1 has no valid patches out of: 2016-1389 ERROR: notice SUSE-SU-2016:3011-1 has no valid patches out of: 2016-1407 ERROR: notice SUSE-SU-2016:3309-1 has no valid patches out of: 2016-1533 ERROR: notice SUSE-SU-2016:3310-1 has no valid patches out of: 2016-1534 ERROR: notice SUSE-SU-2017:0026-1 has no valid patches out of: 2017-15